Cyber Security Tutorial
Cyber Security Tutorial
Cyber Security Tutorial What is Cyber Security Cyber Security History Cyber Security Goals Types of Cyber Attacks
Types of Cyber Attackers Cyber Security Principles Data Security Considerations Cyber Security Technology Threats to
E-Commerce Cyber Security Policies Cyber Security Standards Digital Signature Cyber Security Tools Cyber Security
Challenges Security Risk Analysis Cyber Security Certification MITM Attacks Secure e-mail service provider Birthday
Attack in Cryptography Implementing Atbash Cipher Anti-Keylogger Advantages and Disadvantages of Cyber Security
Encryption Algorithms in Cryptography Blowfish Algorithm in Cryptography SHA Algorithm in Cryptography What is AES
What is MD5 Algorithm What is SHA- 256 Algorithm What is DES Emerging Cyber Security threats Impact of IOT on
Cyber Security
This set of following multiple-choice questions and answers focuses on "Cyber Security". One shall practice these
interview questions to improve their concepts for various interviews (campus interviews, walk-in interviews, and company
interviews), placements, entrance exams, and other competitive exams.
1) In which of the following, a person is constantly followed/chased by another person or group of several peoples?
1. Phishing
2. Bulling
3. Stalking
4. Identity theft
Answer: c
Explanation: In general, Stalking refers to continuous surveillance on the target (or person) done by a group of people or
by the individual person.
Cyber Stalking is a type of cybercrime in which a person (or victim) is being followed continuously by another person or
group of several people through electronic means to harass the victim. We can also say that the primary goal of Stalking
is to observe or monitor each victim's actions to get the essential information that can be further used for threatening,
harassing, etc.
2) Which one of the following can be considered as the class of computer threats?
1. Dos Attack
2. Phishing
3. Soliciting
4. Both A and C
Answer: a
Explanation: A dos attack refers to the denial of service attack. It is a kind of cyber attack in which one tries to make a
machine (or targeted application, website etc.) unavailable for its intended users. It is usually accomplished by
disturbing the service temporarily or indefinitely of the target connected to the internet.
1. Virus
2. Malware
3. Spam
4. All of the above
Answer: c
Explanation: It is a type of unsolicited email which is generally sent in bulk to an indiscriminate recipient list for
commercial purpose. Generally, these types of mail are considered unwanted because most users don't want these
emails at all.
4) Which of the following usually observe each activity on the internet of the victim, gather all information in the
background, and send it to someone else?
1. Malware
2. Spyware
3. Adware
4. All of the above
Answer: b
Explanation: It is generally defined as the software designed to enter the target's device or computer system, gather all
information, observe all user activities, and send this information to a third party. Another important thing about the
spyware is that it works in the background sends all information without your permission.
5) _______ is a type of software designed to help the user's computer detect viruses and avoid them.
1. Malware
2. Adware
3. Antivirus
4. Both B and C
Answer: c
Explanation: An antivirus is a kind of software that is specially designed to help the user's computer to detect the virus
as well as to avoid the harmful effect of them. In some cases where the virus already resides in the user's computer, it
can be easily removed by scanning the entire system with antivirus help.
1. Quick heal
2. Mcafee
3. Kaspersky
4. All of the above
Answer: d
Explanation: Antivirus is a kind of software program that helps to detect and remove viruses form the user's computer
and provides a safe environment for users to work on. There are several kinds of antivirus software are available in the
market, such as Kaspersky, Mcafee, Quick Heal, Norton etc., so the correct answer is D.
7) It can be a software program or a hardware device that filters all data packets coming through the internet, a network,
etc. it is known as the_______:
1. Antivirus
2. Firewall
3. Cookies
4. Malware
Answer: b
Explanation: There are two types of firewalls - software programs and hardware-based firewalls. These types of firewalls
filter each and every data packet coming from the outside environment such as network; internet so that any kind of
virus would not be able to enter in the user's system. In some cases where the firewall detects any suspicious data
packet, it immediately burns or terminates that data packet. In short, we can also say that it is the first line of defense of
the system to avoid several kinds of viruses.
8) Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?
1. Piracy
2. Plagiarism
3. Intellectual property rights
4. All of the above
Answer: d
Explanation: The stealing ideas or the invention of others and using them for their own profits can also be defined in
several different ways, such as piracy, intellectual property rights, and plagiarism.
9) Read the following statement carefully and find out whether it is correct about the hacking or not?
It can be possible that in some cases, hacking a computer or network can be legal.
Answer: b
Explanation: Nowadays, hacking is not just referred to as an illegal task because there are some good types of hackers
are also available, known as an ethical hacker. These types of hackers do not hack the system for their own purposes,
but the organization hires them to hack their system to find security falls, loop wholes. Once they find the loop whole or
venerability in the system, they get paid, and the organization removes that weak points.
10) Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and
digital media platform?
1. Cyber low
2. Cyberethics
3. Cybersecurity
4. Cybersafety
Answer: b
Explanation: Cyber Ethics refers to exploring the appropriate, ethical behaviors related to online environments and
digital media.
11) Which of the following refers to the violation of the principle if a computer is no more accessible?
1. Access control
2. Confidentiality
3. Availability
4. All of the above
Answer: c
Explanation: Availability refers to the violation of principle, if the system is no more accessible.
12) Which one of the following refers to the technique used for verifying the integrity of the message?
1. Digital signature
2. Decryption algorithm
3. Protocol
4. Message Digest
Answer: d
Explanation: Message Digest is a type of cryptographic hash function that contains a string of digits that are created by
the one-way hashing formula. It is also known as a type of technique used for verifying the integrity of the message,
data or media, and to detect if any manipulations are made. Therefore the correct answer is D.
13) Which one of the following usually used in the process of Wi-Fi-hacking?
1. Aircrack-ng
2. Wireshark
3. Norton
4. All of the above
Answer: a
Explanation: The Aircrack-ng is a kind of software program available in the Linux-based operating systems such as
Parrot, kali etc. it is usually used by users while hacking the Wi-Fi-networks or finding vulnerabilities in the network to
capture or monitor the data packets traveling in the network.
14) Which of the following port and IP address scanner famous among the users?
Answer: b
Explanation: Angry IP Scanner is a type of hacking tool that is usually used by both white hat and black hat types of
hackers. It is very famous among the users because it helps to find the weaknesses in the network devices.
15) In ethical hacking and cyber security, there are _______ types of scanning:
ADVERTISEMENT
ADVERTISEMENT
1. 1
2. 2
3. 3
4. 4
Answer: c
Explanation: There are usually three types of scanning in ethical hacking and cyber security. Therefore the correct
answer is C.
Answer: b
Explanation: Among the following-given options, the Cloud Scan is one, and only that is not a type of scanning.
17) In system hacking, which of the following is the most crucial activity?
1. Information gathering
2. Covering tracks
3. Cracking passwords
4. None of the above
Answer: c
Explanation: While trying to hack a system, the most important thing is cracking the passwords.
ADVERTISEMENT
ADVERTISEMENT
Answer: a
Explanation: The vulnerability, port, and network scanning are three types of scanning.
19) Which one of the following is actually considered as the first computer virus?
1. Sasser
2. Blaster
3. Creeper
4. Both A and C
Answer: c
Explanation: The Creeper is called the first computer virus as it replicates itself (or clones itself) and spread from one
system to another. It is created by Bob Thomas at BBN in early 1971 as an experimental computer program.
20) To protect the computer system against the hacker and different kind of viruses, one must always keep _________
on in the computer system.
1. Antivirus
2. Firewall
3. Vlc player
4. Script
Answer: b
Explanation: It is essential to always keep the firewall on in our computer system. It saves the computer system against
hackers, viruses, and installing software form unknown sources. We can also consider it the first line of defense of the
computer system.
1. An Antivirus Program
2. A photo editing software
3. A computer virus
4. A video editing software
Answer: c
Explanation: Cod Red is a type of Computer virus that was first discovered on 15 July in 2001 as it attacks the servers
of Microsoft. In a couple of next days, it infects almost 300,000 servers.
22) Which of the following can be considered as the elements of cyber security?
1. Application Security
2. Operational Security
3. Network Security
4. All of the above
Answer: d
Explanation: Application security, operational security, network security all are the main and unforgettable elements of
Cyber Security. Therefore the correct answer is D.
23) Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user's system?
Answer: d
Explanation: DDoS (or denial of service), malware, drive-by downloads, phishing and password attacks are all some
common and famous types of cyber-attacks used by hackers.
1. Maliciousware
2. Badware
3. Ilegalware
4. Malware
Answer: d
Explanation: Malware is a kind of short program used by the hacker to gain access to sensitive data/ information. It is
used to denote many kinds of viruses, worms, Trojans, and several other harmful programs. Sometimes malware is also
known as malicious software.
25) Hackers usually used the computer virus for ______ purpose.
1. To log, monitor each and every user's stroke
2. To gain access the sensitive information like user's Id and Passwords
3. To corrupt the user's data stored in the computer system
4. All of the above
Answer: d
Explanation: In general, hackers use computer viruses to perform several different tasks such as to corrupt the user's
data stored in his system, to gain access the important information, to monitor or log each user's strokes. Therefore the
correct answer is D.
1. WPA
2. WPA2
3. WPS
4. Both A and C
Answer: b
Explanation: Nowadays, in Wi-Fi Security, the WPA2 is one of the most widely used protocols because it offers a more
secure connection rather than the WPA. It is also known as the upgraded version of the WPA protocol.
