Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Cyber Security MCQs

#1. What is a common method for protecting sensitive information on a mobile device?

#2. What does the acronym IDS stand for in the context of cybersecurity?

#3. What is the term for a program that appears to be useful or legitimate, but actually carries out malicious activities in the background?

#4. Which of the following is NOT a recommended method for securing a Wi-Fi network?

#5. What is the purpose of a security audit?

#6. What is the term for a technique used to verify the authenticity of a message or document?

#7. Which of the following is a common social engineering technique that involves impersonating a trusted entity in order to trick individuals into revealing sensitive information?

#8. What is the primary goal of a security incident response plan?

#9. Which type of attack involves flooding a network or server with excessive traffic to make it unavailable to legitimate users?

#10. What is the term for the practice of gaining unauthorized access to a system by exploiting software vulnerabilities?

#11. Which encryption algorithm is commonly used for securing web traffic (e.g., HTTPS)?

#12. What is the term for the process of masking sensitive information to protect it from unauthorized access?

#13. Which of the following is a type of physical security control used to restrict access to a secure area based on biometric data?

#14. What is the purpose of network segmentation in cybersecurity?

#15. What is the term for a process that verifies the integrity of data by comparing it to a known value or checksum?

#16. Which of the following is a common method for protecting against SQL injection attacks?

#17. What is the purpose of a security awareness training program for employees?

#18. What is the term for a program that replicates itself and spreads to other computers or devices through removable media?

#19. Which of the following is a recommended practice for securely disposing of paper documents containing sensitive information?

#20. What is the term for a software program that monitors and filters incoming and outgoing network traffic based on an applied rule set?

Results

Categories MCQ