Download PDF
Free download in PDF Cyber Security Multiple Choice Questions and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams like UPSC, NDA, SSC etc. These short solved questions or quizzes are provided by Gkseries./p>
(1)
Which of the following refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent?
[A]
Malware
[B]
Botnet
[C]
Trojan horse
[D]
Spyware
(2)
What is a computer worm?
[A]
It is software designed to exploit networks.
[B]
It is software designed to analyze and search for open ports.
[C]
It is a software utilized to scan packets on open networks.
[D]
It is malware designed to infect other computers.
Answer: It is malware designed to infect other computers.
(3)
Is a Unix-based system vulnerable to viruses?
[A]
Yes. The split is approximately 50/50 when it comes to attacks on Windows vs. Unix based systems.
[B]
Yes, the majority of viruses attack Unix-based systems.
[C]
No. Linux systems are totally impervious to attacks.
[D]
Yes, however the majority are coded to attack Windows-based systems.
Answer: Yes, however the majority are coded to attack Windows-based systems.
(4)
Which of the following protocol used Port 443 and Port 80 respectively
[A]
HTTPS and HTTP
[B]
XHTML
[C]
HTTP and HTTPS
[D]
DHTML
(5)
Which of the following is a means to access a computer program or entire computer system bypassing all security mechanisms?
[A]
Backdoor
[B]
Masquerading
[C]
Phishing
[D]
Trojan Horse
(6)
What does TCP mean?
[A]
Total Content Positioning
[B]
Transmission Control Protocol
[B]
Transmittable Constant Protocol
[B]
Technical Control Panel
Answer: Transmission Control Protocol
(7)
What does cross-site scripting allow for attackers?
[A]
Direct introduction of viruses into a victims computer.
[B]
The introduction of worm viruses into the victims website.
[C]
A phishing attack that automatically downloads the victims personal information.
[D]
Injection of client-side scripts into web pages.
Answer: Injection of client-side scripts into web pages.
(8)
Which of the following is collection of Internet-connected programs communicating with other similar programs in order to perform tasks?
[A]
Botnet
[B]
Spyware
[B]
Trojan horse
[B]
Malware
(9)
What are TLS and SSL?
[A]
Internet protocols.
[B]
Network layers.
[C]
Internet layers
[D]
Cryptographic protocols.
Answer: Cryptographic protocols.
(10)
Who was TLS defined by?
[A]
The DEA
[B]
OSHA
[C]
Internet Engineering Task Force
[D]
NSA
Answer: Internet Engineering Task Force
(11)
Modern secure password storage should implement:
[A]
Salted plain-text values of the password
[B]
Hashed values of the password
[C]
Plain-text passwords stored in an encrypted database
[D]
Salted and hashed values of the password
Answer: Salted and hashed values of the password
(12)
What is network topology?
[A]
It is the inner networkings of a single computer.
[B]
It is the top layer of a computer network.
[C]
It is the framework of the components of a computer network.
[D]
It is the entirety of the data of a computer network.
Answer: It is the framework of the components of a computer network.
(13)
Which of the following is a general term for malicious software that pretends to be harmless so that a user willingly allows it to be downloaded onto the computer?
[A]
Spware .
[B]
Virus
[C]
Trojan Horse
[D]
Botnets
(14)
What is another name for Internet Layer?
[A]
TCP layer
[B]
Interwebs
[C]
IP layer
[D]
SSL layer
(15)
Which of the following is the collective name for Trojan horses, spyware, and worms?
[A]
Spware
[B]
Botnets
[C]
Virus
[D]
Malware
(16)
When cookies are used as session identifiers, how are they then used as a potential security hazard?
[A]
They emulate user's by downloading all the victims information onto a virtual machine.
[B]
User's cookies are altered to a virus-like state.
[B]
They emulate user's by stealing their personal identity.
[B]
Attackers emulate users by stealing their cookies.
Answer: Attackers emulate users by stealing their cookies.
(17)
Which of the following is a valid flaw of SSL 2.0 ?
[A]
It does not have any protection for the handshake
[B]
Identical cryptographic keys are used for message authentication and encryption
[C]
It has a weak MAC construction that uses the MD5 hash function with a secret prefix
[D]
All of the given options are correct
Answer: All of the given options are correct
(18)
Which of the following is an ITU-T standard for a public key infrastructure (PKI) and Privilege Management Infrastructure (PMI)?
[A]
X.507
[B]
X.519
[C]
X.508
[D]
X.509
(19)
Trojan Horse programs operate with what intent?
[A]
To slowly but surely infect and become your operating system until the system crashes.
[B]
To openly exploit a systems weaknesses until the user discovers it.
[C]
To masquerade as non-malicious software while exploiting a system's weaknesses.
[D]
To do a series of brute force attacks within the system itself and a series of external attacks from other servers
Answer: To masquerade as non-malicious software while exploiting a system's weaknesses.
(20)
Why is a virtual machine considered a sandboxing method?
[A]
Virtual machines all have firewalls, virus scanners, and proxy connetions.
[B]
Virtual machines all have sandbox features installed on them.
[B]
Virtual machines take the brunt of the attack, so the user is always safe.
[B]
All host resources are channeled through the emulator.
Answer: All host resources are channeled through the emulator.
Please share this page