Answer: b
Explanation: The term "TCP/IP" stood for Transmission Control Protocol/ internet protocol and was developed by the US
government in the early days of the internet.
28) The response time and transit time is used to measure the ____________ of a network.
1. Security
2. Longevity
3. Reliability
4. Performance
Answer: d
Explanation: On the basis of response time and transit time, the performance of a network is measured.
29) Which of the following factor of the network gets hugely impacted when the number of users exceeds the network's
limit?
1. Reliability
2. Performance
3. Security
4. Longevity
Answer: d
Explanation: When the numbers of users on a network get increased and exceed the network's limit, therefore the
performance is one of the factors of the network that is hugely impacted by it.
30) In the computer networks, the encryption techniques are primarily used for improving the ________
1. Security
2. Performance
3. Reliability
4. Longevity
Answer: a
Explanation: Encryption techniques are usually used to improve the security of the network. So the correct answer will
be A.
Answer: b
Explanation: A firewall can be the type of either a software or the hardware device that filters each and every data
packet coming from the network, internet. It can also be considered as a device installed at the boundary of an
incorporate to protect form unauthorized access. Sometimes firewall also refers to the first line of defense against
viruses, unauthorized access, malicious software etc.
1. 1970
2. 1971
3. 1972
4. 1969
Answer: b
Explanation: In 1970, the world's first computer virus was created by Robert (Bob) Thomas. This virus was designed as
it creates copies of itself or clones itself and spreads one computer to another. So the correct answer will be 1970.
33) Which of the following is considered as the world's first antivirus program?
1. Creeper
2. Reaper
3. Tinkered
4. Ray Tomlinson
Answer: b
Explanation: Reaper is considered as the world's first antivirus program or software as it can detect the copies of a
Creeper (the world's first man-made computer virus) and could delete it as well.
34) Which one of the following principles of cyber security refers that the security mechanism must be as small and
simple as possible?
1. Open-Design
2. Economy of the Mechanism
3. Least privilege
4. Fail-safe Defaults
Answer: b
Explanation: Economy of the mechanism states that the security mechanism must need to be simple and small as
possible.
35) Which of the following principle of cyber security restricts how privileges are initiated whenever any object or subject
is created?
1. Least privilege
2. Open-Design
3. Fail-safe Defaults
4. None of the above
Answer: c
Explanation: The fail-safe Defaults principle of cyber security restricts how privileges are initiated whenever a subject or
object is created. In cases where the privileges, rights, access or some other security-related attribute is not granted
explicitly, it should also not granted access to the object.
36) Suppose an employee demands the root access to a UNIX system, where you are the administrator; that right or
access should not be given to the employee unless that employee has work that requires certain rights, privileges. It can
be considered as a perfect example of which principle of cyber security?
1. Least privileges
2. Open Design
3. Separation of Privileges
4. Both A & C
Answer: a
Explanation: The example given in the above question refers to the least privileges principle of cyber security. The least
privileges principle of cyber security states that no rights, access to the system should be given to any of the employees
of the organization unless he/she needs those particular rights, access in order to complete the given task. In short, we
can say that its primary work is to restrict or control the assignment of rights to the employees.
37) Which of the following can also consider as the instances of Open Design?
1. CSS
2. DVD Player
3. Only A
4. Both A and B
Answer: d
Explanation: The Open Design is a kind of open design artifact whose documentation is publically available, which
means anyone can use it, study, modify, distribute, and make the prototypes. However, the CSS (or Content Scrambling
System) and DVD Player are both examples of open design.
38) Which one of the following principles states that sometimes it is become more desirable to rescored the details of
intrusion that to adopt more efficient measure to avoid it?
1. Least common mechanism
2. Compromise recording
3. Psychological acceptability
4. Work factor
Answer: b
Explanation: The principle called compromise factor states that in some cases, it is more beneficial to records or
document the details of the intrusion that to adopt more efficient measures to avoid it.
39) The web application like banking websites should ask its users to log-in again after some specific period of time, let
say 30 min. It can be considered as an example of which cybersecurity principle?
1. Compromise recording
2. Psychological acceptability
3. Complete mediation
4. None of the above
Answer: c
Explanation: The complete mediation principle of cybersecurity requires that all the access must be checked to ensure
that they are genuinely allowed. However, the example given in the above question can be considered as an example of
Complete Mediation.
40) Which one of the following statements is corret about Email security in the network security methods?
1. One has to deploy hardware, software, and security procedures to lock those apps down.
2. One should know about what the normal behavior of a network look likes so that he/she can spot any changes,
breaches in the behavior of the network.
3. Phishing is one of the most commonly used methods that are used by hackers to gain access to the network
4. All of the above
Answer: c
Explanation: In terms of Email Security, phishing is one of the standard methods that are used by Hackers to gain
access to a network. The Email Security Tools can handle several types of attacks, such as the incoming attacks, and
protect the outbound messages containing sensitive data/information as well.
41) Which of the following statements is true about the VPN in Network security?
1. It is a type of device that helps to ensure that communication between a device and a network is secure.
2. It is usually based on the IPsec( IP Security) or SSL (Secure Sockets Layer)
3. It typically creates a secure, encrypted virtual "tunnel" over the open internet
4. All of the above
Answer: d
Explanation: The term VPN stands for Virtual Private Network. It is a type of network security-enhancing tool that can be
either a software program or a hardware device. It usually authenticates the communication between a device and a
network by creating a secure encrypted virtual "tunnel". In general, the software VPNs are considered as the most cost-
effective, user friendly over the hardware VPNs.
42) Which of the following type of text is transformed with the help of a cipher algorithm?
1. Transformed text
2. Complex text
3. Scalar text
4. Plain text
Answer: d
Explanation: The cipher algorithm is used to create an encrypted message by taking the input as understandable text or
"plain text" and obtains unreadable or "cipher text" as output. It is usually used to protect the information while
transferring one place to another place.
Answer: c
Explanation: The term "CHAP" stands for the Challenge Handshake Authentication Protocols. In computer networks, it
can be defined as an authentication scheme that avoids the transfer of unencrypted passwords over the network. The
"CHAP" is one of the many authentication schemes used by the Point To Point Protocol (PPP), which is a serial
transmission protocol for wide networks Connections (WAN).
44) Which type of the following malware does not replicate or clone them self's through infection?
1. Rootkits
2. Trojans
3. Worms
4. Viruses
Answer: b
Explanation: The Trojans type of malware does not generate copies of them self's or clone them. The main reason why
these types of viruses are referred to as the Trojans is the mythological story of the Greeks. In which some top-level
accessions were hidden in the big wooden horse-like structure and given to the enemy as a gift. So that they can enter
to the enemy's palace without come in any sight.
45) Which of the following malware's type allows the attacker to access the administrative controls and enables his/or
her to do almost anything he wants to do with the infected computers.
1. RATs
2. Worms
3. Rootkits
4. Botnets
Answer: a
Explanation: The RAT is an abbreviation of Remote Access Trojans or Remote Administration Tools, which gives the
total control of a Device, which means it, can control anything or do anything in the target device remotely. It allows the
attacker administrative control just as if they have physical access to your device.
47) Which of the following is just opposite to the Open Design prnciple?
Answer: a
Explanation: The "Security through obscurity" is an approach which just opposite to the Open Design principle. So the
correct option is A.
48) Which of the following is a type of independent malicious program that never required any host program?
1. Trojan Horse
2. Worm
3. Trap Door
4. Virus
Answer: b
Explanation: Warm is a type of independent malicious program that does not require any host programs(or attached
with some programs). They typically cause damages to the systems by consuming the bandwidths and overloading the
servers. Warms are quite different from the virus as they are stand-alone programs, whereas viruses need some type of
triggers to activate by their host or required human interaction.
49) Which of the following usually considered as the default port number of apache and several other web servers?
1. 20
2. 40
3. 80
4. 87
Answer: c
Explanation: The default port number used by the apache and several other web servers is 80. So the correct answer
will be C.
1. Hex
2. Binary
3. IP
4. URL
Answer: d
Explanation: DNS stands for the Domain name system; the main work of a DNS is to translate the Domain name into an
IP address that is understandable to the computers.
51) Which one of the following systems cannot be considered as an example of the operating systems?
1. Windows 8
2. Red Hat Linux
3. BSD Linux
4. Microsoft Office
Answer: d
Explanation: Microsoft office is a type of software used for creating and managing documents, which is one of the most
famous products of the Microsoft organization. So the correct answer will be the D.
52) In the CIA Triad, which one of the following is not involved?
1. Availability
2. Confidentiality
3. Authenticity
4. Integrity
Answer: c
Explanation: CIA refers to Confidentiality, Integrity, and Availability that are also considered as the CIA triad. However,
the CIA triad does not involve Authenticity.
53) In an any organization, company or firm the policies of information security come under__________
ADVERTISEMENT
1. CIA Triad
2. Confidentiality
3. Authenticity
4. None of the above
Answer: a
Explanation: Confidentiality, Integrity, Availability are the three main principles. In Short, these three principles are also
known as the CIA triad and plays a vital role as the cornerstone of the security structure of any organization.
54) Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the fundamentals?
Answer: c
Explanation: Confidentiality, Integrity, Availability and Authenticity all these four elements helps in understanding
security and its components.
55) In order to ensure the security of the data/ information, we need to ____________ the data:
1. Encrypt
2. Decrypt
3. Delete
4. None of the above
Answer: a
Explanation: Data encryption is a type of method in which the plain text is converted into ciphertext, and only the
authorized users can decrypt it back to plain text by using the right key. This preserves the Confidentiality of the Data.
