Cyber security MCQs

WhatsApp Channel Join Now
Telegram Group Join Now

31. Which of the following is an example of a multi-factor authentication (MFA) method?
A) Password and security question
B) Password and biometric authentication
C) Security token and biometric authentication
D) Password and fingerprint

View Answer >

32. What is the term for the process of intentionally misleading hackers or attackers in order to protect an organization’s assets?
A) Honeypot
B) Firewall
C) Encryption
D) IDS

View Answer >

33. Which type of cybersecurity attack involves hackers intercepting and modifying communication between two parties in order to steal data or execute a malicious action?
A) Man-in-the-middle attack
B) Ransomware attack
C) DDoS attack
D) Phishing attack

View Answer >

34. Which of the following is an example of a vulnerability scanning tool?
A) Nessus
B) Snort
C) Metasploit
D) Wireshark

View Answer >

35. Which type of cybersecurity attack involves hackers gaining access to a system by sending an email or message that appears to be from a legitimate source and tricks the recipient into taking a specific action?
A) Phishing attack
B) DDoS attack
C) Man-in-the-middle attack
D) Ransomware attack

View Answer >

36. What is the term for the process of granting or denying access to an organization’s resources based on the identity and permissions of the user or device?
A) Identity and access management
B) Network security
C) Vulnerability management
D) Penetration testing

View Answer >

37. Which of the following is NOT an example of a cyber incident response team role?
A) Recovery specialist
B) Forensic analyst
C) Communications coordinator
D) Sales representative

View Answer >

38. Which type of cybersecurity attack involves hackers encrypting an organization’s data and demanding payment in exchange for the decryption key?
A) Ransomware attack
B) Phishing attack
C) DDoS attack
D) Man-in-the-middle attack

View Answer >

39. Which of the following is a protocol used to transfer files over the internet securely?
A) FTPS
B) HTTPS
C) SMTP
D) SSH

View Answer >

40. Which type of cybersecurity attack involves hackers flooding a system or network with traffic in order to make it unavailable to users?
A) DDoS attack
B) Ransomware attack
C) Phishing attack
D) SQL injection attack

View Answer >


WhatsApp Channel Join Now
Telegram Group Join Now

Leave a Comment

This will close in 0 seconds

telegram Join Telegram
Join Now Join Now