Cyber security MCQs

WhatsApp Channel Join Now
Telegram Group Join Now

11. What is the term for software that is designed to damage, disrupt, or take control of a computer system?
A) Firewall
B) Malware
C) Spyware
D) Adware

View Answer >

12. Which type of cybersecurity attack involves hackers encrypting a victim’s data and demanding payment for the decryption key?
A) Trojan horse attack
B) Ransomware attack
C) Phishing attack
D) Man-in-the-middle attack

View Answer >

13. Which type of cybersecurity attack involves hackers flooding a network with traffic in order to overwhelm and shut it down?
A) DDoS attack
B) SQL injection attack
C) Advanced persistent threat
D) Zero-day attack

View Answer >

14. Which of the following is NOT an example of a cybersecurity risk?
A) Unpatched software vulnerabilities
B) Weak passwords
C) Natural disasters
D) Social engineering attacks

View Answer >

15. Which type of cybersecurity attack involves hackers using email or messaging platforms to send malicious links or attachments to victims?
A) Ransomware attack
B) Spear phishing attack
C) Advanced persistent threat
D) Zero-day attack

View Answer >

16. Which of the following is a cybersecurity framework developed by the National Institute of Standards and Technology (NIST)?
A) CIS Controls
B) ISO 27001
C) COBIT
D) NIST Cybersecurity Framework

View Answer >

17. Which of the following is NOT an example of a firewall?
A) Network firewall
B) Host-based firewall
C) Antivirus software
D) Web application firewall

View Answer >

18. What is the term for the process of hiding information within another file, such as an image or audio file?
A) Encryption
B) Hashing
C) Steganography
D) Decryption

View Answer >

19. Which type of cybersecurity attack involves hackers exploiting a vulnerability in a web application to access data or take control of the system?
A) SQL injection attack
B) DDoS attack
C) Man-in-the-middle attack
D) Ransomware attack

View Answer >

20. What is the term for the process of detecting, analyzing, and responding to cybersecurity incidents?
A) Incident response
B) Vulnerability management
C) Risk assessment
D) Threat intelligence

View Answer >


WhatsApp Channel Join Now
Telegram Group Join Now

Leave a Comment

This will close in 0 seconds

telegram Join Telegram
Join Now Join Now