56) Which one of the following is considered as the most secure Linux operating system that also provides anonymity
and the incognito option for securing the user's information?
1. Ubuntu
2. Tails
3. Fedora
4. All of the above
Answer: b
Explanation: Tails is a type of Linux-based operating system that is considered to be one of the most secure operating
systems in the world. It also provides many features such as anonymity and incognito options to insure that user
information is always protected. The main reason why the tails operating system is famous among the user is that it is
almost untraceable, which keep your privacy secure.
57) Which type following UNIX account provides all types of privileges and rights which one can perform administrative
functions?
1. Client
2. Guest
3. Root
4. Administrative
Answer: d
Explanation: If a user uses the Root account of the UNIX operating system, he can carry out all types of administrative
functions because it provides all necessary privileges and rights to a user.
ADVERTISEMENT
1. OSCON
2. DEVON
3. DEFCON
4. SECTION
Answer: c
Explanation: DEFCON is one of the most popular and largest Hacker's as well as the security consultant's conference. It
is always held once a year in Las Vegas, Nevada, where hackers of all types (such as black hats, gray hats, and white
hat hackers), government agents as well as security professionals from around the world attend the conference attends
this meeting.
59) Which of the following known as the oldest phone hacking techniques used by hackers to make free calls?
1. Phreaking
2. Phishing
3. Cracking
4. Spraining
Answer: a
Explanation: Phreaking is considered as one of the oldest phone hacking techniques used by hackers to make free
calls.
1. John Draper
2. Kevin Mitnick
3. John von Neumann
4. Kevin Poulsen
Answer: d
Explanation: The SIPRNET (or Advanced Research Project Agency Network) system was first hacked by Kevin
Poulsen as he breaks into the Pentagon network.
Cyber security protects internet-connected systems including hardware, software, and program or data from cyber
attacks.
Information System
System resource:
o People:
Is specialist
Is end-user
o Software
o Data
o Network
System activity:
o Input
o Storage
o Processes
o Output
o Control and maintenance
Development of information systems:
The development of information systems is similar to the application development process. It has various approaches.
You can follow any of the following requirements.
1.
Identify the term which denotes that only authorized users are capable of accessing the information
Wrong Answer
Answer: B) The term which denotes that only authorized users are capable of accessing the information is known as
availability.
Real-Life Problems
Create My Plan
2.
State whether True or False: Data encryption is primarily used to ensure confidentiality.
Wrong Answer
3.
Identify the Debian-based OS which has 2 virtual machines and focuses on preserving users’ data.
Wrong Answer
Answer: C) Whonix has two virtual machines and focuses on preserving users’ data.
4.
Identify the oldest phone hacking technique used by hackers to make free calls.
Wrong Answer
Answer: B) Phreaking is the oldest phone hacking technique used by hackers to make free calls.
5.
Which of the following platforms is used for the safety and protection of information in the cloud?
Wrong Answer
Answer: B) Cloud workload protection platforms are used for the safety and protection of information in the cloud.
By
6.
Identify the type of attack which uses a fraudulent server with a relay address.
Wrong Answer
7.
Wrong Answer
Answer: D) The port used to connect to Active Directory in Windows 2000 is 389.
8.
Choose among the following techniques, which are used to hide information inside a picture.
Wrong Answer
9.
10.
Wrong Answer
11.
Which of the following is used for monitoring traffic and analyzing network flow?
Wrong Answer
Answer: C) Network traffic analysis is used for monitoring traffic and analyzing network flow.
12.
Wrong Answer
13.
Wrong Answer
14.
Wrong Answer
15.
Which software is mainly used to help users detect viruses and avoid them?
Wrong Answer
Answer: A) Antivirus is used to help users detect viruses and avoid them.
16.
Identify the term which denotes the violation of principle if the computer is no more accessible.
Wrong Answer
17.
Wrong Answer
18.
Wrong Answer
19.
Wrong Answer
20.
Wrong Answer
21.
Wrong Answer
22.
Wrong Answer
Wrong Answer
24.
Wrong Answer
25.
Wrong Answer
Answer: D) Both DVD Player and CSS are instances of open design and their documentation is publicly available.
26.
Wrong Answer
27.
Wrong Answer
28.
Identify the malware which does not replicate or clone through an infection?
Wrong Answer
29.
Wrong Answer
Wrong Answer
31.
Wrong Answer
32.
Wrong Answer
33.
Wrong Answer
34.
Wrong Answer
35.
Which of the following is used for encrypting data at the network level?
36.
Wrong Answer
37.
Identify the private search engine.
Wrong Answer
38.
Wrong Answer
39.
Identify the term among the following which is the first phase of ethical hacking.
Wrong Answer
40.
Wrong Answer
41.
Wrong Answer
42.
Identify the type of symmetric key algorithm which uses a streaming cipher to encrypt information.
Wrong Answer
43.
Identify the maximum character which Linux OS supports in its file names.
Wrong Answer
44.
Among the following, identify the one which does not need any host program and is independent.
Wrong Answer
Answer: A) Worm does not need any host program and is independent.
45.
Wrong Answer
46.
Wrong Answer
Answer: C) It is a type of unsolicited email which is generally sent in bulk to an indiscriminate recipient list for
commercial purposes.
47.
Which one of the following can be considered as the class of computer threats?
Wrong Answer
48.
Choose the default port number for Apache and other web servers.
Wrong Answer
49.
Wrong Answer
50.
Identify the element which is not considered in the triad, according to the CIA.
Wrong Answer
Wrong Answer
52.
Identify the term which denotes the protection of data from modification by unknown users.
Wrong Answer
Answer: C) The term which denotes the protection of data from modification by unknown users is known as integrity.
Cybersecurity is an evolving industry that highly requires skilled professionals. According to Glassdoor, the average
salary of a Cyber Security professional is £45,024. All Cyber Security professionals must undergo practice tests before
applying for any Cyber Security job roles. To prepare for getting into Cyber Security job roles, it is imperative to
understand the pattern of Cyber Security MCQs that appear in exams.
In this blog, we are giving you the top list of Cyber Security MCQs with answers to help you understand the format of
Cyber Security exams. This blog will take you through a set of MCQs on Cyber Security for beginner, intermediate, and
advanced levels with a list of the top 50 Cyber Security MCQs (Multiple Choice Questions) with answers. Read further
to learn more:
Table of Contents
5) Conclusion
According to the U.S. Bureau of Labor Statistics (BLS), the job outlook for Cybersecurity experts is favourable. With the
increasing number of cyber-attacks, the demand for Cybersecurity professionals has also increased. They play a pivotal
role in combatting cyber threats like phishing, malware, and spamming.
Organisations often choose individuals with particular skill sets and advanced certificates in cybersecurity. Taking
Cybersecurity certification exams is one of the best ways to broaden your employment options.
Let’s take a look at some of the beginner-level Cyber Security MCQ questions:
1) Which of these describes an ongoing pursuit by an individual/group?
a) Stalking
b) Identity theft
c) Phishing
d) Bulling
a) Soliciting
b) DoS attack
c) Phishing
d) Both A and B
3) Which of the following typically keeps tabs on every online activity the victim engages in, compiles all the data in the
background, and sends it to a third party?
a) Adware
b) Malware
c) Spyware
a) Kaspersky
b) Mcafee
c) Quick heal
5) Which of these scanners for ports and IP addresses is most used by users?
b) Ettercap
c) Snort
d) Angry IP Scanner
6) Which of the following phrases describes taking someone else's creation or idea and using it for one's own
advantage?
b) Piracy
c) Plagiarism
7) Which of the following describes investigating moral conduct concerning the digital media landscape?
a) Cyberethics
b) Cyber low
c) Cybersafety
d) Cybersecurity
a) True
b) False
c) It cannot be understood
d) None
a) Cracking
b) Spamming
c) Phreaking
d) Phishing
a) Confidentiality
b) Access control
c) Availability
a) Digital signature
b) Protocol
c) Message Digest
d) Decryption algorithm
a) Wireshark
b) Aircrack-ng
c) Norton
a) Null Scan
c) SYN Stealth
d) Cloud Scan
b) Antivirus Program
c) Video Editing Software
d) Computer Virus
15) Which of these was the first antivirus software ever created?
a) Reaper
b) Ray Tomlinson
c) Creeper
d) Tinkered
Cyber Security professionals must have a strong and good command over the key terms and skills essential to build
secure networks, diagnose, and resolve security issues. These questions are designed for an intermediate level to test
your knowledge of Cybersecurity concepts and techniques. Let’s go through some of the Cyber Security intermediate
MCQ questions given below:
1) What kind of malware does not replicate or clone itself through infection?
a) Rootkits
b) Worms
c) Viruses
d) Trojans
a) Hex
b) Binary
c) URL
d) IP
a) Cracking passwords
b) Covering tracks
c) Information gathering
5) Determine the attack type that employs a fake server with a relay address.
a) SMB
b) NetBIOS
c) NTLM
d) MITM
6) Pick one of the following methods for hiding information inside a picture:
a) Image Rendering
b) Steganography
c) Rootkits
d) Bitmapping
8) Which of these is the port number (default) for many web servers, including apache?
a) 80
b) 20
c) 87
d) 40
Answer: (a) 80
9) They are malicious hackers whose primary goal is to commit cybercrimes to make money. Who are "they" in this
context?
c) Hacktivists
a) IT Security Engineer
b) Security Auditor
12) The _______ of a network is assessed using the response and transit times.
a) Longevity
b) Performance
c) Reliability
d) Security
14) Which of the following Cyber Security principles limits how privileges are started whenever an object or subject is
created?
