Answer these 100+ Cyber Security MCQs and see how sharp is your knowledge of Cyber Security.
Scroll down and let's start!
A. URL
B. Domain name
C. Web site name
D. IP address
A. URL
B. Domain name
C. Web site name
D. IP address
A. Motivating users to comply with security policies
B. Informing users about trends and threats in society
C. Teaching employees about security objectives
D. All of the above
A. Understand the problem
B. Test the program
C. Translate the program
D. Code the program
A. Ingress
B. Egress
C. Both A and B
D. Neither A nor B
A. Both as secondary filtering mechanism on an application proxy firewall and on border routers
B. On border routers
C. Both A and B
D. Neither A nor B
A. Application
B. Header
C. Data link
D. Transport
A. Decentralization of data
B. Absence of advanced algorithms
C. Increased availability of data
D. Increased storage costs
A. Cycle of success
B. Learning preferences
C. Personal values
D. Course correction
A. Allowed to use the trade secret but not the original trademark
B. The location of the return address
C. Whether the nonprinting characters are visible
D. How parts of the letter are indented from the left margin
A. Hybrid Cloud
B. Software as a Service (SaaS)
C. Platform as a Service (PaaS)
D. Infrastructure as a Service (IaaS)
A. PaaS
B. Public cloud
C. Private cloud
D. IaaS
A. Denial-of-service
B. Brute force attacks
C. Malware
D. Buffer overflow
A. Cloud access security broker (CASB)
B. Intrusion prevention system (IPS)
C. Intrusion detection system (IDS)
D. Next generation firewall
A. SIEM
B. UTM
C. Protocol analyzer
D. Data sink
A. Code review
B. Code analysis
C. Static analysis
D. Dynamic analysis
A. Gray box testing
B. Integration testing
C. White box testing
D. Unit testing
A. None
B. Limited details of server and network infrastructure
C. All information
D. Limited details of server infrastructure
A. Intrusion prevention system (IPS)
B. Next generation firewall
C. Cloud access security broker (CASB)
D. Intrusion detection system (IDS)
A. Monitoring of normal employee system and data access patterns
B. Applying system and application updates regularly
C. Fault tolerant infrastructure and data redundancy
D. Separation of duties and job rotation
A. Rainbow table attack
B. Pass-the-hash attack
C. Password spray attack
D. Brute force attack
A. File hash
B. Asymmetric encryption
C. Digital signature
D. Symmetric encryption
A. DRP works to keep a business up and running despite a disaster. BCP works to restore the original business capabilities.
B. BCP works to keep a business up and running despite a disaster. DRP works to restore the original business capabilities.
C. BCP is part of DRP.
D. DRP is part of BCP.
A. Non-repudiation
B. Integrity
C. Availability
D. Confidentiality
A. Cloud Security Posture Management (CSPM)
B. Intrusion Detection and Prevention System (IDPS)
C. Cloud Workload Protection Platforms (CWPP)
D. Cloud Access Security Brokers (CASBs)
A. Compression
B. Hashing
C. Symmetric encryption
D. Stenography
A. CCPA
B. GDPR
C. NIST Privacy Framework
D. OSPF
A. Identity and access management (IAM)
B. Privileged account management (PAM)
C. Authentication and authorization
D. Least privilege
A. Preventive control
B. Detective control
C. Directive control
D. Corrective control
A. Grayout
B. Blackout
C. Brownout
D. Whiteout
A. Security Information Event Management (SIEM)
B. Extended Detection and Response (XDR)
C. Next generation firewall (NGFW)
D. Cloud App Security Broker (CASB)
A. TRIKE
B. TOGAF
C. STRIDE
D. MITRE ATT&CK
A. Dynamic application security testing
B. Unit testing
C. White box testing
D. Static application security testing
A. Mobile Device Management (MDM)
B. Data Loss Prevention (DLP)
C. Intrusion Detection and Prevention System (IDPS)
D. Cloud access security broker (CASB)
A. 200
B. 400
C. 100
D. 300
A. Federal Information Security Managment Act (FISMA)
B. Payment Card Industry Data Security Standard (PCI-DSS)
C. General Data Protection Regulation (GDPR)
D. International Organization for Standardization and Internation Electronical Commission (ISO/IEC 27018)
A. Common event format
B. Common weakness enumeration
C. Common vulnerabilties and exposures
D. Common vulnerability scoring system
A. Log server
B. Network scanner
C. Firewall
D. Protocol analyzer
A. Aggregation
B. Inference
C. SQL injection
D. Cross-origin resouce sharing
A. Zero Trust Security
B. Role-Based Access Control (RBAC)
C. Authorization
D. Single Sign-On
A. Processor
B. Object
C. Subject
D. Controller
A. Use least privilege access
B. Verify explicitly
C. Trust but verify
D. Assume breach
A. ARP spoofing
B. Pharming attacks
C. Cross-site scripting (XSS)
D. DNS poisoning
A. IDS
B. SIEM
C. Packet sniffer
D. IPS
A. SELECT * FROM users WHERE username =
B. SELECT * FROM users WHERE username =
C. SELECT * FROM users WHERE username =
D. SELECT * FROM users WHERE username =
A. Static analysis
B. Black box testing
C. Dynamic analysis
D. Penetration testing
A. Autopsy
B. Snort
C. Nmap
D. Wireshark
A. Evaluate the features of available DLP products to determine which best meet your organizations's needs.
B. Examine the flow of sensitive data in your organization to better understand usage patterns.
C. Conduct an inventory of all the data in your organization to establish classifications based on sensitivity.
D. Conduct a risk assessment to determine the best data labeling strategy for your organization.
A. Virus
B. Worm
C. Rootkit
D. Trojan horse
A. Encryption
B. A metropolitan area network
C. A virtual local area network
D. A wide area network