Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Cyber Security MCQs

#1. Which encryption protocol secures data transmitted over wireless networks?

#2. What is the primary goal of an ethical hacker?

#3. What is the term for the practice of tricking individuals into revealing confidential information?

#4. What does the acronym VPN stand for?

#5. Which of the following is an example of a physical security control?

#6. What is the term for a piece of code that exploits a software vulnerability to carry out an attack?

#7. Which of the following is a best practice for secure disposal of electronic devices?

#8. What is the purpose of a honey pot in cybersecurity?

#9. What is the term for a software program that appears to perform a legitimate function but actually carries out malicious activities?

#10. What is the purpose of a security policy in an organization?

#11. Which of the following is an example of a strong authentication factor?

#12. What is the term for a program that self-replicates and spreads to other computers or devices?

#13. Which of the following is NOT a common method for protecting against phishing attacks?

#14. What is the term for the process of converting encrypted data back into its original form?

#15. Which of the following is an example of a network security perimeter device?

#16. What is the term for a security breach that occurs when an attacker gains unauthorized physical access to a computer or network equipment?

#17. Which of the following is an example of a biometric authentication method?

#18. What is the term for the process of examining network traffic for suspicious activity or patterns?

#19. Which encryption algorithm is commonly used for secure communication on the internet?

#20. What is the term for a program or set of programs that carry out a coordinated attack on a target system or network?

Results

Categories MCQ