a) Open-Design
b) Fail-safe Defaults
c) Least privilege
15) Which of these conferences was the first one for hackers?
a) DEFCON
b) OSCON
c) SECTION
d) DEVON
Cyber Security is divided into several parts, out of which one part covers the beginner-level questions followed by the
intermediate-level and advanced level. The set of questions mentioned below focuses on the technical skills and
knowledge of Cyber Security advanced level questions:
a) Scalar test
b) Plain test
c) Complex test
d) None
a) WPA
b) WPA3
c) WEP
d) WPA2
Answer: c) WEP
4) Which of the items listed below is the least strong security protocol?
a) SFTP
b) SSL
c) SMTP
d) HTTPS
Answer: c) SMTP
a) IPSec
b) S/MIME
c) SMTP
d) HTTPS
a) Bing
b) Google
c) Yahoo
d) Duckduckgo
8) Choose the phrase from the list below that best describes the initial stage of ethical hacking.
a) Footprinting
b) ARP Poisoning
c) DNS Poisoning
d) Enumeration
10) Determine the kind of symmetric key algorithm that encrypts data using a streaming cypher.
a) Blowfish
b) MD5
c) RC4
d) SHA
Answer: c) RC4
11) Determine the number of characters the Linux OS will allow in file names.
a) 64
b) 256
c) 128
d) 32
12) Choose the one that is autonomous and does not require a host program from the list below:
a) Trap door
b) Trojan horse
c) Virus
d) Worm
a) Hex
b) IP
c) Binary
d) URL
Answer: (b) IP
Conclusion
We hope this blog gives you a clear understanding of the format and pattern of Cyber Security MCQs in exams. These
Cyber Security MCQ questions and answers are also helpful to crack practice tests and entry-level exams. It is highly
recommended to stay updated with the latest changes and Scope of Cyber Security for better employment prospects.
Cyber Security MCQs: This section contains multiple-choice questions and answers on Cyber Security. Practice these
MCQs to learn and enhance your knowledge of Cyber Security. These questions are designed by the subject experts
which are helpful for the students and professionals to prepare for the different types of interviews and exams. Each
question has multiple choices, you have to guess the correct answer. The answers for all Cyber Security MCQs are
given below the question with detailed explanations.
Explanation:
The primary goal of cybersecurity is to provide confidentiality, integrity, and authentication, which are commonly referred
to as the CIA Triad in information security.
Explanation:
Cyber threats encompass various types of malicious activities carried out by cybercriminals and hackers such as
viruses, worms, ransomware), phishing, social engineering, and denial-of-service (DoS) attacks.
3. The process of encoding data to protect it from unauthorized access is known as ____.
A. Encryption
B. Firewall
C. Intrusion Detection
D. Multi-factor Authentication
Answer: A) Encryption
Explanation:
Encryption is a process of converting plain, readable data (plaintext) into an unreadable form (ciphertext) using an
algorithm and a cryptographic key.
4. Which of the following options best defines an attack vector in terms of cyber security?
Answer: C) A method or avenue used by cyber threats to gain unauthorized access to a system or network.
Explanation:
An attack vector in the context of cybersecurity refers to the method or avenue through which cyber threats, such as
hackers or malicious actors, gain unauthorized access to a system, network, or application.
Explanation:
Firewalls are hardware or software-based security barriers that control incoming and outgoing network traffic.
6. Which of the following options correctly identifies the two primary types of encryption used in cybersecurity?
Explanation:
The process of encoding data to protect it from unauthorized access is known as encryption. There are two primary
types of encryption: symmetric encryption and asymmetric encryption.
Explanation:
Phishing is a cyber-attack where the attacker attempts to deceive individuals into revealing sensitive information, such
as login credentials, credit card numbers, or other personal data.
A. Malfunctioning Software
B. Malicious Firmware
C. Malfunctioning Hardware
D. Malicious Software
Explanation:
The term "malware" stands for "malicious software." Malware refers to any type of software or code that is specifically
designed to harm, exploit, or gain unauthorized access to computer systems, networks, or user devices.
Explanation:
The Stuxnet attack is an example of a cyber-attack on physical infrastructure. The worm used in this attack was
designed to infiltrate and manipulate Programmable Logic Controllers (PLCs) used in centrifuges to enrich uranium.
Explanation:
The term "VPN" stands for Virtual Private Network. A VPN is a secure and encrypted network connection that allows
users to access the Internet or other private networks securely over a public network (usually the Internet).
11. Amongst which of the following shows the importance of regular data backups in cyber security?
Explanation:
Regular data backups are important in cybersecurity for prevention against data loss, ransomware, cyber-attacks,
disaster recovery, etc.
Explanation:
Phishing attack is a common type of social engineering attack. The goal of the phishing attack is to trick recipients into
revealing sensitive information, such as login credentials, personal data, or financial details.
13. Which of the following is not a typical source of data leakage threats?
A. Phishing attacks
B. Insider threats
C. Antivirus software
D. Unsecured Wi-Fi networks
Explanation:
Antivirus software is not a typical source of data leakage threats. In fact, antivirus software is designed to protect against
data leakage.
14. Amongst which of the following is not an example of physical data leakage?
A. Printer
B. Using weak passwords for online accounts
C. Dumpster diving
D. Shoulder surfing
Explanation:
Physical data leakage refers to the unauthorized disclosure or exposure of sensitive data in a physical form. It involves
the cases where physical items, such as documents, storage devices, or hardware, containing sensitive information are
mishandled or lost.
15. Safeguarding the data from unauthorized modification by unknown users is known as ____.
A. Integrity
B. Confidentiality
C. Availability
D. Authenticity
Answer: A) Integrity
Explanation:
Data Integrity refers to the security principle of ensuring that data remains accurate, unaltered, and trustworthy
throughout its entire life cycle.
When integrity is lacking in a system, data breaches and unauthorized access becomes significant risks.
17. Which one of the following is a common way to maintain data availability?
A. Data Encryption
B. Regular Data Backups
C. Intrusion Detection Systems
D. Multi-factor Authentication
Explanation:
Maintaining data availability is essential to ensure that data is accessible when needed and remains available to
authorized users. One common way to achieve data availability is through regular data backups.
Explanation:
Vulnerability refers to a weakness or flaw in a system, network, software, or application that makes it susceptible to
exploitation by potential threats or attackers.
Answer: D) A type of cyber-attack that manipulates human psychology to deceive individuals and gain unauthorized
access.
Explanation:
Social engineering is a type of cyber-attack that relies on manipulating human psychology and behavior to deceive
individuals into revealing sensitive information, providing unauthorized access, or performing certain actions that
compromise security.
20. What does the letter "A" stand for in the CIA triad of cybersecurity?
A. Authorization
B. Accessibility
C. Authentication
D. Anonymity
Answer: C) Authentication
Explanation:
Authentication, represented by the letter "A," it is a crucial component of the CIA triad. It refers to the process of
verifying the identity of users, systems, or entities attempting to access resources.
21. Which type of encryption uses the same key for both encryption and decryption?
A. Symmetric encryption
B. Asymmetric encryption
C. Hybrid encryption
D. Public-key encryption
Explanation:
In symmetric encryption, the same secret key is used for both encryption and decryption of data.
Explanation:
PGP stands for Pretty Good Privacy, and it is primarily used for encrypting and decrypting email messages. PGP is a
widely used encryption software that provides a high level of security and is used for encrypting and decrypting email
messages.
23. Which of the following encryption standard is used to secure Internet communications?
Explanation:
AES is widely used to secure sensitive data transmitted over the internet, such as online transactions, communication
between web browsers and servers (HTTPS), and securing data stored in databases and cloud services.
24. The process of converting ciphertext back into its original plaintext is known as ____.
A. Encryption
B. Decryption
C. Phishing
D. Hashing
Answer: B) Decryption
Explanation:
Decryption is the reverse operation of encryption, which scrambles the plaintext to make it unintelligible to unauthorized
users during transmission or storage.
25. Which key is kept private and known only to the owner in public-key encryption?
A. Public key
B. Secret key
C. Private key
D. Shared key
Explanation:
In public-key encryption (also known as asymmetric encryption), a pair of mathematically related keys are used: a public
key and a private key.
Explanation:
SQL injection is a type of cyber-attack that targets web applications with poorly sanitized input fields. It is a widespread
and critical vulnerability that occurs when an attacker can manipulate or inject malicious SQL (Structured Query
Language) code into the input fields of a w
Explanation:
Spear-phishing is a variation of phishing that targets specific individuals or a particular organization. Unlike traditional
phishing attacks that cast a wide net to target many potential victims, spear phishing is highly targeted and
personalized.
A. Denial of Software
B. Distributed Online Security
C. Data Overload Strike
D. Denial of Service
Explanation:
Denial of Service (DoS) is a type of cyber-attack that aims to make a service, network, or website unavailable to its
legitimate users by overwhelming it with a large volume of traffic or requests.
29. Which of the following uses a combination of symmetric and asymmetric encryption?
Explanation:
PGP (Pretty Good Privacy) is a cryptographic encryption and decryption program that uses a combination of both
symmetric and asymmetric encryption algorithms to provide secure and private communication.
Explanation:
The purpose of a man-in-the-middle attack is to intercept and tamper with the communication between two parties who
believe they are directly communicating with each other.
31. A cryptographic value that is generated by combining a secret key with a message is known as ____.
A. Digital Signature
B. Encryption Key
C. Message Authentication Code (MAC)
D. Public Key
Explanation:
A Message Authentication Code (MAC) is a cryptographic value that is generated by combining a secret key with a
message to ensure message integrity and authentication.
