Cyber Security and Ethics # MCQs Practice set

Q.1 Which of the following is considered a strong password?

12345678
password
P@ssw0rd2025!
abcdef
Explanation - A strong password combines uppercase, lowercase, numbers, and special characters.
Correct answer is: P@ssw0rd2025!

Q.2 What does SSL stand for in cybersecurity?

Secure Socket Layer
System Security Layer
Secure System Login
Security Software Link
Explanation - SSL encrypts data transmitted between a browser and a server to ensure secure communication.
Correct answer is: Secure Socket Layer

Q.3 Phishing attacks primarily aim to:

Steal sensitive information
Install antivirus software
Update system firmware
Improve network speed
Explanation - Phishing uses deceptive emails or websites to trick users into revealing passwords, credit card numbers, etc.
Correct answer is: Steal sensitive information

Q.4 Two-factor authentication (2FA) provides security by:

Requiring only a password
Requiring two forms of verification
Blocking all suspicious IPs
Encrypting files on a disk
Explanation - 2FA combines something you know (password) and something you have (OTP, token) to increase security.
Correct answer is: Requiring two forms of verification

Q.5 Which of the following is a type of malware that demands ransom?

Spyware
Adware
Ransomware
Rootkit
Explanation - Ransomware encrypts files and demands payment for decryption.
Correct answer is: Ransomware

Q.6 What is the main purpose of a firewall?

Scan for viruses
Block unauthorized network access
Store backup data
Monitor CPU usage
Explanation - A firewall filters incoming and outgoing network traffic based on security rules.
Correct answer is: Block unauthorized network access

Q.7 In cybersecurity, what is 'social engineering'?

Hacking into social media accounts
Tricking people to divulge confidential info
Installing anti-virus software
Analyzing network traffic
Explanation - Social engineering manipulates humans rather than exploiting technical vulnerabilities.
Correct answer is: Tricking people to divulge confidential info

Q.8 Which of the following is a common method used to protect data at rest?

Encryption
Phishing
Spoofing
DDoS attack
Explanation - Encryption converts data into unreadable form for unauthorized users.
Correct answer is: Encryption

Q.9 Which one of these is an example of biometric authentication?

PIN code
Fingerprint scan
Security question
Password hint
Explanation - Biometric authentication uses physical characteristics like fingerprints or retina scans.
Correct answer is: Fingerprint scan

Q.10 A DDoS attack primarily targets:

Individual emails
Network or website availability
Password strength
Local storage devices
Explanation - DDoS (Distributed Denial of Service) overwhelms servers to make services unavailable.
Correct answer is: Network or website availability

Q.11 Which of the following is a legal act to protect computer systems in India?

Indian Penal Code
Information Technology Act, 2000
Consumer Protection Act
Companies Act
Explanation - The IT Act 2000 addresses cybercrime and electronic commerce in India.
Correct answer is: Information Technology Act, 2000

Q.12 Which is the safest method for online transactions?

Public Wi-Fi without VPN
HTTPS websites
Sharing card details via email
Using weak passwords
Explanation - HTTPS ensures encryption of data transmitted between user and website.
Correct answer is: HTTPS websites

Q.13 Spyware is designed to:

Steal sensitive information secretly
Enhance system performance
Block unauthorized access
Protect against malware
Explanation - Spyware monitors user activities without consent and transmits data to attackers.
Correct answer is: Steal sensitive information secretly

Q.14 Which of the following is NOT a type of malware?

Virus
Trojan
Router
Worm
Explanation - A router is a networking device, not malware.
Correct answer is: Router

Q.15 Ethical hacking is performed to:

Exploit systems illegally
Identify vulnerabilities to secure systems
Steal confidential data
Install malware for fun
Explanation - Ethical hackers test systems to strengthen security, following legal and ethical guidelines.
Correct answer is: Identify vulnerabilities to secure systems

Q.16 Which of the following protocols is used for secure email communication?

SMTP
HTTPS
POP3S/IMAPS
FTP
Explanation - POP3S and IMAPS encrypt email communication, unlike plain POP3/IMAP.
Correct answer is: POP3S/IMAPS

Q.17 Which cybercrime involves unauthorized copying or distribution of software?

Piracy
Phishing
Ransomware
Keylogging
Explanation - Software piracy is illegal reproduction and distribution without permission.
Correct answer is: Piracy

Q.18 Which of the following is considered a safe browsing practice?

Clicking on unknown links
Visiting HTTPS websites only
Using weak passwords
Sharing credentials publicly
Explanation - HTTPS encrypts data and ensures authenticity of the website.
Correct answer is: Visiting HTTPS websites only

Q.19 Zero-day vulnerability refers to:

A bug known but not fixed
A virus that spreads in zero seconds
Unauthorized network access
Expired SSL certificates
Explanation - Zero-day vulnerabilities are unknown to vendors and can be exploited before a patch is available.
Correct answer is: A bug known but not fixed

Q.20 Which of the following is an example of two-factor authentication?

Username and password
Password and OTP sent to mobile
Security question only
PIN code only
Explanation - Two-factor authentication requires two independent methods of verification.
Correct answer is: Password and OTP sent to mobile

Q.21 Which is an example of a strong encryption standard?

AES
DES
ROT13
Base64
Explanation - AES (Advanced Encryption Standard) is widely used for secure data encryption.
Correct answer is: AES

Q.22 Firewall rules are primarily used to:

Filter network traffic
Encrypt files
Recover deleted data
Monitor CPU usage
Explanation - Firewalls control network access by filtering traffic based on security rules.
Correct answer is: Filter network traffic

Q.23 Which of these is considered a social engineering attack?

Phishing email
Antivirus update
Firewall configuration
Two-factor authentication
Explanation - Phishing emails manipulate users into providing sensitive information.
Correct answer is: Phishing email

Q.24 Which of the following best describes a VPN?

Virtual Private Network
Virus Protection Network
Verified Password Node
Virtual Password Notifier
Explanation - A VPN encrypts internet traffic and masks your IP to protect privacy.
Correct answer is: Virtual Private Network