GkSeries.com

Cyber Security Multiple Choice Questions and Answers | Cyber Security MCQs

(1) Which of the following refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent?
[A] Malware
[B] Botnet
[C] Trojan horse
[D] Spyware
Answer: Spyware
(2) What is a computer worm?
[A] It is software designed to exploit networks.
[B] It is software designed to analyze and search for open ports.
[C] It is a software utilized to scan packets on open networks.
[D] It is malware designed to infect other computers.
Answer: It is malware designed to infect other computers.

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

(3) Is a Unix-based system vulnerable to viruses?
[A] Yes. The split is approximately 50/50 when it comes to attacks on Windows vs. Unix based systems.
[B] Yes, the majority of viruses attack Unix-based systems.
[C] No. Linux systems are totally impervious to attacks.
[D] Yes, however the majority are coded to attack Windows-based systems.
Answer: Yes, however the majority are coded to attack Windows-based systems.
(4) Which of the following protocol used Port 443 and Port 80 respectively
[A] HTTPS and HTTP
[B] XHTML
[C] HTTP and HTTPS
[D] DHTML
Answer: HTTPS and HTTP
(5) Which of the following is a means to access a computer program or entire computer system bypassing all security mechanisms?
[A] Backdoor
[B] Masquerading
[C] Phishing
[D] Trojan Horse
Answer: Backdoor
(6) What does TCP mean?
[A] Total Content Positioning
[B] Transmission Control Protocol
[B] Transmittable Constant Protocol
[B] Technical Control Panel
Answer: Transmission Control Protocol
(7) What does cross-site scripting allow for attackers?
[A] Direct introduction of viruses into a victims computer.
[B] The introduction of worm viruses into the victims website.
[C] A phishing attack that automatically downloads the victims personal information.
[D] Injection of client-side scripts into web pages.
Answer: Injection of client-side scripts into web pages.
(8) Which of the following is collection of Internet-connected programs communicating with other similar programs in order to perform tasks?
[A] Botnet
[B] Spyware
[B] Trojan horse
[B] Malware
Answer: Botnet
(9) What are TLS and SSL?
[A] Internet protocols.
[B] Network layers.
[C] Internet layers
[D] Cryptographic protocols.
Answer: Cryptographic protocols.
(10) Who was TLS defined by?
[A] The DEA
[B] OSHA
[C] Internet Engineering Task Force
[D] NSA
Answer: Internet Engineering Task Force
(11) Modern secure password storage should implement:
[A] Salted plain-text values of the password
[B] Hashed values of the password
[C] Plain-text passwords stored in an encrypted database
[D] Salted and hashed values of the password
Answer: Salted and hashed values of the password
(12) What is network topology?
[A] It is the inner networkings of a single computer.
[B] It is the top layer of a computer network.
[C] It is the framework of the components of a computer network.
[D] It is the entirety of the data of a computer network.
Answer: It is the framework of the components of a computer network.
(13) Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?
[A] Spware .
[B] Virus
[C] Trojan Horse
[D] Botnets
Answer: Trojan Horse
(14) What is another name for Internet Layer?
[A] TCP layer
[B] Interwebs
[C] IP layer
[D] SSL layer
Answer: IP layer
(15) Which of the following is the collective name for Trojan horses, spyware, and worms?
[A] Spware
[B] Botnets
[C] Virus
[D] Malware
Answer: Malware
(16) When cookies are used as session identifiers, how are they then used as a potential security hazard?
[A] They emulate user's by downloading all the victims information onto a virtual machine.
[B] User's cookies are altered to a virus-like state.
[B] They emulate user's by stealing their personal identity.
[B] Attackers emulate users by stealing their cookies.
Answer: Attackers emulate users by stealing their cookies.
(17) Which of the following is a valid flaw of SSL 2.0 ?
[A] It does not have any protection for the handshake
[B] Identical cryptographic keys are used for message authentication and encryption
[C] It has a weak MAC construction that uses the MD5 hash function with a secret prefix
[D] All of the given options are correct
Answer: All of the given options are correct
(18) Which of the following is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI)?
[A] X.507
[B] X.519
[C] X.508
[D] X.509
Answer: X.509
(19) Trojan Horse programs operate with what intent?
[A] To slowly but surely infect and become your operating system until the system crashes.
[B] To openly exploit a systems weaknesses until the user discovers it.
[C] To masquerade as non-malicious software while exploiting a system's weaknesses.
[D] To do a series of brute force attacks within the system itself and a series of external attacks from other servers
Answer: To masquerade as non-malicious software while exploiting a system's weaknesses.
(20) Why is a virtual machine considered a sandboxing method?
[A] Virtual machines all have firewalls, virus scanners, and proxy connetions.
[B] Virtual machines all have sandbox features installed on them.
[B] Virtual machines take the brunt of the attack, so the user is always safe.
[B] All host resources are channeled through the emulator.
Answer: All host resources are channeled through the emulator.

Please share this page

Click Here to Read more questions

Teacher Eligibility Test