Cybersecurity MCQ 200 Questions
Cybersecurity MCQ 200 Questions
Q1. Which of the following is a common threat to mobile apps? (Mobile App Security)
Data leakage
Phishing emails
Server overload
Unpatched desktops
Answer: A
Q2. What is the purpose of code obfuscation in mobile apps? (Mobile App Security)
Improve performance
Secure APIs
Encrypt database
Answer: C
Q3. Which technique is used to protect sensitive data in a database? (Database Security)
Indexing
Data mining
Data masking
Clustering
Answer: C
Q4. What type of attack targets database query execution? (Database Security)
DoS
SQL Injection
XSS
Phishing
Answer: B
Q5. Which is a secure coding practice? (Secure Coding Guidelines)
Hardcoding credentials
Sanitizing inputs
Disabling logs
Answer: B
Q6. Which guideline helps prevent buffer overflow? (Secure Coding Guidelines)
Avoid loops
Use strcpy
Input validation
Skip testing
Answer: C
Speed
Redundancy
Confidentiality
Usability
Answer: C
Integrity
Availability
Access control
Redundancy
Answer: C
Q9. What device is used to prevent unauthorized network access? (Network Security)
Router
Firewall
Switch
Repeater
Answer: B
FTP
HTTP
SSH
Telnet
Answer: C
RSA
AES
ECC
DSA
Answer: B
Encryption
Authentication
Integrity
Compression
Answer: C
OSI
STRIDE
TCP/IP
AES
Answer: B
Identify threats
Encrypt data
Answer: B
Man-in-the-middle
SQL Injection
Phishing
Keylogging
Answer: B
Answer: A
Q17. Which tool is used for web app security testing? (Security Assessment)
Wireshark
Burp Suite
Metasploit
Nmap
Answer: B
Fix code
Measure uptime
Develop UI
Answer: C
Network monitoring
Code compilation
Firewall setup
Answer: B
Q20. Which feature of Burp Suite captures HTTP requests? (Burp Suite)
Spider
Repeater
Proxy
Scanner
Answer: C
Q21. What does IAM ensure? (IAM (Identity and Access Management))
Software testing
Performance optimization
Answer: C
Multi-Factor Authentication
Mainframe Authentication
Answer: A
Physical hardware
Application configuration
Power supply
Cooling
Answer: B
Software as a Service
Security as a System
Script as a Source
Storage as a Service
Answer: A
Securing networks
Securing databases
Monitoring applications
Answer: B
Jenkins
Nmap
Metasploit
GNS3
Answer: A
Q27. Which of the following is a common threat to mobile apps? (Mobile App Security)
Data leakage
Phishing emails
Server overload
Unpatched desktops
Answer: A
Q28. What is the purpose of code obfuscation in mobile apps? (Mobile App Security)
Improve performance
Secure APIs
Encrypt database
Answer: C
Q29. Which technique is used to protect sensitive data in a database? (Database Security)
Indexing
Data mining
Data masking
Clustering
Answer: C
Q30. What type of attack targets database query execution? (Database Security)
DoS
SQL Injection
XSS
Phishing
Answer: B
Hardcoding credentials
Sanitizing inputs
Disabling logs
Answer: B
Q32. Which guideline helps prevent buffer overflow? (Secure Coding Guidelines)
Avoid loops
Use strcpy
Input validation
Skip testing
Answer: C
Speed
Redundancy
Confidentiality
Usability
Answer: C
Availability
Access control
Redundancy
Answer: C
Q35. What device is used to prevent unauthorized network access? (Network Security)
Router
Firewall
Switch
Repeater
Answer: B
FTP
HTTP
SSH
Telnet
Answer: C
RSA
AES
ECC
DSA
Answer: B
Encryption
Authentication
Integrity
Compression
Answer: C
OSI
STRIDE
TCP/IP
AES
Answer: B
Identify threats
Encrypt data
Answer: B
Man-in-the-middle
SQL Injection
Phishing
Keylogging
Answer: B
Answer: A
Q43. Which tool is used for web app security testing? (Security Assessment)
Wireshark
Burp Suite
Metasploit
Nmap
Answer: B
Fix code
Measure uptime
Develop UI
Answer: C
Network monitoring
Code compilation
Firewall setup
Answer: B
Q46. Which feature of Burp Suite captures HTTP requests? (Burp Suite)
Spider
Repeater
Proxy
Scanner
Answer: C
Q47. What does IAM ensure? (IAM (Identity and Access Management))
Software testing
Performance optimization
Database indexing
Answer: C
Multi-Factor Authentication
Mainframe Authentication
Answer: A
Physical hardware
Application configuration
Power supply
Cooling
Answer: B
