Cyber Security MCQs

Cyber Security MCQs

Our team has conducted extensive research to compile a set of Cyber Security MCQs. We encourage you to test your Cyber Security knowledge by answering these multiple-choice questions provided below.
Simply scroll down to begin!

1: What is Access Control?

A.   Controlling access to resources on a computer or network system

B.   Monitoring online activities

C.   Managing user access rights

D.   Securing the data stored on a computer

2: Who manages access controls in Mandatory Access Control models?

A.   Administrator

B.   Supervisor

C.   Operator

D.   User

3: What does DAC stand for?

A.   Data Access Control

B.   Digital Access Control

C.   Defined Access Control

D.   Discretionary Access Control

4: What is the purpose of Role Based Access Control models?

A.   To define a series of roles and assign them to subjects

B.   To limit access to privileged users

C.   To organize a company's departments

D.   To protect vulnerable data

5: What is identification?

A.   Collecting information

B.   Verification of data

C.   Register a system

D.   Telling the system who you are

6: Malicious software can be hidden in a ________.

A.   URL link

B.   PDF file

C.   ZIP file

D.   All of the above

7: ____ is used both for intrusion analysis and as part of evidence collection and analysis.

A.   Slow onset disasters

B.   Mitigation of impact

C.   Rapid onset disasters

D.   Forensics

8: ____ requires effective backup strategies and flexible hardware configurations.

A.   Wargaming

B.   DR plansimulation

C.   Data recovery

D.   Systemresponse

9: When encrypting a file, a fully punctuated passphrase should have a minimum of ____ characters.

A.   Padding the hash value with additional, randomly generated data

B.   Using a sufficiently large hash value

C.   20 characters

D.   Erasing the encryption key when the drive is unplugged or reset

E.   Plaintext a key

10: The strongest technology that would assure alice that bob is the sender of a message is a(n) _____.

A.   Digital signature.

B.   Encrypted signature.

C.   Hash signature.

D.   None of these

11: All of the following are security risks associated with the ares system, except ________.

A.   Doctors and trainers may be restricted to viewing only partial data

B.   Consolidating the functional systems will close the gaps

C.   The change generates value greater than its cost

D.   None of this

12: A _____ is a downloadable image that can be used to scan a computer for malware.

A.   System repair disc

B.   Rescue disc

C.   Clean disc

D.   Resource disc

13: An airport security scanner is an example of a ____________ computer.

A.   Copyright

B.   Fluency

C.   Special purpose

D.   Cut-and-paste

14: Cas distribute public keys ________.

A.   In digital certificates

B.   Only in ways using encryption for confidentiality

C.   Both A and B

D.   Neither A nor B

15: Id badges that can be detected by a proximity reader are often fitted with tiny radio ____ tags.

A.   Wave

B.   AFID

C.   Pulse

D.   RFID

16: Adolescent victims of cyberbullying are likely to _____.

A.   Experience depression

B.   Become a bully themselves

C.   Not let it bother them

D.   Find easy ways to escape the situation

17: The __________ defines stiffer penalties for prosecution of terrorist crimes.

A.   USA Patriot Act

B.   Sarbanes-Oxley Act

C.   Gramm-Leach-Bliley Act

D.   Economic Espionage Act

18: The __________________ was created after a security breach at a state-operated data facility.

A.   GLBA financial institutions and entities covered by HIPAA

B.   California

C.   California Database Security Breach Notification Act

D.   States have different laws about what constitutes a breach.

19: The __________________________enforces trade sanctions and embargoes.

A.   Office of Foreign Assets Control (OFAC)

B.   Financial crimes enforcement network (fincen)

C.   Export control regulations

D.   Computer security act (csa)