Answer: C) By creating a hash of the message and encrypting it with a public key.
Explanation:
A digital signature is created using a process that involves cryptographic techniques to ensure the authenticity, integrity,
and non-repudiation of a digital message or document.
33. Which of the following options is TRUE about Message Authentication Code (MAC)?
A. It should be easy to generate a MAC value from the message and key
B. The same MAC value should be generated for two different messages with the same key
C. The MAC value should be long and complex for better security
D. It should be possible to derive the original message from the MAC value
Answer: A) It should be easy to generate a MAC value from the message and key.
Explanation:
MACs are designed to be efficiently computable; it should be easy and quick to generate the MAC value from the input
message and the shared secret key.
Explanation:
Digital signatures are cryptographic mechanisms used to provide assurance regarding the authenticity, integrity, and
non-repudiation of digital messages or documents.
A. Authenticate the identity of the server and encrypt data during transmission
B. Authenticate the identity of the client and encrypt data during transmission
C. Identify potential cyber threats in the network
D. Filter and block malicious websites
Answer: A) Authenticate the identity of the server and encrypt data during transmission.
Explanation:
The purpose of an SSL (Secure Sockets Layer) certificate is to authenticate the identity of the server and encrypt data
during transmission.
Explanation:
TLS 1.3, the latest version of the TLS protocol, was standardized in August 2018 and offers significant improvements in
security and performance. It provides stronger encryption algorithms, enhances forward secrecy, reduces handshake
latency, and removes outdated and vulnerable features present in previous versions.
Explanation:
The concept of defense in depth is based on the principle that no single security measure can provide complete
protection against all possible threats and vulnerabilities. By employing multiple layers, even if one layer is breached,
other layers can still provide protection.
A. Firewalls
B. Antivirus software
C. Biometric authentication
D. Encryption
Explanation:
Biometric authentication is an example of a physical security control as it involves using unique physical characteristics
of individuals to verify their identity.
Explanation:
Insider threats can come from current or former employees, contractors, business partners, or anyone with legitimate
access to sensitive information or critical infrastructure.
40. Which of the following is a type of antivirus program?
A. Quick heal
B. McAfee
C. Kaspersky
D. All of the above
Explanation:
Antivirus software is designed to detect, prevent, and remove malware (such as viruses, worms, Trojans, and other
malicious software) from computer systems and networks. All the listed programs are anti-virus programs.
Answer: B) Ethical guidelines and principles for using computers and technology responsibly.
Explanation:
Cyber ethics seeks to address the moral dilemmas and ethical challenges that arise in cyberspace, where technology
intersects with human interaction and information exchange.
42. A decoy system or network designed to attract and monitor unauthorized access attempts is known as ____.
A. Honeypot
B. Firewall
C. Encryption
D. Intrusion Detection System (IDS)
Answer: A) Honeypot
Explanation:
A honeypot is a decoy or trap set up by cybersecurity professionals to attract and monitor cyber attackers. It is a
simulated system or network designed to appear as a legitimate target with valuable data or resources.
A. DoS
B. AES
C. Man-in-middle
D. Malware
Answer: B) AES
Explanation:
AES (Advanced Encryption Standard) is not a cyber threat; rather, it is a cryptographic algorithm used to secure and
encrypt data.
44. What are Botnets?
Answer: C) Groups of interconnected computers controlled by a malicious actor perform coordinated cyberattacks.
Explanation:
A botnet is a network of compromised computers, also known as "bots" or "zombies," that are under the control of a
malicious actor, often referred to as the "botmaster" or "bot herder."
Explanation:
To achieve its goal effectively, a honeypot typically stores fake or simulated data that mimics a real system. This data
can include fabricated user accounts, non-sensitive information, and system logs that appear genuine.
46. In which layer, vulnerabilities are directly associated with physical access to networks and hardware?
A. Physical
B. Data-link
C. Network
D. Application
Answer: A) Physical
Explanation:
Vulnerabilities at the physical layer could include unauthorized physical access to network devices or hardware, such as
routers, switches, servers, and cabling.
A. HTTP
B. SSL
C. TCP
D. UDP
Answer: B) SSL
Explanation:
SSL can be used as a component in some VPN implementations to provide secure communications.
48. Which type of cyberattack directly impacts data integrity?
A. Phishing attacks
B. Ransomware attacks
C. Distributed Denial of Service (DDoS) attacks
D. Man-in-the-Middle (MitM) attacks
Explanation:
Since ransomware encrypts the victim's data, it directly impacts data integrity by making the data unusable and
inaccessible to the owner.
A. PPTP
B. SSL
C. HTTPS
D. L2TP/IPsec
Answer: C) HTTPS
Explanation:
HTTPS is not a VPN protocol but rather an extension of HTTP. It is used to secure data transmission between a user's
web browser and a website server.
50. Which of the following best describes the role of a Security Operations Center (SOC) in the field of cybersecurity?
Answer: C) A centralized unit that monitors, detects, and responds to security incidents in real time.
Explanation:
The SOC's primary role is to detect security breaches, respond to incidents promptly, and mitigate cyber threats to
ensure the organization's data and systems remain secure
Cyber Security
MCQs on " Cyber Security": Find the multiple choice questions on " Cyber Security", frequently asked for all competitive
examinations.
The technique of protecting laptops, websites, mobile platforms, communications devices, networking, and data from
hostile intrusions is known as cyber security. Today, someone can send or receive any source of data, whether it’s
videos, or mail, in just one click, but has he ever wondered how secure this information is conveyed to another person
with no data leakage? Cybersecurity is the appropriate answer. Today more than 61% of full industry exchanges are
done on the internet, so this for the area is a prerequisite for high-quality security for direct and best exchanges. Thus,
cybersecurity has become the most recent issue (Dervojeda et al., 2014). More than two-thirds of whole market
transactions are now conducted through online mode, demanding a degree of security for straight and best transactions
in this field. As a result, cybersecurity has recently become a major topic.
1.
1. Against Malware
2. Against cyber-terrorists
3. Defends a device from threat.
4. All mentioned options
Answer: D
1.
1. Robert
2. August Kerckhoffs
3. Bob Thomas
4. Charles
Answer: B
1.
1. Cloud Security
2. Application Security
3. Cloud Security
4. All options mentioned above
Answer: D
1. refusal of service
2. Man in the middle
3. Phishing
4. AES
Answer: D (AES stands for Advanced Encryption Standard) safeguards data by encoding it)
Answer: A
6. Who coined the term “ Cyberspace”?
1.
1. William Gibson
2. Andrew Tannenbaum
3. Scott Fahlman
4. Richard Stallman
Answer: A
7. Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive
or obtain more traffic?
1. Pharming
2. Mimicking
3. Spamming
4. Website-Duplication
Answer: A ( Pharming is a method and technique used by cybercriminals to deceive people by creating fake websites
and domains)
8. Which of the below is a popular victim of cyber attackers looking to gain the IP address of a target or victim user?
1. emails
2. websites
3. IP tracer
4. web pages
Answer: B
Answer: B
10. An act to injure, corrupt, or threaten a system or network is characterised as which of the below?
1. Digital crime
2. Threats
3. System hijacking
4. Cyber Attack
Answer: D
12. Which of the below is an internet fraud in which a consumer is digitally persuaded to reveal personal data by
cybercriminals?
1. MiTM attack
2. Phishing attack
3. Website attack
4. DoS attack
Answer: B
1. WPA3
2. WPA2
3. WPA
4. WEP
Answer: D ( WEP stands for wired Equivalent Privacy. It is a most insecure encrypted protocol)
14. Which of the below measures can help reduce the risk of data leakage?
1. Steganography
2. Chorography
3. Cryptography
4. Authentication
15. This is the concept for guiding information security policy within a corporation, firm, or organisation. What exactly is
“this” in this context?
1. Confidentiality
2. Non-repudiation
3. CIA Triad
4. Authenticity
Answer: C (CIA Triad is the most popular and frequently used approach, focusing on the confidentiality of information)
16. ___________ means the security of data from tampering by unidentified users.
1. Confidentiality
2. Integrity
3. Authentication
4. Non-repudiation
Answer: B
17. Which of the below implemented is not a good means of safeguarding privacy?
1. Biometric verification
2. ID and password-based verification
3. 2-factor authentication
4. switching off the phone
Answer: D
18. When ____ and ____ are in charge of data, the integrity of the data is imperilled?
Answer: C
19. The authenticity and security of data travelling over a network are ensured by?
1. Firewall
2. Antivirus
3. Pentesting Tools
4. Network-security protocols
Answer: D ( Network-security protocols govern the procedures and processes used to protect network data against
illegal content collection)
20. _________ creates an isolated passage across a public network that enables computing devices to communicate
and receive data discreetly as though they were directly linked to the private network.
Answer: D
21. ___________ is one of the safest Linux operating systems, offering invisibility and an incognito mode to protect user
data.
1. Fedora
2. Tails
3. Ubuntu
4. OpenSUSE
Answer: B
1. Web services
2. phishing
3. Directory service
4. worms
Answer: C (A directory service is the following system of software and protocols that keep track of knowledge about the
company, clients, or sometimes both)
Answer: C
1. DNS poisoning
2. Footprinting
3. ARP-poisoning
4. Enumeration
Answer: B ( In this Phase, The attacker attempts to find as many attack vectors as he can, reconnaissance is another
term for footprinting)
1. Dos Attack
2. Phishing
3. Soliciting
4. Both A and C
Answer: A ( A denial of service attack is referred to as a dos attack, it’s a type of cyber-attack in which someone tries to
prevent a machine from serving its intended consumers)
26. In system hacking, which of the below is the most crucial activity?
1. Information gathering
2. Covering tracks
3. Cracking passwords
4. None of the above
Answer: C
27. When the number of users surpasses the network’s capacity, which of the below network factors suffers the most?
1. Reliability
2. Performance
3. Security
4. Longevity
Answer: D
28. Which of the below cyber security principles states that the security system should be as compact and
straightforward as possible?
