Cyber Security Quiz Q&A

Cyber Security Quiz Question and Answers

Q: Phishing emails include fake notifications from banks and e-payment systems.

  • True
  • False

Q: Threats can exploit assets if assets are not vulnerable.

  • True
  • False

Q: Malware cannot inflict physical damage to systems.

  • True
  • False

Q: An error message displayed on the system symbolizes virus infection.

  • True
  • False

Q: Which of the following malware is designed for advertising, such as pop-up screens?

  • Adware (ans)
  • Viruses
  • Spyware
  • Ransomware

Q: Which of the following is used to draw in users and infect them and deploy fast changing infrastructures?

  • Honeynet
  • Botnet
  • Trojans
  • Malnet

Q: _________________ is a device infected by malware, which becomes part of a network of infected devices administered by a single attacker or attack group.

  • Bot
  • Honeynet
  • Rootkit
  • Honeypot
  • Time to Evaluate Your Understanding!

Q: The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security is called ___________.

  • Spam
  • Malware
  • Malicious Program
  • Potentially Unwanted Program

Q: Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?

  • Symmetric Key Encryption
  • Assymmetric Key Encryption

Q: Which encryption method is more suitable for quickly encrypting large amounts of data?

  • Assymmetric Key Encryption
  • Symmetric Key Encryption

Q: ________ is designed to extract data from its host computer for marketing purposes.

  • Ransomware
  • Trojans
  • Adware
  • Spyware

Q: What is PUP?

  • Potentially Unwanted Program
  • Practially Unwanted Program
  • Potentially Unwanted Procss
  • Practically Unrelated Program

Q: What is the type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom?

  • Ransomware
  • Spyware
  • Trojans
  • Scareware

Q: The type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom is called __________.

  • Trojans
  • Scareware
  • Ransomware
  • Spyware

Q: Programs that are specifically designed to disrupt the performance of computers/networks are commonly known as __________.

  • Ransomware
  • Trojans
  • Malware
  • Virus

Q: The method of protecting programs, networks, and systems from digital attacks is commonly known as __________.

  • Cryptography
  • Cryptanalysis
  • Cryptology
  • Cybersecurity

Q: The security posture of an organization is defined by the ______ link in the chain.

  • Weakest
  • Strongest
  • Average

Q: Which of the following attributes is not a PII?

  • Date of Birth
  • Credit Card Information
  • IP Address
  • Account Numbers
  • Social Security Number

Q: The security attribute that aims to achieve data privacy and protection against unauthorized disclosure is called ____________.

  • Integrity
  • Authentication
  • Availability
  • Confidentiality

Q: As an application of cryptography, digital Signatures and MACs can be used for _____________.

  • Authentication
  • Confidentiality
  • Availability
  • Integrity

Q: Which of the following is an intangible asset?

  • Trade Secrets
  • Inventory and Machinery
  • Business Premises
  • Hardware components

Q: If a student gains unauthorized access to the student database and modifies his/her marks, what type of violation would it be?

  • Integrity
  • Confidentiality
  • Both the options

Q: Which of the following is an attack against confidentiality?

  • Password Attack
  • DoS Attack
  • Cross Site Scripting Attack
  • Man in the Middle Attack

Q: Which of the following is an attack against availability?

  • Birthday Attack
  • DoS Attack
  • Man in the Middle Attack
  • Zero Day Attack

Q: The type of attack in which the attacker intercepts the information in transit without altering it.

  • Active Attack
  • Invasive Attack
  • Passive Attack

Q: Choose the correct option.

  • Risk=Threat/Vulnerability
  • Risk=Threat*Vulnerability
  • Threat=Risk*Vulnerability
  • Vulnerability=Threat/Risk

Q: Which of these are Threats related to Email Security?

  • Spoofing
  • Pharming
  • Phishing
  • Spam
  • All the options

Q: What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?

  • Cryptography
  • Encryption
  • Cryptanalysis
  • Cybersecurity

Q: Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?

