Cyber Security MCQ (Multiple Choice Questions)

Here are 1000 MCQs on Cyber Security (Chapterwise).

1. What is Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned
View Answer

Answer: d
Explanation: Cyber Security provides security to a system against cyber-attacks by using various technologies, and processes.

2. What does cyber security protect?
a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned
View Answer

Answer: b
Explanation: It protects internet-connected systems such as hardware, software, and data from cyber-attacks. It aims to reduce cyber attacks against the system, network, and technologies by reducing unauthorized exploitation, vulnerability, and threats.

3. Who is the father of computer security?
a) August Kerckhoffs
b) Bob Thomas
c) Robert
d) Charles
View Answer

Answer: a
Explanation: August Kerckhoffs, a linguist and German professor at HEC, wrote an essay in the Journal of Military Science in February 1883. Kerckhoff had unwittingly established the foundations for contemporary encryption, earning him the title of “Father of Computer Security.”

4. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
a) Cyber attack
b) Computer security
c) Cryptography
d) Digital hacking
View Answer

Answer: a
Explanation: An effort to steal, spy on, damage, or destroy diverse components of cyberspace, such as computer systems, related peripherals, network systems, and information, is known as a cyber attack.

5. Which of the following is a type of cyber security?
a) Cloud Security
b) Network Security
c) Application Security
d) All of the above
View Answer

Answer:d
Explanation: Since technology is improving, the threat and attacks against the technology are also increasing. Hence, to provide security, it is divided into the following types:
Cloud Security: Provides security for the data stored on the cloud.
Network Security: Protects the internal network from threats.
Application Security: Protects data stored in the application software.
advertisement
advertisement

6. What are the features of cyber security?
a) Compliance
b) Defense against internal threats
c) Threat Prevention
d) All of the above
View Answer

Answer: d
Explanation: The features are as follows:
Compliance: Creating a program that meets the requirements and rules of the users.
Defense against internal threats: Should provide security against internal exploitation.
Threat Prevention: Should be capable of detecting the threat and preventing them.

7. Which of the following is an objective of network security?
a) Confidentiality
b) Integrity
c) Availability
d) All of the above
View Answer

Answer: d
Explanation: The objectives of network security are Confidentiality, Integrity, and Availability.
Confidentiality: The function of confidentiality is to keep sensitive company information safe from unwanted access. The confidentiality component of network security ensures that data is only accessible to those who are authorized to see it.
Integrity: This goal entails ensuring and preserving data accuracy and consistency. The purpose of integrity is to ensure that data is accurate and not tampered with by unauthorized individuals.
Availability: The purpose of availability in Network Security is to ensure that data, network resources, and services are always available to legitimate users, whenever they need them.

8. Which of the following is not a cybercrime?
a) Denial of Service
b) Man in the Middle
c) Malware
d) AES
View Answer

Answer: d
Explanation: Denial of Service, Man in the Middle, and Malware exploit the system causing a threat to security, hence they are considered as cybercrime. AES (Advanced Encryption Standard) provides security by encrypting the data.

9. Which of the following is a component of cyber security?
a) Internet Of Things
b) AI
c) Database
d) Attacks
View Answer

Answer: a
Explanation: The Internet of Things (IoT) is a network of physical objects embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems through the internet.

10. Which of the following is a type of cyber attack?
a) Phishing
b) SQL Injections
c) Password Attack
d) All of the above
View Answer

Answer: d
Explanation: Attacks are Phishing, SQL Injections, and Password Attack.
Phishing: The attacker sends a large number of fraudulent emails and gains access to the system.
SQL Injections: The attacker gains access to the protected information by adding malicious code to the SQL server.
Password Attack: Attackers gain access to the passwords unethically and gain access to the confidential data.

11. Which of the following is not an advantage of cyber security?
a) Makes the system slower
b) Minimizes computer freezing and crashes
c) Gives privacy to users
d) Protects system against viruses
View Answer

Answer: a
Explanation: The advantages are minimization of computer freezing and crashes, user privacy, and protection against viruses, worms, etc. Disadvantages include the system becoming slow, configuring firewalls correctly can be difficult, need to update the new software in order to keep security up to date.

12. “Cyberspace” was coined by _________
a) Richard Stallman
b) William Gibson
c) Andrew Tannenbaum
d) Scott Fahlman
View Answer

Answer: b
Explanation: William Gibson, an American-Canadian fiction pioneer, and coiner, examined the many streams of technology and invented the word “cyberspace” in 1821. The phrase refers to linked technologies that aid in information exchange, interaction with digital devices, storage and digital entertainment, computer and network security, and other information technology-related matters.

