cyber-security banner

Cyber Security Multiple Choice Questions (MCQs) and Answers

Master Cyber Security with Practice MCQs. Explore our curated collection of Multiple Choice Questions. Ideal for placement and interview preparation, our questions range from basic to advanced, ensuring comprehensive coverage of Cyber Security concepts. Begin your placement preparation journey now!

Q31

Q31 An employee’s emails are flagged as spam when using S/MIME for email encryption. What might be the cause of this issue?

A

Invalid digital signature

B

Misconfigured S/MIME settings

C

Use of outdated SSL

D

TLS protocol not supported by recipient

Q32

Q32 What is the primary purpose of a firewall in network security?

A

To block all traffic

B

To filter incoming and outgoing traffic

C

To increase network speed

D

To provide encryption

Q33

Q33 Which type of attack floods a network with excessive traffic, making it unavailable to users?

A

Man-in-the-middle

B

Phishing

C

DoS

D

Ransomware

Q34

Q34 What is a key function of an Intrusion Detection System (IDS)?

A

Encrypting network data

B

Detecting unauthorized access

C

Blocking malicious traffic

D

Improving network performance

Q35

Q35 Which type of malware is specifically designed to take control of a network device without permission?

A

Worm

B

Adware

C

Spyware

D

Ransomware

Q36

Q36 What is the primary purpose of a Virtual Private Network (VPN)?

A

To provide encryption for email

B

To enable secure remote access

C

To increase bandwidth

D

To host web applications

Q37

Q37 Which of the following is the most secure method for securing wireless networks?

A

WEP

B

WPA

C

WPA2

D

None of the above

Q38

Q38 Which protocol is commonly used to securely access a remote computer over an unsecured network?

A

FTP

B

HTTP

C

SSH

D

Telnet

Q39

Q39 Which command can be used on Linux to view all active network connections?

A

netstat -a

B

ipconfig /all

C

ifconfig

D

ping -c

Q40

Q40 Which tool is commonly used to perform a vulnerability scan on a network?

A

Wireshark

B

Nessus

C

Nmap

D

Metasploit

Q41

Q41 Which command-line tool can be used to analyze network packets in real-time?

A

netstat

B

Wireshark

C

ping

D

tcpdump

Q42

Q42 A network administrator detects unauthorized access attempts from an internal IP address. What is the immediate action they should take?

A

Disable the firewall

B

Ignore the activity

C

Investigate and isolate the IP

D

Change the network password

Q43

Q43 A network experiences repeated outages during peak business hours. What could be the most likely cause?

A

Outdated firewall

B

Weak encryption

C

Bandwidth overload

D

DNS misconfiguration

Q44

Q44 An employee reports that they are unable to access a secure company network using the VPN. What could be the reason?

A

Incorrect VPN credentials

B

Firewall block

C

Weak encryption

D

Misconfigured network interface

Q45

Q45 What is the purpose of input validation in application security?

A

To enhance user experience

B

To prevent SQL injections

C

To increase speed

D

To improve design

Q46

Q46 Which of the following is a common method used to ensure the security of web applications?

A

CAPTCHA

B

Data mining

C

Packet sniffing

D

Spam filters

Q47

Q47 What is the role of OWASP (Open Web Application Security Project) in application security?

A

Creating viruses

B

Providing application security guidelines

C

Selling security software

D

Developing firewalls

Q48

Q48 Which of the following is considered a key security risk in web applications, according to OWASP’s Top 10?

A

Broken access control

B

Overly complex design

C

Slow performance

D

Insufficient testing

Q49

Q49 What is Cross-Site Scripting (XSS) in application security?

A

Sending spam messages

B

Injecting malicious scripts into a web page

C

Bypassing a firewall

D

Encrypting sensitive data

Q50

Q50 What is the difference between authentication and authorization in application security?

A

Authentication verifies identity, authorization grants access

B

Authentication grants access, authorization verifies identity

C

They are the same

D

Authorization happens first

Q51

Q51 Which of the following is a critical risk in mobile application security?

A

Encryption

B

Buffer overflow

C

Phishing

D

Data leakage

Q52

Q52 Which Python library is commonly used for securing Flask web applications from Cross-Site Scripting (XSS)?

A

re

B

flask_security

C

html5lib

D

escape

Q53

Q53 Which command in Linux can be used to check the permissions of a file to ensure secure access control?

A

chmod

B

ls -l

C

cat

D

mv

Q54

Q54 How do you protect an application from SQL injection attacks in PHP using prepared statements?

A

By using raw SQL queries

B

By using exec() function

C

By using prepared statements

D

By disabling database connections

Q55

Q55 In Java, which library is typically used to implement encryption and decryption functions for securing sensitive data?

A

java.util

B

javax.crypto

C

java.sql

D

java.io

Q56

Q56 A developer notices that an application crashes when provided with large input data. What could be the reason for this issue?

A

Weak encryption

B

Buffer overflow

C

Incorrect authentication

D

SQL injection

Q57

Q57 A user is experiencing slow response times in a web application after logging in. What might be the cause?

A

Incorrect password

B

Denial-of-service attack

C

Improper session handling

D

Cross-site scripting

Q58

Q58 A vulnerability scan reveals that an application is leaking sensitive data through error messages. What is the most appropriate solution?

A

Disable logging

B

Sanitize error messages

C

Increase encryption

D

Close the application

Q59

Q59 What is the main role of an antivirus program in operating system security?

A

To speed up the system

B

To prevent malware

C

To compress files

D

To improve system updates

Q60

Q60 Which of the following is a common security measure to protect operating systems from unauthorized access?

A

Using a strong password

B

Disabling file compression

C

Enabling automatic updates

D

Using default usernames

ad verticalad vertical
ad