  • Availability
  • Integrity
  • Confidentiality
  • Repudiation

Q: Passive attacks are considered a threat to _______.

  • Authenticity
  • Availability
  • Confidentiality
  • Integrity

Q: Which of the following attack methods aims to gather confidential information by deceiving the victim?

  • Phishing
  • Spoofing
  • Drive-by Download
  • Spamming

Q: A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is known as _________.

  • Black Box Testing
  • Dynamic Analysis
  • Static Analysis
  • Penetration Testing

Q: SABSA Framework is commonly represented as _______ SABSA matrix.

  • 4x4
  • 8x8
  • 5x5
  • 6x6

Q: A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.

  • Invisible Threats
  • Hidden Threats
  • Advanced Persistent Threats
  • Malicious threats

Q: A proactive process to predict potential risks efficiently.

  • Threat Modeling
  • Threat Analysis
  • Threat Hunting
  • Threat Landscaping

Q: __________ is a proactive process to predict potential risks efficiently.

  • Threat Hunting (ans)
  • Threat Modelling
  • Threat Analysis
  • Threat Landscaping

Q: A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called _______________.

  • Threat Modeling
  • Threat Landscaping
  • Threat Analysis
  • Threat Hunting

Q: Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?

  • Availability
  • Confidentiality
  • Integrity
  • Repudiation
  • Confidentiality and Integrity

Q: Which of the following are the three phases of Incident response maturity assessment?

  • Prepare, Response, and Follow-up
  • Prepare, Identify, and analyze
  • Reconnaissance, Installation, Command, and control
  • Identify, Decompose, and Mitigate

Q: Which of these is true with respect to passwords?

  • Passwords need to be easy
  • Passwords can be kept openly
  • Passwords need to be atleast 8 chars of length
  • None of the options

Q: How do we define RADIUS?

  • Remote Authorization Dial-In User Service.
  • Remote Authentication Dial-In User Service.
  • Remote Authentication Service.
  • Remote Authentication Dial-In Unified Service.

Q: A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is called ________.

  • Static Analysis
  • Black Box Testing
  • Dynamic Analysis
  • Penetration Testing

Q: The three chains of RADIUS Security are ___________________.

  • Authentication, Availability, Accounting
  • Authorization, Availability, Accounting
  • Authentication, Authorization, Accounting

Q: An error message displayed on the system, symbolizes virus infection.

  • True
  • False

Q: A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is known as ______________.

  • Malicious threats
  • Advanced Persistent Threats
  • Hidden Threats
  • Invisible Threats

Q: As an application of cryptography, digital Signatures and MACs can be used for _____________.

  • Confidentiality
  • Integrity
  • Availability
  • Authentication

Q: The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.

  • Encryption
  • Cryptography
  • Cryptanalysis
  • Cryptology

Q: A pharming tactic in which the DNS table in a server is modified to deceive users by redirecting to fraudulent websites.

  • DNS Phishing
  • Smishing
  • Vishing
  • DNS Poisoning

Q: _________ is a standalone software that does not need human help/host program to spread.

  • Ransomware
  • Worm
  • Trojan
  • Virus

Q: _________ is commonly known for providing backdoor access to the system for malicious users.

  • Rootkits
  • Botnets
  • Trojans
  • Worms

Q: The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __________.

  • Ransomware
  • Spyware
  • Rootkits
  • Scareware

Q: _________ is a standalone software that does not need human help/host program to spread.

  • Ransomware
  • Trojan
  • Virus
  • Worm

Q: Which of the following is a physiological biometric that could be used for authentication?

  • Signature
  • Voice Recognition
  • Facial Recognition
  • Gait
  • All the options

Q: Which of the following is an effective solution to ensure confidentiality?

  • Logging and Auditing
  • Encryption (ans)
  • Network Monitoring
  • Data Hiding

Q: The telephone version of phishing that exploits social engineering techniques is known as __________.

  • Pharming
  • Smishing
  • Vishing

View More Quiz Question and Answers