GkSeries.com

Cyber Security Questions and Answers | Cyber Security MCQs and Answers

(1) When is encrypted data the safest?
[A] When it is being transferred via usb stick.
[B] When it is in transit.
[C] When it is being written. When it is at rest.
[D] When it is being written.
Answer: When it is being written. When it is at rest.
(2) Which of the following keys are used to generate random numbers?
[A] Symmetric random number generation keys
[B] Symmetric and asymmetric random number generation keys
[C] Public signature verification key
[D] Asymmetric random number generation keys
Answer: Symmetric and asymmetric random number generation keys

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

(3) Which of the following is true about Public Key Encryption?
[A] Anyone can encrypt with the public key and anyone can decrypt with the private key
[B] Anyone can encrypt with the public key, only one person can decrypt with the private key
[C] Anyone can encrypt with the private key, only one person can decrypt with the public key
[D] Only one person can encrypt with the public key and anyone can decrypt with the private key
Answer: Anyone can encrypt with the public key, only one person can decrypt with the private key
(4) If you set up a BUS network, what is the major disadvantage?
[A] It is entirely wireless and open to wifi-based attacks.
[B] It is daisy-chained together with several cables
[C] It is linked with a single cable which can be a major vulnerability.
[D] It is connected in a star pattern and can be disabled by disrupting one data center.
Answer: It is linked with a single cable which can be a major vulnerability.
(5) What does the acronym BEAST mean in Beast Attack?
[A] Breaking and Entering Against SSL/TLS
[B] Browser Extension And SSL/TLS
[C] Browser Exploit Against SSL/TLS
[D] Breach Entering Against SSL/TLS
Answer: Browser Exploit Against SSL/TLS
(6) TCP is used for what three main functions?
[A] Connect to the Web, deliver email, and transfer files.
[B] Connect to the Web, compress data, encrypt mail.
[C] Connect to the web, conceal data, transfer files.
[D] Connect to the Web, encrypt data, transmit information.
Answer: Connect to the Web, deliver email, and transfer files.
(7) Secure cookies have which feature?
[A] They are not encrypted, just sent via secure server.
[B] They are encrypted.
[C] Secure cookies are passed along via encrypted programs.
[D] Cookies are always traded between trusted users.
Answer: They are encrypted.
(8) How are port numbers categorized?
[A] Static, dynamic, enigmatic
[B] Known, well-known, unknown
[C] Well-known, registered, and static/dynamic.
[D] Unknown, unregistered, invalid
Answer: Well-known, registered, and static/dynamic.
(9) Which of the following type of attack can actively modify communications or data?
[A] Both Active and Passive attack
[B] Neither Active nor Passive attack
[C] Active attack
[D] Passive attack
Answer: Active attack
(10) What is the top method an attacker might infect a target?
[A] Social engineering, or psychological manipulation.
[B] SQL injection.
[C] Buffer overflow.
[D] Hacking via the Internet.
Answer: Social engineering, or psychological manipulation.
(11) Secure Sockets Layer is a predecessor of which cryptographic protocol?
[A] IPSec
[B] Transport Layer Security
[C] SSL 3.0
[D] HTTPS
Answer: Transport Layer Security
(12) An SQL injection is often used to attack what?
[A] Small scale machines such as diebold ATMs
[B] Large-scale sequel databases such as those containing credit card information.
[C] Servers running SQL databases similar to Hadoop or Hive.
[D] Servers built on NoSQL
Answer: Large-scale sequel databases such as those containing credit card information.
(13) Which version of TLS is vulnerable to BEAST exploit?
[A] TLS 1.1
[B] TLS 3.0
[C] TLS 2.0
[D] TLS 1.0
Answer: TLS 1.0
(14) According to OWASP what is the most dangerous web vulnerability?
[A] Injections (SQL, LDAP, etc)
[B] Cross-site-scripting (XSS)
[C] Security Misconfiguration
[D] Cross-Site Request Forgery (CSRF)
Answer: Injections (SQL, LDAP, etc)
(15) Sandboxing does what to computer programs?
[A] It separates and isolates them
[B] It separates and isolates them
[C] Sandboxing doesn't protect your system.
[D] Sandboxes protect your programs by isolating all the other programs except the one you are using at the time.
Answer: It separates and isolates them.
(16) What is largely considered the most advanced computer virus?
[A] Conficker Virus
[B] Zeus
[C] Stuxnet.
[D] Stuxnet.
Answer: Stuxnet.
(17) What is necessary for a cross-site script attack with cookies to be thwarted?
[A] CAPTCHAs
[B] Virtual machines
[C] Proxies
[D] Firewalls
Answer: CAPTCHAs
(18) What are the two primary classifications of cross-site scripting?
[A] DOM-based and persistent
[B] traditional and DOM-based
[C] traditional and non-persistent
[D] non-persistent and persistent.
Answer: non-persistent and persistent.
(19) Which of the following is a VALID authorization key?
[A] Public authorization key
[B] Public ephemeral key authorization key
[C] Asymmetric authorization keys
[D] Symmetric authorization keys
Answer: Public authorization key
(20) Which of the following is a VALID digital signature key?
[A] Public signature authentication key
[B] Private signature authentication key
[C] Symmetric signature authentication key
[D] Private signature key
Answer: Private signature key

Please share this page

Click Here to Read more questions

Teacher Eligibility Test