Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Cyber Security MCQs

 

#1. Which of the following is a common method for protecting against SQL injection attacks?

#2. What is the purpose of a security awareness training program for employees?

#3. What is the term for a program that replicates itself and spreads to other computers or devices through removable media?

#4. Which of the following is a recommended practice for securely disposing of paper documents containing sensitive information?

#5. What is the term for a software program that monitors and filters incoming and outgoing network traffic based on an applied rule set?

#6. Which of the following is a method for securing a mobile device if it is lost or stolen?

#7. What is the term for a technique used to gain unauthorized access to a system by exploiting human psychology?

#8. Which encryption protocol is commonly used to secure email communication?

#9. What is the purpose of a security policy in an organization?

#10. Which of the following is an example of a strong authentication factor?

#11. What is the term for a program that self-replicates and spreads to other computers or devices over a network?

#12. Which of the following is NOT a common method for protecting against phishing attacks?

#13. What is the term for a security breach that occurs when an attacker gains unauthorized physical access to a computer or network equipment?

#14. Which of the following is an example of a biometric authentication method?

#15. What is the purpose of a honey pot in cybersecurity?

#16. What is the term for a piece of code that exploits a software vulnerability to carry out an attack?

#17. Which of the following is a best practice for secure disposal of electronic devices?

#18. Which encryption algorithm is commonly used for secure communication on the internet?

#19. What is the term for a program or set of programs that carry out a coordinated attack on a target system or network?

#20. What is the purpose of a firewall in network security?

Finish

Results

Categories MCQ