Software as a Service
Security as a System
Script as a Source
Storage as a Service
Answer: A
Securing networks
Securing databases
Monitoring applications
Answer: B
Jenkins
Nmap
Metasploit
GNS3
Answer: A
Q53. Which of the following is a common threat to mobile apps? (Mobile App Security)
Data leakage
Phishing emails
Server overload
Unpatched desktops
Answer: A
Q54. What is the purpose of code obfuscation in mobile apps? (Mobile App Security)
Improve performance
Secure APIs
Encrypt database
Answer: C
Q55. Which technique is used to protect sensitive data in a database? (Database Security)
Indexing
Data mining
Data masking
Clustering
Answer: C
Q56. What type of attack targets database query execution? (Database Security)
DoS
SQL Injection
XSS
Phishing
Answer: B
Hardcoding credentials
Sanitizing inputs
Disabling logs
Answer: B
Q58. Which guideline helps prevent buffer overflow? (Secure Coding Guidelines)
Avoid loops
Use strcpy
Input validation
Skip testing
Answer: C
Redundancy
Confidentiality
Usability
Answer: C
Integrity
Availability
Access control
Redundancy
Answer: C
Q61. What device is used to prevent unauthorized network access? (Network Security)
Router
Firewall
Switch
Repeater
Answer: B
FTP
HTTP
SSH
Telnet
Answer: C
RSA
AES
ECC
DSA
Answer: B
Encryption
Authentication
Integrity
Compression
Answer: C
OSI
STRIDE
TCP/IP
AES
Answer: B
Identify threats
Encrypt data
Answer: B
Man-in-the-middle
SQL Injection
Phishing
Keylogging
Answer: B
Answer: A
Q69. Which tool is used for web app security testing? (Security Assessment)
Wireshark
Burp Suite
Metasploit
Nmap
Answer: B
Fix code
Measure uptime
Develop UI
Answer: C
Network monitoring
Code compilation
Firewall setup
Answer: B
Q72. Which feature of Burp Suite captures HTTP requests? (Burp Suite)
Spider
Repeater
Proxy
Scanner
Answer: C
Q73. What does IAM ensure? (IAM (Identity and Access Management))
Software testing
Performance optimization
Database indexing
Answer: C
Multi-Factor Authentication
Mainframe Authentication
Answer: A
Physical hardware
Application configuration
Power supply
Cooling
Answer: B
Software as a Service
Security as a System
Script as a Source
Storage as a Service
Answer: A
Securing networks
Securing databases
Monitoring applications
Answer: B
Jenkins
Nmap
Metasploit
GNS3
Answer: A
Q79. Which of the following is a common threat to mobile apps? (Mobile App Security)
Data leakage
Phishing emails
Server overload
Unpatched desktops
Answer: A
Q80. What is the purpose of code obfuscation in mobile apps? (Mobile App Security)
Improve performance
Secure APIs
Encrypt database
Answer: C
Q81. Which technique is used to protect sensitive data in a database? (Database Security)
Indexing
Data mining
Data masking
Clustering
Answer: C
Q82. What type of attack targets database query execution? (Database Security)
DoS
SQL Injection
XSS
Phishing
Answer: B
Hardcoding credentials
Sanitizing inputs
Disabling logs
Answer: B
Q84. Which guideline helps prevent buffer overflow? (Secure Coding Guidelines)
Avoid loops
Use strcpy
Input validation
Skip testing
Answer: C
Speed
Redundancy
Confidentiality
Usability
Answer: C
Integrity
Availability
Access control
Redundancy
Answer: C
Q87. What device is used to prevent unauthorized network access? (Network Security)
Router
Firewall
Switch
Repeater
Answer: B
FTP
HTTP
SSH
Telnet
Answer: C
RSA
AES
ECC
DSA
Answer: B
Encryption
Authentication
Integrity
Compression
Answer: C
OSI
STRIDE
TCP/IP
AES
Answer: B
Identify threats
Build the app
Encrypt data
Answer: B
Man-in-the-middle
SQL Injection
Phishing
Keylogging
Answer: B
Answer: A
Q95. Which tool is used for web app security testing? (Security Assessment)
Wireshark
Burp Suite
Metasploit
Nmap
Answer: B
Fix code
Measure uptime
Answer: C
Network monitoring
Code compilation
Firewall setup
Answer: B
Q98. Which feature of Burp Suite captures HTTP requests? (Burp Suite)
Spider
Repeater
Proxy
Scanner
Answer: C
Q99. What does IAM ensure? (IAM (Identity and Access Management))
Software testing
Performance optimization
Database indexing
Answer: C
Multi-Factor Authentication
