Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Cyber Security MCQs

 

#1. Which of the following is a method for securing a mobile device if it is lost or stolen?

#2. What is the term for a technique used to gain unauthorized access to a system by exploiting human psychology?

#3. Which encryption protocol is commonly used to secure email communication?

#4. What is the purpose of a security policy in an organization?

#5. Which of the following is an example of a strong authentication factor?

#6. What is the term for a program that self-replicates and spreads to other computers or devices over a network?

#7. Which of the following is NOT a common method for protecting against phishing attacks?

#8. What is the term for a security breach that occurs when an attacker gains unauthorized physical access to a computer or network equipment?

#9. Which of the following is NOT a recommended method for securing a Wi-Fi network?

#10. What is the purpose of a security audit?

#11. What is the term for a technique used to verify the authenticity of a message or document?

#12. Which of the following is a common social engineering technique that involves impersonating a trusted entity in order to trick individuals into revealing sensitive information?

#13. What is the primary goal of a security incident response plan?

#14. Which type of attack involves flooding a network or server with excessive traffic to make it unavailable to legitimate users?

#15. What is the term for the practice of gaining unauthorized access to a system by exploiting software vulnerabilities?

#16. Which encryption algorithm is commonly used for securing web traffic (e.g., HTTPS)?

#17. What is the term for the process of masking sensitive information to protect it from unauthorized access?

#18. Which of the following is a type of physical security control used to restrict access to a secure area based on biometric data?

#19. What is the purpose of network segmentation in cybersecurity?

#20. What is the term for a process that verifies the integrity of data by comparing it to a known value or checksum?

Results

Categories MCQ