13. In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?
a) 1991
b) 1983
c) 1970
d) 1964
View Answer

Answer: c
Explanation: In the case of hackers in the 1970s, hackers and cyber thieves found out how wired technologies operate and how they might be abused to obtain a competitive edge or misuse the technology.

14. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______
a) Nation / State sponsored hackers
b) CIA triad
c) Special Hackers
d) Government Hackers
View Answer

Answer: a
Explanation: Nation / State-sponsored hackers are those who are engaged or paid by a nation’s or state’s government to safeguard the country from cyber terrorists and other groups or individuals, as well as to expose their plans, communications, and activities.
advertisement

15. Which of the following act violates cyber security?
a) Exploit
b) Attack
c) Threat
d) Vulnerability
View Answer

Answer: b
Explanation: A threat is a possible danger that might lead to a security breach and cause harm to the system or network. Vulnerability is a word that refers to a flaw in a network or system that might be exploited by an attacker. Exploiting a security flaw might result in unexpected and unwanted effects. A cyber-attack is an attempt by attackers to alter, delete, steal or expose any specific data by gaining unauthorized access.

16. Which of the following actions compromise cyber security?
a) Vulnerability
b) Attack
c) Threat
d) Exploit
View Answer

Answer: c
Explanation: A threat is defined as a potential hazard that might result in a breach of security and cause harm to the system or network. Vulnerability is a term that refers to a weakness in a network or system that an attacker may exploit. Exploiting a weakness in security might have unintended and undesirable consequences.

17. Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?
a) Pharming
b) Website-Duplication
c) Mimicking
d) Spamming
View Answer

Answer: a
Explanation: Pharming is a strategy and approach used by cybercriminals to create phony web pages and sites in order to mislead users into giving over personal information such as login IDs and passwords.

18. Which of the following is not a type of peer-to-peer cyber-crime?
a) MiTM
b) Injecting Trojans to a target victim
c) Credit card details leak in the deep web
d) Phishing
View Answer

Answer: c
Explanation: Peer-to-peer includes phishing, as well as the distribution of Trojans and worms to individuals. The leakage of a huge number of people’s credit card data on the deep web, on the other hand, is classified as a computer-as-weapon cyber-crime.

19. A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
a) Clickjacking
b) Buffer-overflow
c) Phishing
d) MiTM
View Answer

Answer: b
Explanation: The excess data that contains certain specific instructions in the memory for actions are projected by a cyber-criminal or penetration tester to break the system in a buffer-overflow attack.
advertisement

20. Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?
a) ip tracker
b) emails
c) websites
d) web pages
View Answer

Answer: c
Explanation: Enumeration by cyber-attackers is also feasible via websites since attackers target websites in order to obtain the victim’s or target user’s IP address.

21. Which of the following is defined as an attempt to harm, damage or cause threat to a system or network?
a) Digital crime
b) Threats
c) System hijacking
d) Cyber Attack
View Answer

Answer: d
Explanation: Extortion, identity theft, email hacking, digital surveillance, stealing hardware, mobile hacking, and physical security breaches are all examples of cyber assaults or activities.

22. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
a) White Hat Hackers
b) Black Hat Hackers
c) Hactivists
d) Gray Hat Hackers
View Answer

Answer: b
Explanation: Black Hat hackers, often known as “crackers,” are a sort of cyber crime that gain illegal access to a user’s account or system in order to steal confidential data or introduce malware into the system for personal gain or to harm the company.

23. IT security in any firm or organization is maintained and handled by ____________________
a) Software Security Specialist
b) CEO of the organization
c) Security Auditor
d) IT Security Engineer
View Answer

Answer: d
Explanation: This is a position in a company or organisation where an individual develops and maintains different systems and security tools for the company or organisation to which he or she belongs.

24. Where did the term “hacker” originate?
a) MIT
b) New York University
c) Harvard University
d) Bell’s Lab
View Answer

Answer: a
Explanation: The term “hacker” was coined at MIT (Massachusetts Institute of Technology) because individuals and highly competent professionals use computer languages to address various challenges. In this context, labels such as geeks and nerds have been coined.

25. What is the existence of weakness in a system or network is known as?
a) Attack
b) Exploit
c) Vulnerability
d) Threat
View Answer

Answer: c
Explanation: Vulnerability is a term that refers to a weakness in a network or system that an attacker may exploit. Exploiting a weakness in security might have unintended and undesirable consequences.

26. Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.
a) MiTM attack
b) Phishing attack
c) Website attack
d) DoS attack
View Answer

Answer: b
Explanation: Phishing is a type of cybercrime in which a person is digitally persuaded to disclose private information. Phishing comes in a variety of forms. Some of them employ malware and emails to divert users to various websites.

27. Which of the following is not a step followed by cyber-criminals in data breaching?
a) Exfiltration
b) Research and info-gathering
c) Attack the system
d) Fixing the bugs
View Answer

Answer: d
Explanation: During a hack, cyber-criminals first do research on the target, gathering data about the victim’s system and network. Then go ahead and attack. Once the attacker has gained access, he or she takes sensitive information.

28. Which of the following online service’s privacy cannot be protected using Tor?
a) Browsing data
b) Instant messaging
c) Login using ID
d) Relay chats
View Answer

Answer: c
Explanation: Login using ID will obviously take your ID in order to access your account and is not the headache of Tor. Privacy regarding instant messaging, browsing data, relay chats are some of the following online services protected by Tor.

29. Which of the following term refers to a group of hackers who are both white and black hat?
a) Yellow Hat hackers
b) Grey Hat hackers
c) Red Hat Hackers
d) White-Black Hat Hackers
View Answer

Answer: b
Explanation: Grey Hat Hackers are a hybrid of ethical and unethical hacker personalities. They hack other people’s computers for fun, but they don’t hurt them, and they exploit network faults and vulnerabilities without the admin or owner’s awareness.

30. Which of the following is not an email-related hacking tool?
a) Mail Password
b) Email Finder Pro
c) Mail PassView
d) Sendinc
View Answer

Answer: d
Explanation: Sendinc is not a tool that compromises email data. It is used to protect business email accounts and provides a fast web-based solution for businesses to start delivering secure emails. The other three are email hacking tools.

30. Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack?
a) botnets
b) programs
c) virus
d) worms
View Answer

Answer: a
Explanation: Botnets on infected mobile devices are waiting for orders from their owners. It starts a DDoS flood attack after receiving the owner’s instructions. As a result, calls are not connected or data is not sent.

31. Which of the following is the least strong security encryption standard?
a) WPA3
b) WPA2
c) WPA
d) WEP
View Answer

Answer: d
Explanation: Wireless security is an important aspect of cyber-security. Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2, and WPA3 are the most common kinds of wireless security. WEP is a famously insecure encryption protocol.

32. Which of the following is a Stuxnet?
a) Trojan
b) Antivirus
c) Worm
d) Virus
View Answer

Answer: c
Explanation: Stuxnet is a popular and powerful worm that came into existence in mid 2010, which was very powerful as it was accountable for the cause of huge damage to Iran’s Nuclear program. It mainly targets the PLCs (Programmable Logic Controllers) in a system.

33. Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?
a) Operating System fingerprinting
b) Operating System penetration testing
c) Digital-printing
d) Machine printing
View Answer

Answer: a
Explanation: OS fingerprinting is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer. OS Fingerprinting is the practice of examining data packets that come from a network in order to extract intelligence that may be utilized in future assaults.

34. Which of the following can diminish the chance of data leakage?
a) Steganography
b) Chorography
c) Cryptography
d) Authentication
View Answer

Answer: a
Explanation: Ordinary files are targeted by hackers or other cyber criminals in order to disguise distinct data or information within another data file. You can reduce the risk of data leaking by employing steganography.


Chapterwise Multiple Choice Questions on Cyber Security

Cyber Security MCQ - Multiple Choice Questions and Answers

Our 1000+ MCQs focus on all topics of the Cyber Security subject, covering 100+ topics. This will help you to prepare for exams, contests, online tests, quizzes, viva-voce, interviews, and certifications. You can practice these MCQs chapter by chapter starting from the 1st chapter or you can jump to any chapter of your choice.
  1. Introduction to Ethical Hacking
  2. Cyber Security
  3. Cyber Laws, Security Tools, Bugs and Vulnerabilities
  4. Security Ethics, Security Breach Scenarios & Corporate Security
  5. Understanding Network Models for Security
  6. Phases of Security
  7. Cyber Security Types
  8. Understanding Attack Vectors
  9. Cryptography in Security
  10. Privacy in Cyber Security & Deep Web

1. Cyber Security MCQ on Introduction to Ethical Hacking

The section contains Cyber Security multiple-choice questions and answers on hacking history, hackers types and security professionals.

  • History of Hacking
  • Types of Hackers & Security Professionals
  • 2. Multiple Choice Questions on Cyber Security

    The section contains questions and answers on cyber attacks types, security elements, information security technologies, generic security steps, social engineering, physical hacking, security protocols, hacking terminologies, ports and its types, firewalls, linux and its security, buffer overflow, hacking and security skills, fingerprinting, exploits and exploitation.

