Search Your Question...!

Cyber Security MCQ's

1. Which of these are Personally Identifiable Information?

   View Answer   

   All



2. Which of these is an anti-virus program

   View Answer   

   All



3. What is PUP?

   View Answer   

   Potentially Unwanted Pgm



4. Internet can impose a number of Risks and hence Cybersecurity is required.

   View Answer   

   True



5. ________ monitors user activity on internet and transmit that information in the background to someone else.

   View Answer   

   Spy ware




6. Which of these are cyber threats?

   View Answer   

   All



7. Unsolicited commercial email is known as 

   View Answer   

   Spam



8. In symmetric-key cryptography, the same key is used by

   View Answer   

   Both



9. The sole purpose of ________ attack, is to fool the victim and to get all the confidential information

   View Answer   

   Phishing



10. The Cryptography can provide

   View Answer   

   All



11. In Symmetric-key cryptography, the key used by the sender and the receiver is

   View Answer   

   Shared



12. Risk represents ________

   View Answer   

   threats,Vul



13. If there is a vulnerability but no threat, then there won't be a risk.

   View Answer   

   True



14. is the guarantee of data privacy and protection against unauthorized disclosure.

   View Answer   

   Confi



15. Cryptography, a word with Greek origins, means

   View Answer   

   Secret writing



16. Detection and Analysis is a continuous process of a cyber-attack for detecting Malware intrusion and their remote connections.

   View Answer   

   True



17. Which is a part of a response phase activities ?

   View Answer   

   Pre-ap



18. Which is not part of a response follow-up activities ?

   View Answer   

   Take appropriate



19. Which is a open source data loss prevention solution.

   View Answer   

   MYDLP



20. Incidents should be handled on a first come- first serve basis and must be prioritized based on the Business impact.

   View Answer   

   False



21. Which is not part of a Incident Response Preparation phase ?

   View Answer   

   Defining Obj



22. Deep packet inspection can be used to give more context to indicator only.

   View Answer   

   False



23. How do we define RADIUS?

   View Answer   

   Remote Authentication Dial-In User Service



24. Which of these are Threats related to Email Security?

   View Answer   

   All



25. Which of these is true with respect to passwords?

   View Answer   

   atleast 8



26. Which of these are examples biometrics?

   View Answer   

   all



27. Phishing emails include fake notifications from banks and e-payment systems.

   View Answer   

   True



28. A ________ is a credit card sized card with an embedded chip, containing information about the user

   View Answer   

   SC



29. As an email client, we should not use caution when opening emails and can download any attachments.

   View Answer   

   False



30. It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.

   View Answer   

   FW



31. Cybersecurity threat is a scenario which will try to exploit possible vulnerabilities to enhance security

   View Answer   

   False



32. Which is not part of a threat Modelling process ?

   View Answer   

   Comp



33. Which is not part of a threat Modelling process ?

   View Answer   

   ARisk



34. The altering of data so that it is not usable unless the changes are undone is

   View Answer   

   Encryption



35. Network layer firewall works as a 

   View Answer   

   PF



36. At Operational level threat intelligence real time feed protocols are being used.

   View Answer   

   True



37. Which one will not be considered in Cybersecurity threat Intrusion Phases ?

   View Answer   

   Alliance



38. Which is not a set of activity performed to prevent future incidents in Incident management?

   View Answer   

   Mitigate



39. UEBA stands for

   View Answer   

   User and Entity Behavior Analytics



40. Which is not a characteristics of Advanced Persistent threats ?

   View Answer   

   FA



41. In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is 

   View Answer   

   short



42. Which helps to prevent the cyber-attacks using various security related tools, policies, best practices and guidelines ?

   View Answer   

   TM



43. At Strategic level threat intelligence information can be exchanged within it's operating community

   View Answer   

   False



44. Which helps to predict the cybersecurity potential risks effectively

   View Answer   

   PH



45. Detection and Analysis is a continuous process of a cyber-attack for detecting Malware intrusion and their remote connections

   View Answer   

   True



46. A ________ is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.

   View Answer   

   VPN



No comments:

Post a Comment