1. Open-design
2. The economy of the Mechanism
3. Least privilege
4. Fail-safe Defaults
Answer: B
29. Which of the below malware types permits the hackers to access administrative controls and do nearly everything
he wants with the infected systems?
1. RATs
2. Worms
3. Rootkits
4. Botnets
Answer: A ( RATs stands for Remote Access Trojans which gives the attacker administrative power over your device,
just as if they had physical access)
30. The first hacker’s conference was held in which of the below locations?
1. OSCON
2. DEVON
3. DEFCON
4. SECTION
Answer: C ( DEFCON is one of the most well-known and biggest hackers and security consultant conferences in the
world. It’s often conducted in Las Vegas, Nevada, once a year)
31. When any IT device, service, or system requires security checks, the term “security testing” is employed.?
1. Threat
2. Vulnerability
3. Objective of evaluation
4. Attack
Answer: C ( When any IT system, device, or platform requires assessment for safety purposes or to address any faults
after being evaluated by security researchers, the term “objective of evaluation” is used)
32. Which of the below is used to analyse network flow and monitor traffic?
Answer: C
33. Which of the below is a method of gaining access to a computer program or an entire computer system while
circumventing all security measures?
1. Backdoor
2. Masquerading
3. Phishing
4. Trojan Horse
Answer: Backdoor ( A backdoor is a sort of malware that bypasses standard authentication mechanisms to gain access
to a system)
34. The term “protection from ______of source code” refers to limiting access to the source code to just authorised
individuals.
1. disclosure
2. alteration
3. destruction
4. log of changes
Answer: C
35. _______________ are programmes or procedures that enable hackers to maintain control of a computer system.?
1. Exploits
2. Antivirus
3. Firewall by-passers
4. Worms
Answer: A ( Exploits are programs or algorithms that allow hackers to gain total control of a computer system)
1. BYJU'S GATE
2. GATE
3. GATE Study Material
4. Mcqs
5. Cyber Security Mcqs
Cyber security is the protection of systems, programmes, networks, devices, and data from cyber attacks with the help
of technology and processes. Its primary aim is to reduce cyber attacks and protect systems, networks, and
technologies from unauthorised exploitation.
Solve Cyber Security Multiple-Choice Questions to prepare better for GATE. If you wish to learn more about Cyber
Security and Cyber Security MCQs, you can check notes, mock tests, and previous years’ question papers. Gauge the
pattern of MCQs on Cyber Security by solving the ones that we have compiled below for your practice:
1. In which of these a person is continually chased/followed by another person or a group of various people?
a. Identity theft
b. Stalking
c. Bullying
d. Phishing
a. Kaspersky
b. Quick heal
c. Mcafee
3. A ____________ can be a hardware device or a software program that filters all the packets of data that comes
through a network, the internet, etc.
a. Firewall
b. Antivirus
c. Malware
d. Cookies
4. Which of these would refer to the exploration of the apt, ethical behaviours that are related to the digital media
platform and online environment?
a. Cybersecurity
b. Cybersafety
c. Cyberethics
d. Cyber low
a. Message Digest
b. Protocol
c. Decryption algorithm
d. Digital signature
6. Which of these ports and IP address scanners is popular among the users?
a. Ettercap
b. Snort
c. Angry IP Scanner
a. Null Scan
c. SYN Stealth
d. Cloud Scan
b. Computer Virus
d. Antivirus Program
a. Badware
b. Malicious Ware
c. Malware
d. Ilegalware
10. We use the transit time and the response time to measure a network’s ___________.
a. Reliability
b. Performance
c. Longevity
d. Security
a. Tinkered
b. Creeper
c. Ray Tomlinson
d. Reaper
12. The Hacker who did break the SIPRNET system is ___________.
a. Kevin Poulsen
c. Kevin Mitnick
d. John Draper
13. Using the cipher algorithm, which of these types of text would be transformed?
a. Plain text
b. Scalar text
c. Complex text
d. Transformed text
14. Which of the following malware types does not clone or replicate itself through infection?
a. Viruses
b. Worms
c. Trojans
d. Rootkits
15. The DNS would translate any Domain name into ___________.
a. IP
b. URL
c. Binary
d. Hex
16. Which of these is usually referred to as the port number (default) of several web servers like apache?
a. 40
b. 20
c. 87
d. 80
Answer: (d) 80
17. Which of these is a sort of independent type of malicious program that would not require any host program?
a. Virus
b. Trap Door
c. Worm
d. Trojan Horse
a. Confidentiality
b. Availability
c. Integrity
d. Authenticity
19. Which of these is the oldest techniques used by hackers for phone hacking to make free calls?
a. Phishing
b. Phreaking
c. Spraining
d. Cracking
a. DEFCON
b. OSCON
c. SECTION
d. DEVON
Answer: (a) DEFCON
1. Cyber Security provide security against what? 1. Against Malware 2. Against cyber-terrorists 3. Defends a device
from threat. 4. All mentioned options Answer: D 2. Who is popularly known as the father of cyber security? 1. Robert 2.
August Kerckhoffs 3. Bob Thomas 4. Charles Answer: B 3. Which of the below is a kind of cyber security? 1. Cloud
Security 2. Application Security 3. Cloud Security 4. All options mentioned above Answer: D 4. Which of the below does
not constitute a cybercrime? 1. refusal of service 2. Man in the middle 3. Phishing 4. AES Answer: D (AES stands for
Advanced Encryption Standard) safeguards data by encoding it) 5. Which of the below benefits of cyber security is not
true? 1. System getting slower 2. Computer lagging and crashes 3. provide privacy to users 4. Secures system against
viruses
Answer: A 6. Who coined the term " Cyberspace"? 1. William Gibson 2. Andrew Tannenbaum 3. Scott Fahlman 4.
Richard Stallman Answer: A 7. Which of the below is a hacking technique in which cybercriminals create fictitious web
pages or domains to deceive or obtain more traffic? 1. Pharming 2. Mimicking 3. Spamming 4. Website-Duplication
Answer: A (Pharming is a method and technique used by cybercriminals to deceive people by creating fake websites
and domains) 8. Which of the below is a popular victim of cyber attackers looking to gain the IP address of a target or
victim user? 1. emails 2. websites 3. IP tracer 4. web pages Answer: B 9. Which of the below does not qualify as a form
of peer-to-peer cybercrime? 1. Trojans are implanted into a targeted device. 2. On the deep web, payment information is
leaked. 3. mm 4. Phishing Answer: B 10. An act to injure, corrupt, or threaten a system or network is characterised as
which of the below?
1. Digital crime 2. Threats 3. System hijacking 4. Cyber Attack Answer: D 11. Any company or agency's IT protection is
managed and maintained by? 1. Software Security Specialist 2. CEO of the organisation 3. Security Auditor 4. IT
Security Engineer Answer: D (This is a profession in which a professional develops and maintains various systems and
security devices for the firm or organisation) 12. Which of the below is an internet fraud in which a consumer is digitally
persuaded to reveal personal data by cybercriminals? 1. MiTM attack 2. Phishing attack 3. Website attack 4. DoS attack
Answer: B 13. Which of the below security encryption standards is the weakest? 1. WPA3 2. WPA2 3. WPA 4. WEP
Answer: D (WEP stands for wired Equivalent Privacy. It is a most insecure encrypted protocol) 14. Which of the below
measures can help reduce the risk of data leakage? 1. Steganography 2. Chorography 3. Cryptography 4.
Authentication
Answer: A (Steganography functions as concealing information in a non-suspicious manner) 15. This is the concept for
guiding information security policy within a corporation, firm, or organisation. What exactly is "this" in this context? 1.
Confidentiality 2. Non-repudiation 3. CIA Triad 4. Authenticity Answer: C (CIA Triad is the most popular and frequently
used approach, focusing on the confidentiality of information) 16. ___________ means the security of data from
tampering by unidentified users. 1. Confidentiality 2. Integrity 3. Authentication 4. Non-repudiation Answer: B 17. Which
of the below implemented is not a good means of safeguarding privacy? 1. Biometric verification 2. ID and password-
based verification 3. 2-factor authentication 4. switching off the phone Answer: D 18. When ____ and ____ are in
charge of data, the integrity of the data is imperilled? 1. Access control, file deletion 2. Network, file permission 3.
Access control, file permission 4. Network, system Answer: C 19. The authenticity and security of data travelling over a
network are ensured by? 1. Firewall
2. Antivirus 3. Pentesting Tools 4. Network-security protocols Answer: D (Network-security protocols govern the
procedures and processes used to protect network data against illegal content collection) 20. _________ creates an
isolated passage across a public network that enables computing devices to communicate and receive data discreetly
as though they were directly linked to the private network. 1. Visual Private Network 2. Virtual Protocol Network 3.
