Cyber security MCQs

WhatsApp Channel Join Now
Telegram Group Join Now

41. Which of the following is an example of a social engineering technique?
A) SQL injection
B) Cross-site scripting
C) Spear phishing
D) Man-in-the-middle attack

View Answer >

42. Which type of cybersecurity attack involves hackers gaining access to a system by exploiting a vulnerability in the web application software?
A) SQL injection attack
B) Cross-site scripting attack
C) Cross-site request forgery attack
D) All of the above

View Answer >

43. What is the term for the process of backing up important data and storing it in a separate location to protect against data loss or corruption?
A) Disaster recovery
B) Business continuity
C) Redundancy
D) Backups

View Answer >

44. Which type of cybersecurity attack involves hackers gaining access to a system by tricking a legitimate user into providing their login credentials?
A) Phishing attack
B) Man-in-the-middle attack
C) Ransomware attack
D) DDoS attack

View Answer >

45. Which type of cybersecurity attack involves hackers gaining access to a system by exploiting a vulnerability in the operating system or application software?
A) SQL injection attack
B) Cross-site scripting attack
C) Buffer overflow attack
D) Cross-site request forgery attack

View Answer >

46. Which of the following is an example of a cybersecurity control?
A) Firewall
B) Backup and recovery plan
C) Employee training program
D) All of the above

View Answer >

47. What is the term for the practice of hiding sensitive information by converting it into a code that can only be deciphered with a key?
A) Encryption
B) Firewall
C) IDS
D) Network segmentation

View Answer >

48. Which type of cybersecurity attack involves hackers gaining access to a system by exploiting a vulnerability in the wireless network?
A) SQL injection attack
B) Cross-site scripting attack
C) Man-in-the-middle attack
D) Rogue access point attack

View Answer >

49. Which of the following is a common tool used for network mapping and discovery?
A) Nessus
B) Wireshark
C) Nmap
D) Snort

View Answer >

50. Which type of cybersecurity attack involves hackers gaining access to a system by exploiting a vulnerability in the database management system?
A) SQL injection attack
B) Cross-site scripting attack
C) Cross-site request forgery attack
D) Buffer overflow attack

View Answer >


WhatsApp Channel Join Now
Telegram Group Join Now

Leave a Comment

This will close in 0 seconds

telegram Join Telegram
Join Now Join Now