Mainframe Authentication
Physical hardware
Application configuration
Power supply
Cooling
Answer: B
Software as a Service
Security as a System
Script as a Source
Storage as a Service
Answer: A
Securing networks
Securing databases
Monitoring applications
Answer: B
Jenkins
Nmap
Metasploit
GNS3
Answer: A
Q105. Which of the following is a common threat to mobile apps? (Mobile App Security)
Data leakage
Phishing emails
Server overload
Unpatched desktops
Answer: A
Q106. What is the purpose of code obfuscation in mobile apps? (Mobile App Security)
Improve performance
Secure APIs
Encrypt database
Answer: C
Q107. Which technique is used to protect sensitive data in a database? (Database Security)
Indexing
Data mining
Data masking
Clustering
Answer: C
Q108. What type of attack targets database query execution? (Database Security)
DoS
SQL Injection
XSS
Phishing
Answer: B
Sanitizing inputs
Disabling logs
Answer: B
Q110. Which guideline helps prevent buffer overflow? (Secure Coding Guidelines)
Avoid loops
Use strcpy
Input validation
Skip testing
Answer: C
Speed
Redundancy
Confidentiality
Usability
Answer: C
Integrity
Availability
Access control
Redundancy
Answer: C
Q113. What device is used to prevent unauthorized network access? (Network Security)
Router
Firewall
Switch
Repeater
Answer: B
FTP
HTTP
SSH
Telnet
Answer: C
RSA
AES
ECC
DSA
Answer: B
Encryption
Authentication
Integrity
Compression
Answer: C
OSI
STRIDE
TCP/IP
AES
Answer: B
Identify threats
Encrypt data
Answer: B
Man-in-the-middle
SQL Injection
Phishing
Keylogging
Answer: B
Answer: A
Q121. Which tool is used for web app security testing? (Security Assessment)
Wireshark
Burp Suite
Metasploit
Nmap
Answer: B
Fix code
Measure uptime
Develop UI
Answer: C
Network monitoring
Code compilation
Firewall setup
Answer: B
Q124. Which feature of Burp Suite captures HTTP requests? (Burp Suite)
Spider
Repeater
Proxy
Scanner
Answer: C
Q125. What does IAM ensure? (IAM (Identity and Access Management))
Software testing
Performance optimization
Database indexing
Answer: C
Multi-Factor Authentication
Mainframe Authentication
Answer: A
Physical hardware
Application configuration
Power supply
Cooling
Answer: B
Software as a Service
Security as a System
Script as a Source
Storage as a Service
Answer: A
Securing networks
Securing databases
Monitoring applications
Answer: B
Q130. What tool is used in CI/CD security? (DevOps Security)
Jenkins
Nmap
Metasploit
GNS3
Answer: A
Q131. Which of the following is a common threat to mobile apps? (Mobile App Security)
Data leakage
Phishing emails
Server overload
Unpatched desktops
Answer: A
Q132. What is the purpose of code obfuscation in mobile apps? (Mobile App Security)
Improve performance
Secure APIs
Encrypt database
Answer: C
Q133. Which technique is used to protect sensitive data in a database? (Database Security)
Indexing
Data mining
Data masking
Clustering
Answer: C
Q134. What type of attack targets database query execution? (Database Security)
DoS
SQL Injection
XSS
Phishing
Answer: B
Hardcoding credentials
Sanitizing inputs
Disabling logs
Answer: B
Q136. Which guideline helps prevent buffer overflow? (Secure Coding Guidelines)
Avoid loops
Use strcpy
Input validation
Skip testing
Answer: C
Speed
Redundancy
Confidentiality
Usability
Answer: C
Integrity
Availability
Access control
Redundancy
Answer: C
Q139. What device is used to prevent unauthorized network access? (Network Security)
Router
Firewall
Switch
Repeater
Answer: B
FTP
HTTP
SSH
Telnet
Answer: C
RSA
AES
ECC
DSA
Answer: B
Encryption
Authentication
Integrity
Compression
Answer: C
OSI
STRIDE
TCP/IP
AES
Answer: B
Identify threats
Encrypt data
Answer: B
Man-in-the-middle
SQL Injection
Phishing
Keylogging
Answer: B
Answer: A
Q147. Which tool is used for web app security testing? (Security Assessment)
Wireshark
Burp Suite
Metasploit
Nmap
Answer: B
Fix code
Measure uptime
Develop UI
Answer: C
Network monitoring
Code compilation
Firewall setup
Answer: B
Q150. Which feature of Burp Suite captures HTTP requests? (Burp Suite)
Spider
Repeater
Proxy
Scanner
Answer: C