Virtual Protocol Networking 4. Virtual Private Network Answer: D 21. ___________ is one of the safest Linux operating
systems, offering invisibility and an incognito mode to protect user data. 1. Fedora 2. Tails 3. Ubuntu 4. OpenSUSE
Answer: B 22. What is a single entrance for multiple connectivities called? 1. Web services 2. phishing 3. Directory
service 4. worms Answer: C (A directory service is the following system of software and protocols that keep track of
knowledge about the company, clients, or sometimes both) 23. Circuit-level gateway firewalls have which of the below
disadvantages? 1. They're expensive 2. They're complex in architecture 3. They do not filter individual packets
4. They're complex to setup Answer: C 24. The initial phase of ethical hacking is? 1. DNS poisoning 2. Footprinting 3.
ARP-poisoning 4. Enumeration Answer: B (In this Phase, The attacker attempts to find as many attack vectors as he
can, reconnaissance is another term for footprinting) 25. Which of the below can be classified as a type of computer
threat? 1. Dos Attack 2. Phishing 3. Soliciting 4. Both A and C Answer: A (A denial of service attack is referred to as a
dos attack, it's a type of cyber-attack in which someone tries to prevent a machine from serving its intended consumers)
26. In system hacking, which of the below is the most crucial activity? 1. Information gathering 2. Covering tracks 3.
Cracking passwords 4. None of the above Answer: C 27. When the number of users surpasses the network's capacity,
which of the below network factors suffers the most? 1. Reliability 2. Performance 3. Security 4. Longevity Answer: D
28. Which of the below cyber security principles states that the security system should be as compact and
straightforward as possible? 1. Open-design 2. The economy of the Mechanism 3. Least privilege 4. Fail-safe Defaults
Answer: B 29. Which of the below malware types permits the hackers to access administrative controls and do nearly
everything he wants with the infected systems? 1. RATs 2. Worms 3. Rootkits 4. Botnets Answer: A (RATs stands for
Remote Access Trojans which gives the attacker administrative power over your device, just as if they had physical
access) 30. The first hacker's conference was held in which of the below locations? 1. OSCON 2. DEVON 3. DEFCON
4. SECTION Answer: C (DEFCON is one of the most well-known and biggest hackers and security consultant
conferences in the world. It's often conducted in Las Vegas, Nevada, once a year) 31. When any IT device, service, or
system requires security checks, the term "security testing" is employed? 1. Threat 2. Vulnerability 3. Objective of
evaluation 4. Attack Answer: C (When any IT system, device, or platform requires assessment for safety purposes or to
address any faults after being evaluated by security researchers, the term "objective of evaluation" is used)
32. Which of the below is used to analyse network flow and monitor traffic? 1. Managed detection and response 2.
Cloud access security broker 3. Network traffic analysis 4. Network traffic analysis Answer: C 33. Which of the below is
a method of gaining access to a computer program or an entire computer system while circumventing all security
measures? 1. Backdoor 2. Masquerading 3. Phishing 4. Trojan Horse Answer: Backdoor (A backdoor is a sort of
malware that bypasses standard authentication mechanisms to gain access to a system) 34. The term "protection from
______of source code" refers to limiting access to the source code to just authorised individuals. 1. disclosure 2.
alteration 3. destruction 4. log of changes Answer: C 35. _______________ are programmes or procedures that enable
hackers to maintain control of a computer system? 5. Exploits 6. Antivirus 7. Firewall by-passers 8. Worms Answer: A
(Exploits are programs or algorithms that allow hackers to gain total control of a computer system)
1. In which of these a person is continually chased/followed by another person or a group of various people? a. Identity
theft b. Stalking c. Bullying d. Phishing Answer: (b) Stalking 2. Which of these is an antivirus program type? a.
Kaspersky b. Quick heal c. Mcafee d. All of the above Answer: (d) All of the above 3. A ____________ can be a
hardware device or a software program that filters all the packets of data that comes through a network, the internet,
etc. a. Firewall b. Antivirus c. Malware d. Cookies Answer: (a) Firewall 4. Which of these would refer to the exploration
of the apt, ethical behaviours that are related to the digital media platform and online environment? a. Cybersecurity b.
Cybersafety c. Cyberethics d. Cyber low Answer: (c) Cyberethics 5. Which of these is a technique that is used to verify a
message's integrity? a. Message Digest b. Protocol c. Decryption algorithm d. Digital signature Answer: (a) Message
Digest 6. Which of these ports and IP address scanners is popular among the users? a. Ettercap b. Snort c. Angry IP
Scanner
d. Cain and Abel Answer: (c) Angry IP Scanner 7. Which of these is NOT a scanning type? a. Null Scan b. Xmas Tree
Scan c. SYN Stealth d. Cloud Scan Answer: (d) Cloud Scan 8. The Code Red is a sort of a ___________. a. Video
Editing Software b. Computer Virus c. Photo Editing Software d. Antivirus Program Answer: (b) Computer Virus 9.
Which of these is also malicious software? a. Badware b. Malicious Ware c. Malware d. Ilegalware Answer: (c) Malware
10. We use the transit time and the response time to measure a network's ___________. a. Reliability b. Performance c.
Longevity d. Security Answer: (b) Performance 11. Which of these is the world's very first antivirus program? a. Tinkered
b. Creeper c. Ray Tomlinson d. Reaper Answer: (d) Reaper 12. The Hacker who did break the SIPRNET system is
___________. a. Kevin Poulsen b. John von Neumann
c. Kevin Mitnick d. John Draper Answer: (a) Kevin Poulsen 13. Using the cipher algorithm, which of these types of text
would be transformed? a. Plain text b. Scalar text c. Complex text d. Transformed text Answer: (a) Plain text 14. Which
of the following malware types does not clone or replicate itself through infection? a. Viruses b. Worms c. Trojans d.
Rootkits Answer: (c) Trojans 15. The DNS would translate any Domain name into ___________. a. IP b. URL c. Binary
d. Hex Answer: (b) URL 16. Which of these is usually referred to as the port number (default) of several web servers like
apache? a. 40 b. 20 c. 87 d. 80 Answer: (d) 80 17. Which of these is a sort of independent type of malicious program
that would not require any host program? a. Virus b. Trap Door c. Worm d. Trojan Horse Answer: (c) Worm 18. Which of
these is NOT involved in the CIA Triad?
a. Confidentiality b. Availability c. Integrity d. Authenticity Answer: (d) Authenticity 19. Which of these is the oldest
techniques used by hackers for phone hacking to make free calls? a. Phishing b. Phreaking c. Spraining d. Cracking
Answer: (b) Phreaking 20. Which of these is the very first hacker's conference? a. DEFCON b. OSCON c. SECTION d.
DEVON Answer: (a) DEFCON
1. What is Cyber Security? a) Cyber Security provides security against malware b) Cyber Security provides security
against cyber-terrorists c) Cyber Security protects a system from cyber attacks d) All of the mentioned Answer: d
Explanation: Cyber Security provides security to a system against cyber-attacks by using various technologies, and
processes. 2. What does cyber security protect? a) Cyber security protects criminals b) Cyber security protects internet-
connected systems c) Cyber security protects hackers d) None of the mentioned Answer: a Explanation: It protects
internet-connected systems such as hardware, software, and data from cyber-attacks. It aims to reduce cyber attacks
against the system, network, and technologies by reducing unauthorized exploitation, vulnerability, and threats. 3. Who
is the father of computer security? a) August Kerckhoffs b) Bob Thomas c) Robert d) Charles Answer: a Explanation:
August Kerckhoffs, a linguist and German professor at HEC, wrote an essay in the Journal of Military Science in
February 1883. Kerckhoff had unwittingly established the foundations for contemporary encryption, earning him the title
of "Father of Computer Security." 4. Which of the following is defined as an attempt to steal, spy, damage or destroy
computer systems, networks, or their associated information? a) Cyber attack b) Computer security c) Cryptography d)
Digital hacking Answer: a Explanation: An effort to steal, spy on, damage, or destroy diverse components of
cyberspace, such as computer systems, related peripherals, network systems, and information, is known as a cyber
attack. 5. Which of the following is a type of cyber security? a) Cloud Security b) Network Security c) Application
Security d) All of the above Answer:d Explanation: Since technology is improving, the threat and attacks against the
technology are also increasing. Hence, to provide security, it is divided into the following types: Cloud Security: Provides
security for the data stored on the cloud. Network Security: Protects the internal network from threats. Application
Security: Protects data stored in the application software. advertisement 6. What are the features of cyber security? a)
Compliance b) Defense against internal threats c) Threat Prevention d) All of the above Answer: d Explanation: The
features are as follows: Compliance: Creating a program that meets the requirements and rules of the users. Defense
against internal threats: Should provide security against internal exploitation. Threat Prevention: Should be capable of
detecting the threat and preventing them. 7. Which of the following is an objective of network security? a) Confidentiality
b) Integrity c) Availability d) All of the above Answer: d Explanation: The objectives of network security are
Confidentiality, Integrity, and Availability. Confidentiality: The function of confidentiality is to keep sensitive company
information safe from unwanted access. The confidentiality component of network security ensures that data is only
accessible to those who are authorized to see it. Integrity: This goal entails ensuring and preserving data accuracy and
consistency. The purpose of integrity is to ensure that data is accurate and not tampered with by unauthorized
individuals. Availability: The purpose of availability in Network Security is to ensure that data, network resources, and
services are always available to legitimate users, whenever they need them. 8. Which of the following is not a
cybercrime? a) Denial of Service b) Man in the Middle c) Malware d) AES Answer: d Explanation: Denial of Service,
Man in the Middle, and Malware exploit the system causing a threat to security, hence they are considered as
cybercrime. AES (Advanced Encryption Standard) provides security by encrypting the data. 9. Which of the following is
a component of cyber security? a) Internet Of Things b) AI
c) Database d) Attacks Answer: a Explanation: The Internet of Things (IoT) is a network of physical objects embedded
with sensors, software, and other technologies to connect and exchange data with other devices and systems through
the internet. 10. Which of the following is a type of cyber attack? a) Phishing b) SQL Injections c) Password Attack d) All
of the above Answer: d Explanation: Attacks are Phishing, SQL Injections, and Password Attack. Phishing: The attacker
sends a large number of fraudulent emails and gains access to the system. SQL Injections: The attacker gains access
to the protected information by adding malicious code to the SQL server. Password Attack: Attackers gain access to the
passwords unethically and gain access to the confidential data. 11. Which of the following is not an advantage of cyber
security? a) Makes the system slower b) Minimizes computer freezing and crashes c) Gives privacy to users d) Protects
system against viruses Answer: a Explanation: The advantages are minimization of computer freezing and crashes,
user privacy, and protection against viruses, worms, etc. Disadvantages include the system becoming slow, configuring
firewalls correctly can be difficult, need to update the new software in order to keep security up to date. 12.
