cyber-security banner

Cyber Security Multiple Choice Questions (MCQs) and Answers

Master Cyber Security with Practice MCQs. Explore our curated collection of Multiple Choice Questions. Ideal for placement and interview preparation, our questions range from basic to advanced, ensuring comprehensive coverage of Cyber Security concepts. Begin your placement preparation journey now!

Q91

Q91 A company detects a security breach but the attacker is still active on the network. What should be the immediate next step?

A

Erase all data

B

Perform a live capture of network activity

C

Ignore the issue

D

Update antivirus software

Q92

Q92 During a forensic investigation, you find encrypted files on a suspect’s device. What is the most appropriate next step?

A

Delete the files

B

Attempt to crack the encryption

C

Erase the hard drive

D

Ignore the files

Q93

Q93 An investigator finds that log files have been tampered with during a forensic investigation. What should be done next?

A

Erase the logs

B

Analyze alternative evidence

C

Update the software

D

Restart the system

Q94

Q94 What is the main purpose of data encryption?

A

To increase storage capacity

B

To secure data from unauthorized access

C

To improve network speed

D

To reduce file sizes

Q95

Q95 Which regulation governs data protection and privacy in the European Union?

A

GDPR

B

HIPAA

C

PCI-DSS

D

ISO 27001

Q96

Q96 What is the primary purpose of data masking in data privacy?

A

To enhance file security

B

To protect sensitive information in non-production environments

C

To compress large data sets

D

To improve application speed

Q97

Q97 Which of the following is considered a violation of data privacy?

A

Encrypting customer data

B

Sharing personal information without consent

C

Backing up sensitive data

D

Implementing access control

Q98

Q98 Which Python library is commonly used for implementing data encryption?

A

hashlib

B

numpy

C

requests

D

cryptography

Q99

Q99 Which SQL command is used to anonymize personal information in a database?

A

SELECT

B

UPDATE

C

DELETE

D

ANONYMIZE

Q100

Q100 In Java, how can you implement AES encryption to secure sensitive data?

A

By using javax.crypto

B

By using java.net

C

By using java.util.Scanner

D

By using java.sql

Q101

Q101 A user reports that their personal data is being shared without their consent. What is the most likely violation?

A

Data breach

B

Compliance issue

C

Misconfigured access controls

D

Privacy violation

Q102

Q102 A company’s data backup system is not encrypting the stored data. What is the immediate risk?

A

Increased data integrity

B

Increased data exposure

C

Faster access times

D

Reduced storage space

Q103

Q103 During an audit, it is discovered that an application is storing user passwords in plain text. What is the recommended solution?

A

Encrypt the passwords

B

Use stronger passwords

C

Delete the passwords

D

Use email-based login

Q104

Q104 What is the primary concern of cloud security?

A

Data availability

B

Cost optimization

C

Data confidentiality and integrity

D

Network speed

Q105

Q105 Which security model is most commonly used in cloud computing to restrict access to resources?

A

Role-based access control (RBAC)

B

Least privilege

C

Administrator access

D

Discretionary access control (DAC)

Q106

Q106 What is the most effective method to ensure data privacy in a cloud storage system?

A

Compression

B

Data encryption

C

Tokenization

D

Backup

Q107

Q107 Which cloud service model poses the greatest security challenge due to customer responsibility for data protection?

A

IaaS(Infrastructure as a Service)

B

PaaS (Platform as a Service)

C

SaaS (Software as a Service)

D

DaaS (Desktop as a Service)

Q108

Q108 Which of the following is a significant risk of using a public cloud service?

A

Faster performance

B

Vendor lock-in

C

Data breaches

D

Reduced flexibility

Q109

Q109 Which command-line tool can be used to encrypt data before uploading it to a cloud storage service in Linux?

A

ssh

B

gpg

C

chmod

D

scp

Q110

Q110 In AWS, how can you enforce encryption for data at rest in an S3 bucket?

A

By using HTTPS

B

By enabling Server-Side Encryption (SSE)

C

By disabling public access

D

By using MFA

Q111

Q111 Which API can be used in Google Cloud Platform (GCP) to control access to cloud resources?

A

Cloud Storage API

B

IAM API

C

Compute Engine API

D

BigQuery API

Q112

Q112 A company notices unauthorized access to its cloud resources from an unfamiliar IP address. What should be the immediate action?

A

Reboot the servers

B

Restrict access and investigate

C

Ignore the activity

D

Block all traffic

Q113

Q113 During a cloud security audit, it is discovered that sensitive data is being transmitted without encryption. What is the recommended action?

A

Ignore the issue

B

Encrypt the data in transit

C

Delete the sensitive data

D

Move to a private cloud

Q114

Q114 What is the biggest security challenge with IoT devices?

A

Limited bandwidth

B

Lack of encryption

C

Inconsistent software updates

D

Weak processing power

Q115

Q115 Which type of attack is most commonly associated with IoT devices?

A

Man-in-the-middle attack

B

Denial-of-service attack

C

Ransomware attack

D

Botnet attack

Q116

Q116 Why is device authentication critical in IoT security?

A

To reduce power consumption

B

To enhance processing speed

C

To ensure that only authorized devices can communicate

D

To decrease network traffic

Q117

Q117 What is the risk of hardcoded credentials in IoT devices?

A

They provide faster access

B

They can be easily compromised by attackers

C

They increase performance

D

They simplify updates

Q118

Q118 Which protocol is commonly used to secure communication between IoT devices?

A

HTTP

B

CoAP

C

MQTT

D

HTTPS

Q119

Q119 How can you secure firmware updates on IoT devices to prevent tampering?

A

By using unencrypted channels

B

By disabling updates

C

By using code signing

D

By using HTTP

Q120

Q120 In Python, which library can be used to implement encryption for securing data in an IoT device?

A

random

B

cryptography

C

math

D

socket

ad verticalad vertical
ad