cyber-security banner

Cyber Security Multiple Choice Questions (MCQs) and Answers

Master Cyber Security with Practice MCQs. Explore our curated collection of Multiple Choice Questions. Ideal for placement and interview preparation, our questions range from basic to advanced, ensuring comprehensive coverage of Cyber Security concepts. Begin your placement preparation journey now!

Q61

Q61 What is the purpose of access control in operating system security?

A

To monitor system performance

B

To control file sizes

C

To grant or deny access to system resources

D

To create backup copies

Q62

Q62 What is the role of the kernel in an operating system's security architecture?

A

It provides network connectivity

B

It manages file storage

C

It enforces security policies

D

It handles system updates

Q63

Q63 Which of the following is a common type of attack that targets operating systems?

A

Man-in-the-middle

B

Denial-of-service

C

Rootkit

D

Phishing

Q64

Q64 What is the purpose of a system call in an operating system?

A

To allow applications to request services from the kernel

B

To execute network requests

C

To manage power settings

D

To format the disk

Q65

Q65 Which of the following best describes "sandboxing" in operating system security?

A

Running applications in isolation

B

Encrypting all system data

C

Reducing file sizes

D

Increasing disk space

Q66

Q66 Which Linux command is used to change file permissions to secure files?

A

cp

B

chmod

C

ls

D

rm

Q67

Q67 Which Windows command-line tool is used to check for system file integrity and repair issues?

A

ping

B

sfc

C

dir

D

taskkill

Q68

Q68 How can you securely remove a file in Linux to prevent data recovery?

A

mv

B

rm

C

shred

D

cp

Q69

Q69 A user complains that they cannot modify a system file. What could be the reason?

A

The file is encrypted

B

The file is read-only

C

The file is corrupted

D

The file is compressed

Q70

Q70 An administrator notices that the system is running slow due to high CPU usage by an unknown process. What could be the reason?

A

Antivirus running

B

New updates available

C

Malware

D

File compression

Q71

Q71 A Windows machine keeps crashing with a blue screen error. What might be the cause?

A

Software installation

B

Hardware failure

C

Power outage

D

File compression

Q72

Q72 What is the main goal of malware?

A

To enhance system performance

B

To steal, damage, or manipulate data

C

To block antivirus software

D

To improve security

Q73

Q73 Which type of malware replicates itself and spreads across networks without user interaction?

A

Virus

B

Worm

C

Trojan

D

Ransomware

Q74

Q74 What is the purpose of ransomware in a cyber attack?

A

To demand payment for releasing encrypted data

B

To destroy the victim’s data

C

To hide malicious files

D

To improve system performance

Q75

Q75 Which type of malware disguises itself as legitimate software to trick users into installing it?

A

Trojan

B

Worm

C

Virus

D

Adware

Q76

Q76 What is the key difference between a virus and a worm in malware behavior?

A

A worm needs user interaction, while a virus spreads automatically

B

A virus needs user interaction, while a worm spreads automatically

C

They both require user interaction

D

Both spread automatically

Q77

Q77 Which tool is commonly used to analyze malware behavior in a safe environment?

A

Task Manager

B

Wireshark

C

Sandbox

D

Control Panel

Q78

Q78 How can you detect malware activity on a system using a Linux command?

A

cat

B

top

C

ls

D

chmod

Q79

Q79 In which programming language is most ransomware typically written?

A

Python

B

Java

C

C++

D

C#

Q80

Q80 A user reports that their files have been renamed with a strange extension and cannot be opened. What type of malware could this be?

A

Adware

B

Ransomware

C

Spyware

D

Trojan

Q81

Q81 A system administrator notices unusual outbound traffic from a workstation that shouldn't be communicating externally. What could be the cause?

A

Routine updates

B

Malware infection

C

Firewall rules

D

Software update failure

Q82

Q82 A user’s system is running unusually slow, and multiple unknown processes are consuming high CPU usage. What should the next step be?

A

Ignore the issue

B

Terminate all processes

C

Run a malware scan

D

Reinstall the system

Q83

Q83 What is the primary goal of incident response in cybersecurity?

A

To identify system updates

B

To restore normal operations quickly

C

To punish attackers

D

To enhance system performance

Q84

Q84 Which phase of the incident response process involves containment and eradication of the threat?

A

Identification

B

Preparation

C

Containment

D

Recovery

Q85

Q85 In digital forensics, what is the importance of maintaining a proper chain of custody for evidence?

A

To ensure the integrity of the evidence

B

To increase the cost of investigation

C

To destroy irrelevant data

D

To speed up the analysis

Q86

Q86 Which type of attack is most commonly investigated in digital forensics?

A

Social engineering

B

Phishing

C

Denial-of-service

D

Data breach

Q87

Q87 What is the primary role of a digital forensic examiner during an investigation?

A

To punish the attackers

B

To perform live system updates

C

To collect and analyze digital evidence

D

To develop new malware

Q88

Q88 Which Linux tool is commonly used for creating disk images during forensic investigations?

A

grep

B

dd

C

chmod

D

cat

Q89

Q89 Which forensic tool is used to analyze network traffic for evidence of malicious activity?

A

Nmap

B

Wireshark

C

GIMP

D

Nessus

Q90

Q90 In a forensic investigation, how would you recover deleted files from a hard drive?

A

By using ping

B

By using data recovery software

C

By reinstalling the OS

D

By disabling the firewall

ad verticalad vertical
ad