"Cyberspace" was coined by _________ a) Richard Stallman b) William Gibson c) Andrew Tannenbaum d) Scott
Fahlman Answer: b Explanation: William Gibson, an American-Canadian fiction pioneer, and coiner, examined the many
streams of technology and invented the word "cyberspace" in 1821. The phrase refers to linked technologies that aid in
information exchange, interaction with digital devices, storage and digital entertainment, computer and network security,
and other information technology-related matters. 13. In which year has hacking become a practical crime and a matter
of concern in the field of cyber technology? a) 1991 b) 1983 c) 1970
d) 1964 Answer: c Explanation: In the case of hackers in the 1970s, hackers and cyber thieves found out how wired
technologies operate and how they might be abused to obtain a competitive edge or misuse the technology. 14.
Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of
hackers are termed as _______ a) Nation / State sponsored hackers b) CIA triad c) Special Hackers d) Government
Hackers Answer: a Explanation: Nation / State-sponsored hackers are those who are engaged or paid by a nation's or
state's government to safeguard the country from cyber terrorists and other groups or individuals, as well as to expose
their plans, communications, and activities. 15. Which of the following act violates cyber security? a) Exploit b) Attack c)
Threat d) Vulnerability Answer: b Explanation: A threat is a possible danger that might lead to a security breach and
cause harm to the system or network. Vulnerability is a word that refers to a flaw in a network or system that might be
exploited by an attacker. Exploiting a security flaw might result in unexpected and unwanted effects. A cyber-attack is an
attempt by attackers to alter, delete, steal or expose any specific data by gaining unauthorized access. 16. Which of the
following actions compromise cyber security? a) Vulnerability b) Attack c) Threat d) Exploit Answer: c Explanation: A
threat is defined as a potential hazard that might result in a breach of security and cause harm to the system or network.
Vulnerability is a term that refers to a weakness in a network or system that an attacker may exploit. Exploiting a
weakness in security might have unintended and undesirable consequences. 17. Which of the following is the hacking
approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic? a) Pharming b)
Website-Duplication c) Mimicking d) Spamming Answer: a Explanation: Pharming is a strategy and approach used by
cybercriminals to create
phony web pages and sites in order to mislead users into giving over personal information such as login IDs and
passwords. 18. Which of the following is not a type of peer-to-peer cyber-crime? a) MiTM b) Injecting Trojans to a target
victim c) Credit card details leak in the deep web d) Phishing Answer: c Explanation: Peer-to-peer includes phishing, as
well as the distribution of Trojans and worms to individuals. The leakage of a huge number of people's credit card data
on the deep web, on the other hand, is classified as a computer-as-weapon cyber-crime. 19. A cyber-criminal or
penetration tester uses the additional data that stores certain special instructions in the memory for activities to break
the system in which of the following attack? a) Clickjacking b) Buffer-overflow c) Phishing d) MiTM Answer: b
Explanation: The excess data that contains certain specific instructions in the memory for actions are projected by a
cyber-criminal or penetration tester to break the system in a buffer-overflow attack. 20. Which of the following do Cyber
attackers commonly target for fetching IP address of a target or victim user? a) ip tracker b) emails c) websites d) web
pages Answer: c Explanation: Enumeration by cyber-attackers is also feasible via websites since attackers target
websites in order to obtain the victim's or target user's IP address. 21. Which of the following is defined as an attempt to
harm, damage or cause threat to a system or network? a) Digital crime b) Threats c) System hijacking d) Cyber Attack
Answer: d Explanation: Extortion, identity theft, email hacking, digital surveillance, stealing hardware, mobile hacking,
and physical security breaches are all examples of cyber assaults or activities. 22. They are nefarious hackers, and their
main motive is to gain financial profit by doing cyber crimes. Who are "they" referred to here? a) White Hat Hackers
b) Black Hat Hackers c) Hactivists d) Gray Hat Hackers Answer: b Explanation: Black Hat hackers, often known as
"crackers," are a sort of cyber crime that gain illegal access to a user's account or system in order to steal confidential
data or introduce malware into the system for personal gain or to harm the company. 23. IT security in any firm or
organization is maintained and handled by ____________________ a) Software Security Specialist b) CEO of the
organization c) Security Auditor d) IT Security Engineer Answer: d Explanation: This is a position in a company or
organisation where an individual develops and maintains different systems and security tools for the company or
organisation to which he or she belongs. 24. Where did the term "hacker" originate? a) MIT b) New York University c)
Harvard University d) Bell's Lab Answer: a Explanation: The term "hacker" was coined at MIT (Massachusetts Institute
of Technology) because individuals and highly competent professionals use computer languages to address various
challenges. In this context, labels such as geeks and nerds have been coined. 25. What is the existence of weakness in
a system or network is known as? a) Attack b) Exploit c) Vulnerability d) Threat Answer: c Explanation: Vulnerability is a
term that refers to a weakness in a network or system that an attacker may exploit. Exploiting a weakness in security
might have unintended and undesirable consequences. 26. Which of the following is an internet scam done by cyber-
criminals where the user is convinced digitally to provide confidential information. a) MiTM attack b) Phishing attack c)
Website attack d) DoS attack Answer: b Explanation: Phishing is a type of cybercrime in which a person is digitally
persuaded to
disclose private information. Phishing comes in a variety of forms. Some of them employ malware and emails to divert
users to various websites. 27. Which of the following is not a step followed by cyber-criminals in data breaching? a)
Exfiltration b) Research and info-gathering c) Attack the system d) Fixing the bugs Answer: d Explanation: During a
hack, cyber-criminals first do research on the target, gathering data about the victim's system and network. Then go
ahead and attack. Once the attacker has gained access, he or she takes sensitive information. 28. Which of the
following online service's privacy cannot be protected using Tor? a) Browsing data b) Instant messaging c) Login using
ID d) Relay chats Answer: c Explanation: Login using ID will obviously take your ID in order to access your account and
is not the headache of Tor. Privacy regarding instant messaging, browsing data, relay chats are some of the following
online services protected by Tor. 29. Which of the following term refers to a group of hackers who are both white and
black hat? a) Yellow Hat hackers b) Grey Hat hackers c) Red Hat Hackers d) White-Black Hat Hackers Answer: b
Explanation: Grey Hat Hackers are a hybrid of ethical and unethical hacker personalities. They hack other people's
computers for fun, but they don't hurt them, and they exploit network faults and vulnerabilities without the admin or
owner's awareness. 30. Which of the following is not an email-related hacking tool? a) Mail Password b) Email Finder
Pro c) Mail PassView d) Sendinc Answer: d Explanation: Sendinc is not a tool that compromises email data. It is used to
protect business email accounts and provides a fast web-based solution for businesses to start delivering secure
emails. The other three are email hacking tools. 30. Which of the following DDoS in mobile systems wait for the owner
to trigger the cyber attack? a) botnets b) programs c) virus
d) worms Answer: a Explanation: Botnets on infected mobile devices are waiting for orders from their owners. It starts a
DDoS flood attack after receiving the owner's instructions. As a result, calls are not connected or data is not sent. 31.
Which of the following is the least strong security encryption standard? a) WPA3 b) WPA2 c) WPA d) WEP Answer: d
Explanation: Wireless security is an important aspect of cyber-security. Wired Equivalent Privacy (WEP), Wi-Fi
Protected Access (WPA), WPA2, and WPA3 are the most common kinds of wireless security. WEP is a famously
insecure encryption protocol. 32. Which of the following is a Stuxnet? a) Trojan b) Antivirus c) Worm d) Virus Answer: c
Explanation: Stuxnet is a popular and powerful worm that came into existence in mid 2010, which was very powerful as
it was accountable for the cause of huge damage to Iran's Nuclear program. It mainly targets the PLCs (Programmable
Logic Controllers) in a system. 33. Which of the following ethical hacking technique is used for determining which
operating system (OS) is running on a remote computer? a) Operating System fingerprinting b) Operating System
penetration testing c) Digital-printing d) Machine printing Answer: a Explanation: OS fingerprinting is an ethical hacking
technique used for determining what operating system (OS) is running on a remote computer. OS Fingerprinting is the
practice of examining data packets that come from a network in order to extract intelligence that may be utilized in future
assaults. 34. Which of the following can diminish the chance of data leakage? a) Steganography b) Chorography c)
Cryptography d) Authentication Answer: a Explanation: Ordinary files are targeted by hackers or other cyber criminals in
order to
disguise distinct data or information within another data file. You can reduce the risk of data leaking by employing
steganography