cyber-security banner

Cyber Security Multiple Choice Questions (MCQs) and Answers

Master Cyber Security with Practice MCQs. Explore our curated collection of Multiple Choice Questions. Ideal for placement and interview preparation, our questions range from basic to advanced, ensuring comprehensive coverage of Cyber Security concepts. Begin your placement preparation journey now!

Q1

Q1 What is the primary goal of cyber security?

A

To enhance website aesthetics

B

To protect systems, networks, and programs from digital attacks

C

To increase network speed

D

To advertise services

Q2

Q2 Which of the following is not considered a key objective of cyber security?

A

Confidentiality

B

Integrity

C

Availability

D

Marketing

Q3

Q3 What does the term "attack surface" in cyber security refer to?

A

The total number of vulnerabilities

B

The physical area of the device

C

A type of cyber attack

D

The cost of securing a system

Q4

Q4 Which of the following can be classified as a cyber security threat?

A

Earthquake

B

Unauthorized access

C

Server maintenance

D

Network upgrades

Q5

Q5 Which of the following best describes the principle of least privilege in cyber security?

A

Users are granted minimal access rights necessary to perform their tasks

B

Users have complete access to all system resources

C

Users are allowed temporary access rights

D

Users are restricted from accessing any resources

Q6

Q6 What does "CIA triad" stand for in cyber security?

A

Confidentiality, Integrity, Availability

B

Cyber, Internet, and Authentication

C

Confidentiality, Integration, and Access

D

Critical Infrastructure Act

Q7

Q7 Which of the following tools is commonly used to scan a network for vulnerabilities?

A

Word Processor

B

Nmap

C

Photoshop

D

VLC Player

Q8

Q8 Which command-line tool is used to view active network connections on a Linux system?

A

ipconfig

B

netstat

C

traceroute

D

ping

Q9

Q9 A user receives an email from an unknown source asking for sensitive information. What is this type of attack called?

A

Phishing

B

DoS attack

C

Man-in-the-middle attack

D

DDoS attack

Q10

Q10 Which cryptographic technique uses the same key for both encryption and decryption?

A

Symmetric encryption

B

Asymmetric encryption

C

Hashing

D

Digital signatures

Q11

Q11 Which cryptographic method uses a pair of public and private keys?

A

Symmetric encryption

B

Asymmetric encryption

C

Hashing

D

Block cipher

Q12

Q12 What is the primary purpose of a digital signature in cryptography?

A

Ensuring data confidentiality

B

Verifying the integrity and authenticity of data

C

Encrypting messages

D

Compressing data

Q13

Q13 Which of the following is an example of a block cipher algorithm?

A

RSA

B

AES

C

ECC

D

SHA-256

Q14

Q14 What is the role of hashing in cryptography?

A

Encrypting data

B

Providing data integrity

C

Establishing a secure connection

D

Decrypting data

Q15

Q15 Which of the following is the primary security risk of using outdated cryptographic algorithms?

A

Performance degradation

B

Increased key length

C

Increased vulnerability to attacks

D

Difficulty in implementation

Q16

Q16 Which of the following is a common tool used to generate cryptographic keys?

A

GIMP

B

OpenSSL

C

Photoshop

D

Excel

Q17

Q17 In which programming language would you typically use the cryptographic library PyCryptodome to implement encryption?

A

C++

B

Python

C

Java

D

PHP

Q18

Q18 A company’s encrypted communication is suddenly decipherable by a third party. What is the most likely cause?

A

Use of weak encryption algorithm

B

Compromised private key

C

Misconfigured firewall

D

Improper key management

Q19

Q19 Which of the following protocols is primarily used to secure communication over the internet?

A

HTTP

B

SMTP

C

SSL/TLS

D

FTP

Q20

Q20 What is the main function of the HTTPS protocol?

A

To increase website speed

B

To secure data transfer between a user and a website

C

To compress web pages

D

To improve SEO

Q21

Q21 Which of the following is a security protocol specifically designed to provide VPN (Virtual Private Network) services?

A

SSL

B

IPsec

C

FTP

D

SFTP

Q22

Q22 Which protocol is commonly used to secure email communication?

A

HTTP

B

IMAP

C

SMTP

D

PGP

Q23

Q23 What is the primary difference between SSL and TLS?

A

SSL is faster than TLS

B

TLS is an updated version of SSL

C

SSL is for emails, TLS for websites

D

They are identical

Q24

Q24 Which version of SSL is known to have severe vulnerabilities and should not be used?

A

SSLv1

B

SSLv2

C

SSLv3

D

TLSv1.2

Q25

Q25 Which security protocol provides end-to-end encryption in modern web browsers, ensuring the confidentiality of web sessions?

A

IPsec

B

SSL

C

TLS

D

PGP

Q26

Q26 Which command can be used to generate an SSL certificate using OpenSSL?

A

openssl generate

B

openssl certgen

C

openssl req -new -x509

D

openssl createcert

Q27

Q27 What is the correct command to verify an SSL certificate using OpenSSL?

A

openssl verify mycert.pem

B

openssl sign mycert.pem

C

openssl check mycert.pem

D

openssl valid mycert.pem

Q28

Q28 How can you check if a specific website is using HTTPS in a browser's developer tools?

A

Check the "Headers" tab

B

Check the "Console" tab

C

Check the "Network" tab

D

Check the "Elements" tab

Q29

Q29 A user is receiving warnings that a website’s SSL certificate is expired. What is the immediate solution for the website administrator?

A

Ignore the warnings

B

Issue a new SSL certificate

C

Update the browser

D

Contact the hosting provider

Q30

Q30 An organization’s VPN connection is dropping frequently during peak hours. What could be the most likely cause?

A

Outdated encryption protocol

B

Network congestion

C

Misconfigured IPsec settings

D

Firewall blocking VPN traffic

ad verticalad vertical
ad