Q151. What does IAM ensure? (IAM (Identity and Access Management))
Software testing
Performance optimization
Database indexing
Answer: C
Multi-Factor Authentication
Mainframe Authentication
Answer: A
Physical hardware
Application configuration
Power supply
Cooling
Answer: B
Software as a Service
Security as a System
Script as a Source
Storage as a Service
Answer: A
Q155. What is DevSecOps? (DevOps Security)
Securing networks
Securing databases
Monitoring applications
Answer: B
Jenkins
Nmap
Metasploit
GNS3
Answer: A
Q157. Which of the following is a common threat to mobile apps? (Mobile App Security)
Data leakage
Phishing emails
Server overload
Unpatched desktops
Answer: A
Q158. What is the purpose of code obfuscation in mobile apps? (Mobile App Security)
Improve performance
Secure APIs
Encrypt database
Answer: C
Q159. Which technique is used to protect sensitive data in a database? (Database Security)
Indexing
Data mining
Data masking
Clustering
Answer: C
Q160. What type of attack targets database query execution? (Database Security)
DoS
SQL Injection
XSS
Phishing
Answer: B
Hardcoding credentials
Sanitizing inputs
Disabling logs
Answer: B
Q162. Which guideline helps prevent buffer overflow? (Secure Coding Guidelines)
Avoid loops
Use strcpy
Input validation
Skip testing
Answer: C
Speed
Redundancy
Confidentiality
Usability
Answer: C
Integrity
Availability
Access control
Redundancy
Answer: C
Q165. What device is used to prevent unauthorized network access? (Network Security)
Router
Firewall
Switch
Repeater
Answer: B
FTP
HTTP
SSH
Telnet
Answer: C
RSA
AES
ECC
DSA
Answer: B
Encryption
Authentication
Integrity
Compression
Answer: C
OSI
STRIDE
TCP/IP
AES
Answer: B
Identify threats
Encrypt data
Answer: B
Man-in-the-middle
SQL Injection
Phishing
Keylogging
Answer: B
Answer: A
Q173. Which tool is used for web app security testing? (Security Assessment)
Wireshark
Burp Suite
Metasploit
Nmap
Answer: B
Fix code
Measure uptime
Develop UI
Answer: C
Network monitoring
Code compilation
Firewall setup
Answer: B
Q176. Which feature of Burp Suite captures HTTP requests? (Burp Suite)
Spider
Repeater
Proxy
Scanner
Answer: C
Q177. What does IAM ensure? (IAM (Identity and Access Management))
Software testing
Performance optimization
Database indexing
Answer: C
Multi-Factor Authentication
Mainframe Authentication
Answer: A
Physical hardware
Application configuration
Power supply
Cooling
Answer: B
Q180. What does SaaS stand for? (Cloud Security)
Software as a Service
Security as a System
Script as a Source
Storage as a Service
Answer: A
Securing networks
Securing databases
Monitoring applications
Answer: B
Jenkins
Nmap
Metasploit
GNS3
Answer: A
Q183. Which of the following is a common threat to mobile apps? (Mobile App Security)
Data leakage
Phishing emails
Server overload
Unpatched desktops
Answer: A
Q184. What is the purpose of code obfuscation in mobile apps? (Mobile App Security)
Improve performance
Secure APIs
Encrypt database
Answer: C
Q185. Which technique is used to protect sensitive data in a database? (Database Security)
Indexing
Data mining
Data masking
Clustering
Answer: C
Q186. What type of attack targets database query execution? (Database Security)
DoS
SQL Injection
XSS
Phishing
Answer: B
Hardcoding credentials
Sanitizing inputs
Disabling logs
Answer: B
Q188. Which guideline helps prevent buffer overflow? (Secure Coding Guidelines)
Avoid loops
Use strcpy
Input validation
Skip testing
Answer: C
Speed
Redundancy
Confidentiality
Usability
Answer: C
Integrity
Availability
Access control
Redundancy
Answer: C
Q191. What device is used to prevent unauthorized network access? (Network Security)
Router
Firewall
Switch
Repeater
Answer: B
FTP
HTTP
SSH
Telnet
Answer: C
RSA
AES
ECC
DSA
Answer: B
Encryption
Authentication
Integrity
Compression
Answer: C
OSI
STRIDE
TCP/IP
AES
Answer: B
Identify threats
Answer: B
Man-in-the-middle
SQL Injection
Phishing
Keylogging
Answer: B
Answer: A
Q199. Which tool is used for web app security testing? (Security Assessment)
Wireshark
Burp Suite
Metasploit
Nmap
Answer: B
Fix code
Measure uptime
Develop UI
Answer: C