Download PDF
Free download in PDF Cyber Security Multiple Choice Questions and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams like UPSC, NDA, SSC etc. These short solved questions or quizzes are provided by Gkseries./p>
(1)
Which of the following are possible security threats?
[A]
Illegitimate use
[B]
Backdoors
[C]
Masquerading
[D]
All of the given options are correct
Answer: All of the given options are correct
(2)
What is a firewall?
[A]
Firewalls are network-based security measures that control the flow of incoming and outgoing traffic
[B]
A firewall is a program that encrypts all the programs that access the Internet.
[C]
A firewall is a program that keeps other programs from using the network.
[D]
Firewalls are interrupts that automatically disconnect from the internet when a threat appears
Answer: Firewalls are network-based security measures that control the flow of incoming and outgoing traffic
(3)
Which of the following involves submitting as many requests as possible to a single Internet computer or service, overloading it and preventing it from servicing legitimate requests?
[A]
Distributed denial-of-service attacks
[B]
Backdoor
[C]
Masquerading
[D]
Phishing
Answer: Distributed denial-of-service attacks
(4)
Which of the following symmetric keys can be derived from Symmetric master key?
[A]
Authentication keys
[B]
Key wrapping keys
[C]
Data encryption keys
[D]
All of the given options are correct
Answer: All of the given options are correct
(5)
Which of the following are valid Cryptographic key types?
[A]
Public authentication key
[B]
Public signature verification key
[C]
Private signature key
[D]
All of the given options are correct
Answer: All of the given options are correct
(6)
Is true that HTTP is an insecure protocol?
(7)
Which is the best way a system can be hardened?
[A]
Total disk encryption coupled with strong network security protocols.
[B]
White-list ad filtering only.
[C]
Installing a commercial security suite.
[D]
Virus scanning only.
Answer: Total disk encryption coupled with strong network security protocols.
(8)
Why is it crucial to encrypt data in transit?
[A]
To assure that all of your information cannot be decrypted.
[B]
To decrease your resources.
[C]
So you can increase your chances of testing your encryption capabilities.
[D]
To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.
Answer: To prevent unauthorized access to private networks and sensitive information during its most vulnerable state.
(9)
Which of the following are the basic functionalities of the IPsec Protocol ?
[A]
Security association for policy management and traffic processing
[B]
Security protocols for AH and ESP
[C]
Manual and automatic key management for the internet key exchange
[D]
All of the given options are correct
Answer: All of the given options are correct
(10)
Can a proxy be used as a firewall? If so, how?
[A]
No. Proxies are data encryption stations whose sole purpose is to encrypt and rerout data.
[B]
No. Proxies are firewalls that are maintained at locations other than that of the user.
[C]
No. All a proxy does is re-rout Internet traffic, and thus all the malicious signals that go with it.
[D]
Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incoming and outgoing traffic.
Answer: Yes. A proxy acts as a network intermediary for the user that serves to control the flow of incoming and outgoing traffic.
(11)
In which of the following fraud methods is a legitimate/legal-looking email sent in an attempt to gather personal and financial information from recipients?
[A]
Virus
[B]
Masquerading
[C]
Phishing
[D]
Malware
(12)
Which of the following is TRUE about TLS?
[A]
The HMAC construction used by most TLS cipher suites is specified in RFC 2104
[B]
Provides protection against a downgrade of the protocol to a previous (less secure) version or a weaker cipher suite
[C]
The message that ends the handshake sends a hash of all the exchanged handshake messages seen by both parties
[D]
All of the given options are correct
Answer: All of the given options are correct
(13)
Which of the following is a VALID type of Key Management System?
[A]
Third-Party Key Management System .
[B]
Dynamic Key Management System
[C]
Integrated Key Management System
[D]
Both Integrated Key Management System and Third-Party Key Management System
Answer: Both Integrated Key Management System and Third-Party Key Management System
(14)
What is one way that a web browser is vulnerable to breaching?
[A]
A browser can be infected by closing it.
[B]
A virus can be sent through the monitor.
[C]
A browser plugin can be exploited.
[D]
Web browsers are impervious to exploitation.
Answer: A browser plugin can be exploited.
(15)
What two main categories of network topologies are there?
[A]
Digital and Topological
[B]
Direct and Indirect
[C]
Close and Distant
[D]
Physical and logical.
Answer: Physical and logical.
(16)
What is another name for an insecure plugin?
[A]
Hardware
[B]
Software
[C]
Firmware
[D]
Malware
(17)
A digital signature scheme consists of which of the following typical algorithms?
[A]
Key generation, Signing and Signature verifying algorithm
[B]
Signature verifying algorithm
[C]
Key generation algorithm
[D]
Signing algorithm
Answer: Key generation, Signing and Signature verifying algorithm
(18)
Which of the following is TRUE about SSL 3.0?
[A]
It has a weak MAC construction that uses the MD5 hash function with a secret prefix
[B]
Identical cryptographic keys are used for message authentication and encryption
[C]
SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication
[D]
It assumes a single service and a fixed domain certificate, which clashes with the standard feature of virtual hosting in Web servers
Answer: SSL 3.0 improved upon SSL 2.0 by adding SHA-1 based ciphers and support for certificate authentication
(19)
There are two types of firewall. What are they?
[A]
Internet-based and home-based.
[B]
Hardware and software.
[C]
Remote and local
[D]
Digital and electronic.
Answer: Hardware and software.
(20)
True of False? Malware exists which affects both Windows and Linux systems.
Please share this page