  • Types of Cyber Attacks
  • Elements of Security
  • Information Security Technologies
  • Generic Steps for Security – 1
  • Generic Steps for Security – 2
  • Social Engineering and Physical Hacking
  • Security Protocols – 1
  • Security Protocols – 2
  • Hacking Terminologies – 1
  • Hacking Terminologies – 2
  • Ports and Its Types – 1
  • Ports and Its Types – 2
  • Firewalls – 1
  • Firewalls – 2
  • VPNs
  • Linux OS and its Security
  • Buffer Overflow – 1
  • Buffer Overflow – 2
  • Enumerating in Cyber Security
  • Hacking and Security Skills
  • Fingerprinting
  • Exploits and Exploitation
  • 3. MCQ on Cyber Laws, Security Tools, Bugs and Vulnerabilities

    The section contains MCQs on cyber security and it laws, security tools, bugs and vulnerabilities.

  • Cyber Laws and IT laws – 1
  • Cyber Laws and IT laws – 2
  • Popular Tools used in Security – 1
  • Popular Tools used in Security – 2
  • Bugs and Vulnerabilities
  • 4. Cyber Security MCQ on Security Ethics, Security Breach Scenarios & Corporate Security

    The section contains Cyber Security multiple choice questions and answers on ethical hacking ethics, and security breach.

  • Ethics of Ethical Hacking
  • How Security Breach Takes Place
  • Corporate Cyber Security
  • 5. Cyber Security MCQ on Understanding Network Models for Security

    The section contains Cyber Security questions and answers on osi and tcp-ip models security.

  • OSI Model Security – 1
  • OSI Model Security – 2
  • TCP-IP Model Security
  • 6. Multiple Choice Questions on Phases of Security

    The section contains Cyber Security MCQs on data leakage and its prevention, security scanning phase, gathering information phases and its techniques.

  • Data Leakage and Prevention – 1
  • Data Leakage and Prevention – 2
  • Information Gathering Phase & Techniques – 1
  • Information Gathering Phase & Techniques – 2
  • Scanning Phase for Security – 1
  • Scanning Phase for Security – 2
  • 7. MCQ on Cyber Security Types

    The section contains Cyber Security multiple-choice questions and answers on email security, password cracking, security measures, wireless security, windows, and mobile phone security.

  • Email Security – 1
  • Email Security – 2
  • Password Cracking and Security Measures – 1
  • Password Cracking and Security Measures – 2
  • Windows Security
  • Mobile Phone Security
  • Wireless Security
  • 8. Cyber Security MCQs on Understanding Attack Vectors

    The section contains Cyber Security questions and answers on viruses, worms, trojan and backdoors, botnets, digital privacy, dos, ddos, phishing and its types, sniffing, session hijacking, webserver attacks, web application vulnerabilities, adware, spyware, reverse engineering, dns hacking and its security, social networking security, caches and cookies.

  • Virus and Worms
  • Trojan and Backdoors – 1
  • Trojan and Backdoors – 2
  • Botnets
  • Digital Privacy
  • DoS and DDoS
  • Phishing and its Types
  • Sniffing
  • Session Hijacking
  • Web Server Attacks
  • Web Application Vulnerabilities
  • Adwares
  • Spywares
  • Reverse Engineering – 1
  • Reverse Engineering – 2
  • DNS Hacking and Security
  • Caches and Cookies
  • Social Networking Security
  • Spamming
  • 9. MCQ on Cryptography in Security

    The section contains Cyber Security MCQs on cryptography types, steganography security, different ciphers and their security strength.

  • Types of Cryptography – 1
  • Types of Cryptography – 2
  • Different Ciphers and their Security Strength
  • Steganography for Security
  • 10. Cyber Security Multiple Choice Questions on Privacy & Deep Web

    The section contains Cyber Security multiple choice questions and answers on tor services, anonymity, pseudonymity, deep web and darknet.

  • Tor Services
  • Anonymity & Pseudonymity
  • Deep Web and Darknet
  • If you would like to learn "Cyber Security" thoroughly, you should attempt to work on the complete set of 1000+ MCQs - multiple choice questions and answers mentioned above. It will immensely help anyone trying to crack an exam or an interview.

    Wish you the best in your endeavor to learn and master Cyber Security!

    Important Links:

    advertisement
    Manish Bhojasia - Founder & CTO at Sanfoundry
    Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

    Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.