Cyber Security Questions and Answers | Cyber Security MCQs and Answers

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

Questions
1 When is encrypted data the safest?
A When it is being transferred via usb stick.
B When it is in transit.
C When it is being written. When it is at rest.
D When it is being written.

Answer: When it is being written. When it is at rest.
2 Which of the following keys are used to generate random numbers?
A Symmetric random number generation keys
B Symmetric and asymmetric random number generation keys
C Public signature verification key
D Asymmetric random number generation keys

Answer: Symmetric and asymmetric random number generation keys
Advertisement
Article and Schedule Quiz Start Test!
DOWNLOAD CURRENT AFFAIRS PDF FROM APP
3 Which of the following is true about Public Key Encryption?
A Anyone can encrypt with the public key and anyone can decrypt with the private key
B Anyone can encrypt with the public key, only one person can decrypt with the private key
C Anyone can encrypt with the private key, only one person can decrypt with the public key
D Only one person can encrypt with the public key and anyone can decrypt with the private key

Answer: Anyone can encrypt with the public key, only one person can decrypt with the private key
4 If you set up a BUS network, what is the major disadvantage?
A It is entirely wireless and open to wifi-based attacks.
B It is daisy-chained together with several cables
C It is linked with a single cable which can be a major vulnerability.
D It is connected in a star pattern and can be disabled by disrupting one data center.

Answer: It is linked with a single cable which can be a major vulnerability.
5 What does the acronym BEAST mean in Beast Attack?
A Breaking and Entering Against SSL/TLS
B Browser Extension And SSL/TLS
C Browser Exploit Against SSL/TLS
D Breach Entering Against SSL/TLS

Answer: Browser Exploit Against SSL/TLS
6 TCP is used for what three main functions?
A Connect to the Web, deliver email, and transfer files.
B Connect to the Web, compress data, encrypt mail.
C Connect to the web, conceal data, transfer files.
D Connect to the Web, encrypt data, transmit information.

Answer: Connect to the Web, deliver email, and transfer files.
7 Secure cookies have which feature?
A They are not encrypted, just sent via secure server.
B They are encrypted.
C Secure cookies are passed along via encrypted programs.
D Cookies are always traded between trusted users.

Answer: They are encrypted.
8 How are port numbers categorized?
A Static, dynamic, enigmatic
B Known, well-known, unknown
C Well-known, registered, and static/dynamic.
D Unknown, unregistered, invalid

Answer: Well-known, registered, and static/dynamic.
9 Which of the following type of attack can actively modify communications or data?
A Both Active and Passive attack
B Neither Active nor Passive attack
C Active attack
D Passive attack

Answer: Active attack
10 What is the top method an attacker might infect a target?
A Social engineering, or psychological manipulation.
B SQL injection.
C Buffer overflow.
D Hacking via the Internet.

Answer: Social engineering, or psychological manipulation.
11 Secure Sockets Layer is a predecessor of which cryptographic protocol?
A IPSec
B Transport Layer Security
C SSL 3.0
D HTTPS

Answer: Transport Layer Security
12 An SQL injection is often used to attack what?
A Small scale machines such as diebold ATMs
B Large-scale sequel databases such as those containing credit card information.
C Servers running SQL databases similar to Hadoop or Hive.
D Servers built on NoSQL

Answer: Large-scale sequel databases such as those containing credit card information.
13 Which version of TLS is vulnerable to BEAST exploit?
A TLS 1.1
B TLS 3.0
C TLS 2.0
D TLS 1.0

Answer: TLS 1.0
14 According to OWASP what is the most dangerous web vulnerability?
A Injections (SQL, LDAP, etc)
B Cross-site-scripting (XSS)
C Security Misconfiguration
D Cross-Site Request Forgery (CSRF)

Answer: Injections (SQL, LDAP, etc)
15 Sandboxing does what to computer programs?
A It separates and isolates them
B It separates and isolates them
C Sandboxing doesn't protect your system.
D Sandboxes protect your programs by isolating all the other programs except the one you are using at the time.

Answer: It separates and isolates them.
16 What is largely considered the most advanced computer virus?
A Conficker Virus
B Zeus
C Stuxnet.
D Stuxnet.

Answer: Stuxnet.
17 What is necessary for a cross-site script attack with cookies to be thwarted?
A CAPTCHAs
B Virtual machines
C Proxies
D Firewalls

Answer: CAPTCHAs
18 What are the two primary classifications of cross-site scripting?
A DOM-based and persistent
B traditional and DOM-based
C traditional and non-persistent
D non-persistent and persistent.

Answer: non-persistent and persistent.
19 Which of the following is a VALID authorization key?
A Public authorization key
B Public ephemeral key authorization key
C Asymmetric authorization keys
D Symmetric authorization keys

Answer: Public authorization key
20 Which of the following is a VALID digital signature key?
A Public signature authentication key
B Private signature authentication key
C Symmetric signature authentication key
D Private signature key

Answer: Private signature key
Assam Direct Recruitment Test Series

Teacher Eligibility Test

Assam Direct Recruitment Test Series