Cyber Security Quiz Question and Answers
Q: Phishing emails include fake notifications from banks and e-payment systems.
- True
- False
Q: Threats can exploit assets if assets are not vulnerable.
- True
- False
Q: Malware cannot inflict physical damage to systems.
- True
- False
Q: An error message displayed on the system symbolizes virus infection.
- True
- False
Q: Which of the following malware is designed for advertising, such as pop-up screens?
- Adware (ans)
- Viruses
- Spyware
- Ransomware
Q: Which of the following is used to draw in users and infect them and deploy fast changing infrastructures?
- Honeynet
- Botnet
- Trojans
- Malnet
Q: _________________ is a device infected by malware, which becomes part of a network of infected devices administered by a single attacker or attack group.
- Bot
- Honeynet
- Rootkit
- Honeypot
- Time to Evaluate Your Understanding!
Q: The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security is called ___________.
- Spam
- Malware
- Malicious Program
- Potentially Unwanted Program
Q: Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
- Symmetric Key Encryption
- Assymmetric Key Encryption
Q: Which encryption method is more suitable for quickly encrypting large amounts of data?
- Assymmetric Key Encryption
- Symmetric Key Encryption
Q: ________ is designed to extract data from its host computer for marketing purposes.
- Ransomware
- Trojans
- Adware
- Spyware
Q: What is PUP?
- Potentially Unwanted Program
- Practially Unwanted Program
- Potentially Unwanted Procss
- Practically Unrelated Program
Q: What is the type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom?
- Ransomware
- Spyware
- Trojans
- Scareware
Q: The type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom is called __________.
- Trojans
- Scareware
- Ransomware
- Spyware
Q: Programs that are specifically designed to disrupt the performance of computers/networks are commonly known as __________.
- Ransomware
- Trojans
- Malware
- Virus
Q: The method of protecting programs, networks, and systems from digital attacks is commonly known as __________.
- Cryptography
- Cryptanalysis
- Cryptology
- Cybersecurity
Q: The security posture of an organization is defined by the ______ link in the chain.
- Weakest
- Strongest
- Average
Q: Which of the following attributes is not a PII?
- Date of Birth
- Credit Card Information
- IP Address
- Account Numbers
- Social Security Number
Q: The security attribute that aims to achieve data privacy and protection against unauthorized disclosure is called ____________.
- Integrity
- Authentication
- Availability
- Confidentiality
Q: As an application of cryptography, digital Signatures and MACs can be used for _____________.
- Authentication
- Confidentiality
- Availability
- Integrity
Q: Which of the following is an intangible asset?
- Trade Secrets
- Inventory and Machinery
- Business Premises
- Hardware components
Q: If a student gains unauthorized access to the student database and modifies his/her marks, what type of violation would it be?
- Integrity
- Confidentiality
- Both the options
Q: Which of the following is an attack against confidentiality?
- Password Attack
- DoS Attack
- Cross Site Scripting Attack
- Man in the Middle Attack
Q: Which of the following is an attack against availability?
- Birthday Attack
- DoS Attack
- Man in the Middle Attack
- Zero Day Attack
Q: The type of attack in which the attacker intercepts the information in transit without altering it.
- Active Attack
- Invasive Attack
- Passive Attack
Q: Choose the correct option.
- Risk=Threat/Vulnerability
- Risk=Threat*Vulnerability
- Threat=Risk*Vulnerability
- Vulnerability=Threat/Risk
Q: Which of these are Threats related to Email Security?
- Spoofing
- Pharming
- Phishing
- Spam
- All the options
Q: What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?
- Cryptography
- Encryption
- Cryptanalysis
- Cybersecurity
Q: Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?
- Availability
- Integrity
- Confidentiality
- Repudiation
Q: Passive attacks are considered a threat to _______.
- Authenticity
- Availability
- Confidentiality
- Integrity
Q: Which of the following attack methods aims to gather confidential information by deceiving the victim?
- Phishing
- Spoofing
- Drive-by Download
- Spamming
Q: A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is known as _________.
- Black Box Testing
- Dynamic Analysis
- Static Analysis
- Penetration Testing
Q: SABSA Framework is commonly represented as _______ SABSA matrix.
- 4x4
- 8x8
- 5x5
- 6x6
Q: A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
- Invisible Threats
- Hidden Threats
- Advanced Persistent Threats
- Malicious threats
Q: A proactive process to predict potential risks efficiently.
- Threat Modeling
- Threat Analysis
- Threat Hunting
- Threat Landscaping
Q: __________ is a proactive process to predict potential risks efficiently.
- Threat Hunting (ans)
- Threat Modelling
- Threat Analysis
- Threat Landscaping
Q: A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called _______________.
- Threat Modeling
- Threat Landscaping
- Threat Analysis
- Threat Hunting
Q: Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?
- Availability
- Confidentiality
- Integrity
- Repudiation
- Confidentiality and Integrity
Q: Which of the following are the three phases of Incident response maturity assessment?
- Prepare, Response, and Follow-up
- Prepare, Identify, and analyze
- Reconnaissance, Installation, Command, and control
- Identify, Decompose, and Mitigate
Q: Which of these is true with respect to passwords?
- Passwords need to be easy
- Passwords can be kept openly
- Passwords need to be atleast 8 chars of length
- None of the options
Q: How do we define RADIUS?
- Remote Authorization Dial-In User Service.
- Remote Authentication Dial-In User Service.
- Remote Authentication Service.
- Remote Authentication Dial-In Unified Service.
Q: A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is called ________.
- Static Analysis
- Black Box Testing
- Dynamic Analysis
- Penetration Testing
Q: The three chains of RADIUS Security are ___________________.
- Authentication, Availability, Accounting
- Authorization, Availability, Accounting
- Authentication, Authorization, Accounting
Q: An error message displayed on the system, symbolizes virus infection.
- True
- False
Q: A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is known as ______________.
- Malicious threats
- Advanced Persistent Threats
- Hidden Threats
- Invisible Threats
Q: As an application of cryptography, digital Signatures and MACs can be used for _____________.
- Confidentiality
- Integrity
- Availability
- Authentication
Q: The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.
- Encryption
- Cryptography
- Cryptanalysis
- Cryptology
Q: A pharming tactic in which the DNS table in a server is modified to deceive users by redirecting to fraudulent websites.
- DNS Phishing
- Smishing
- Vishing
- DNS Poisoning
Q: _________ is a standalone software that does not need human help/host program to spread.
- Ransomware
- Worm
- Trojan
- Virus
Q: _________ is commonly known for providing backdoor access to the system for malicious users.
- Rootkits
- Botnets
- Trojans
- Worms
Q: The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __________.
- Ransomware
- Spyware
- Rootkits
- Scareware
Q: _________ is a standalone software that does not need human help/host program to spread.
- Ransomware
- Trojan
- Virus
- Worm
Q: Which of the following is a physiological biometric that could be used for authentication?
- Signature
- Voice Recognition
- Facial Recognition
- Gait
- All the options
Q: Which of the following is an effective solution to ensure confidentiality?
- Logging and Auditing
- Encryption (ans)
- Network Monitoring
- Data Hiding
Q: The telephone version of phishing that exploits social engineering techniques is known as __________.
- Pharming
- Smishing
- Vishing
View More Quiz Question and Answers
👉 Cloud Computing Quiz