Introduction to Cyber Security # MCQs Practice set

Q.1 What does 'cyber security' primarily deal with?

Protecting physical property
Securing computer systems and networks
Building computer hardware
Designing video games
Explanation - Cyber security is the practice of protecting computer systems, networks, and data from digital attacks.
Correct answer is: Securing computer systems and networks

Q.2 Which of the following is an example of malware?

Firewall
Trojan horse
VPN
Encryption
Explanation - A Trojan horse is a type of malware disguised as legitimate software to trick users into installing it.
Correct answer is: Trojan horse

Q.3 What does 'phishing' mean?

Fishing with a net
Tricking people into revealing sensitive information
Encrypting messages
Protecting a computer with a password
Explanation - Phishing is a social engineering attack where attackers disguise as trustworthy entities to steal personal information.
Correct answer is: Tricking people into revealing sensitive information

Q.4 Which of these is the strongest password?

123456
qwerty
P@ssw0rd123!
password
Explanation - A strong password includes uppercase, lowercase, numbers, and special characters.
Correct answer is: P@ssw0rd123!

Q.5 What does a firewall do?

Stores passwords
Protects against physical theft
Monitors and filters network traffic
Scans for malware only
Explanation - A firewall controls incoming and outgoing network traffic based on security rules.
Correct answer is: Monitors and filters network traffic

Q.6 Which is considered a social engineering attack?

SQL injection
Phishing email
DDoS attack
Man-in-the-middle
Explanation - Phishing is a social engineering technique to trick users into sharing confidential information.
Correct answer is: Phishing email

Q.7 What is the main goal of encryption?

Speeding up networks
Making data unreadable without a key
Deleting sensitive files
Storing backups
Explanation - Encryption converts data into unreadable form to protect it from unauthorized access.
Correct answer is: Making data unreadable without a key

Q.8 Which one is an example of multi-factor authentication?

Only entering a password
Fingerprint + password
PIN only
Security question only
Explanation - Multi-factor authentication uses two or more verification methods, such as a password and a fingerprint.
Correct answer is: Fingerprint + password

Q.9 What does 'DDoS' stand for?

Distributed Denial of Service
Digital Download of Software
Data Division over Systems
Direct Domain of Servers
Explanation - A DDoS attack overwhelms a server with traffic from multiple sources, causing disruption.
Correct answer is: Distributed Denial of Service

Q.10 Which of the following is a type of cyber attack?

Phishing
Vaccination
Debugging
Programming
Explanation - Phishing is a type of cyber attack where attackers impersonate trusted entities.
Correct answer is: Phishing

Q.11 Which of these is a secure protocol for web communication?

HTTP
FTP
HTTPS
SMTP
Explanation - HTTPS (HyperText Transfer Protocol Secure) encrypts communication between browsers and servers.
Correct answer is: HTTPS

Q.12 What is the main purpose of a VPN?

To block viruses
To increase download speed
To create a secure, private network connection
To store files
Explanation - A VPN encrypts internet traffic and hides your IP address, making browsing more private.
Correct answer is: To create a secure, private network connection

Q.13 Which type of malware locks files and demands ransom?

Spyware
Adware
Ransomware
Worm
Explanation - Ransomware encrypts data and demands payment for its release.
Correct answer is: Ransomware

Q.14 What does 'CIA' stand for in cyber security?

Central Intelligence Agency
Confidentiality, Integrity, Availability
Cyber Information Act
Critical Internet Access
Explanation - CIA triad represents the three core principles of cyber security.
Correct answer is: Confidentiality, Integrity, Availability

Q.15 Which of these is an example of strong cyber hygiene?

Using the same password everywhere
Ignoring software updates
Regularly updating antivirus
Clicking unknown links
Explanation - Updating antivirus helps protect against the latest threats.
Correct answer is: Regularly updating antivirus

Q.16 What is two-factor authentication (2FA)?

Using two firewalls
Using two different devices
Using two verification methods
Using two passwords only
Explanation - 2FA requires two different ways to verify identity, increasing account security.
Correct answer is: Using two verification methods

Q.17 Which attack involves secretly listening to network communications?

Phishing
Eavesdropping
Spoofing
Rootkit
Explanation - Eavesdropping attacks capture and monitor network communications without permission.
Correct answer is: Eavesdropping

Q.18 What is a zero-day attack?

An attack that lasts zero seconds
An attack exploiting a previously unknown vulnerability
A failed attack
An attack on the first day of the year
Explanation - Zero-day attacks exploit vulnerabilities before developers release patches.
Correct answer is: An attack exploiting a previously unknown vulnerability

Q.19 Which is an example of biometric authentication?

PIN
Fingerprint
Password
Security question
Explanation - Biometric authentication uses unique biological traits like fingerprints or facial recognition.
Correct answer is: Fingerprint

Q.20 Which term refers to disguising malicious code within normal code?

Obfuscation
Decryption
Debugging
Compression
Explanation - Obfuscation hides malicious intent by making code harder to understand.
Correct answer is: Obfuscation

Q.21 What is spyware designed to do?

Protect your data
Encrypt files
Steal user information secretly
Destroy hardware
Explanation - Spyware monitors user activity and steals sensitive information without consent.
Correct answer is: Steal user information secretly

Q.22 What is the role of an Intrusion Detection System (IDS)?

Blocking malware
Detecting unauthorized activities in networks
Encrypting data
Backing up data
Explanation - IDS monitors systems and networks for malicious or suspicious activity.
Correct answer is: Detecting unauthorized activities in networks

Q.23 Which is NOT an example of malware?

Virus
Worm
Firewall
Trojan
Explanation - Firewall is a security measure, not malware.
Correct answer is: Firewall

Q.24 Which of these is an ethical hacking practice?

Phishing for data
Performing penetration testing
Spreading worms
Creating ransomware
Explanation - Ethical hackers test systems legally to identify and fix vulnerabilities.
Correct answer is: Performing penetration testing

Q.25 What is the purpose of hashing in cyber security?

To speed up file transfers
To convert data into a fixed-length value
To compress data
To encrypt passwords only
Explanation - Hashing creates unique values for data integrity verification, often used for passwords.
Correct answer is: To convert data into a fixed-length value