Download PDF
Free download in PDF Cyber Security Multiple Choice Questions and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams like UPSC, NDA, SSC etc. These short solved questions or quizzes are provided by Gkseries./p>
(1)
When is encrypted data the safest?
[A]
When it is being transferred via usb stick.
[B]
When it is in transit.
[C]
When it is being written. When it is at rest.
[D]
When it is being written.
Answer: When it is being written. When it is at rest.
(2)
Which of the following keys are used to generate random numbers?
[A]
Symmetric random number generation keys
[B]
Symmetric and asymmetric random number generation keys
[C]
Public signature verification key
[D]
Asymmetric random number generation keys
Answer: Symmetric and asymmetric random number generation keys
(3)
Which of the following is true about Public Key Encryption?
[A]
Anyone can encrypt with the public key and anyone can decrypt with the private key
[B]
Anyone can encrypt with the public key, only one person can decrypt with the private key
[C]
Anyone can encrypt with the private key, only one person can decrypt with the public key
[D]
Only one person can encrypt with the public key and anyone can decrypt with the private key
Answer: Anyone can encrypt with the public key, only one person can decrypt with the private key
(4)
If you set up a BUS network, what is the major disadvantage?
[A]
It is entirely wireless and open to wifi-based attacks.
[B]
It is daisy-chained together with several cables
[C]
It is linked with a single cable which can be a major vulnerability.
[D]
It is connected in a star pattern and can be disabled by disrupting one data center.
Answer: It is linked with a single cable which can be a major vulnerability.
(5)
What does the acronym BEAST mean in Beast Attack?
[A]
Breaking and Entering Against SSL/TLS
[B]
Browser Extension And SSL/TLS
[C]
Browser Exploit Against SSL/TLS
[D]
Breach Entering Against SSL/TLS
Answer: Browser Exploit Against SSL/TLS
(6)
TCP is used for what three main functions?
[A]
Connect to the Web, deliver email, and transfer files.
[B]
Connect to the Web, compress data, encrypt mail.
[C]
Connect to the web, conceal data, transfer files.
[D]
Connect to the Web, encrypt data, transmit information.
Answer: Connect to the Web, deliver email, and transfer files.
(7)
Secure cookies have which feature?
[A]
They are not encrypted, just sent via secure server.
[B]
They are encrypted.
[C]
Secure cookies are passed along via encrypted programs.
[D]
Cookies are always traded between trusted users.
Answer: They are encrypted.
(8)
How are port numbers categorized?
[A]
Static, dynamic, enigmatic
[B]
Known, well-known, unknown
[C]
Well-known, registered, and static/dynamic.
[D]
Unknown, unregistered, invalid
Answer: Well-known, registered, and static/dynamic.
(9)
Which of the following type of attack can actively modify communications or data?
[A]
Both Active and Passive attack
[B]
Neither Active nor Passive attack
[C]
Active attack
[D]
Passive attack
(10)
What is the top method an attacker might infect a target?
[A]
Social engineering, or psychological manipulation.
[B]
SQL injection.
[C]
Buffer overflow.
[D]
Hacking via the Internet.
Answer: Social engineering, or psychological manipulation.
(11)
Secure Sockets Layer is a predecessor of which cryptographic protocol?
[A]
IPSec
[B]
Transport Layer Security
[C]
SSL 3.0
[D]
HTTPS
Answer: Transport Layer Security
(12)
An SQL injection is often used to attack what?
[A]
Small scale machines such as diebold ATMs
[B]
Large-scale sequel databases such as those containing credit card information.
[C]
Servers running SQL databases similar to Hadoop or Hive.
[D]
Servers built on NoSQL
Answer: Large-scale sequel databases such as those containing credit card information.
(13)
Which version of TLS is vulnerable to BEAST exploit?
[A]
TLS 1.1
[B]
TLS 3.0
[C]
TLS 2.0
[D]
TLS 1.0
(14)
According to OWASP what is the most dangerous web vulnerability?
[A]
Injections (SQL, LDAP, etc)
[B]
Cross-site-scripting (XSS)
[C]
Security Misconfiguration
[D]
Cross-Site Request Forgery (CSRF)
Answer: Injections (SQL, LDAP, etc)
(15)
Sandboxing does what to computer programs?
[A]
It separates and isolates them
[B]
It separates and isolates them
[C]
Sandboxing doesn't protect your system.
[D]
Sandboxes protect your programs by isolating all the other programs except the one you are using at the time.
Answer: It separates and isolates them.
(16)
What is largely considered the most advanced computer virus?
[A]
Conficker Virus
[B]
Zeus
[C]
Stuxnet.
[D]
Stuxnet.
(17)
What is necessary for a cross-site script attack with cookies to be thwarted?
[A]
CAPTCHAs
[B]
Virtual machines
[C]
Proxies
[D]
Firewalls
(18)
What are the two primary classifications of cross-site scripting?
[A]
DOM-based and persistent
[B]
traditional and DOM-based
[C]
traditional and non-persistent
[D]
non-persistent and persistent.
Answer: non-persistent and persistent.
(19)
Which of the following is a VALID authorization key?
[A]
Public authorization key
[B]
Public ephemeral key authorization key
[C]
Asymmetric authorization keys
[D]
Symmetric authorization keys
Answer: Public authorization key
(20)
Which of the following is a VALID digital signature key?
[A]
Public signature authentication key
[B]
Private signature authentication key
[C]
Symmetric signature authentication key
[D]
Private signature key
Answer: Private signature key
Please share this page