Cyber Security MCQs with answers Page - 4

Here, you will find a collection of MCQ questions on Cyber Security. Go through these questions to enhance your preparation for upcoming examinations and interviews.

To check the correct answer, simply click the View Answer button provided for each question.

Have your own questions to contribute? Click the button below to share your MCQs with others!

+ Add Question

A

Admin • 802.91K Points
Coach

Q. What does a digital certificate verify?

  • (A) User's date of birth
  • (B) Source code quality
  • (C) Identity of a website or user
  • (D) Length of a password

A

Admin • 802.91K Points
Coach

Q. What is the function of a honeypot in cybersecurity?

  • (A) To clean malware
  • (B) To attract and monitor attackers
  • (C) To backup files
  • (D) To encrypt data

A

Admin • 802.91K Points
Coach

Q. What does the term 'zero trust' imply in network security?

  • (A) All users are trusted by default
  • (B) Only external users are trusted
  • (C) Trust is established once and never questioned again
  • (D) Never trust, always verify every access request

A

Admin • 802.91K Points
Coach

Q. Which of these is a common cybersecurity framework?

  • (A) NIST
  • (B) HTTPS
  • (C) HTTP
  • (D) BIOS

A

Admin • 802.91K Points
Coach

Q. Which type of malware can replicate itself to spread to other computers?

  • (A) Worm
  • (B) Trojan
  • (C) Ransomware
  • (D) Spyware

A

Admin • 802.91K Points
Coach

Q. Which is the most secure method of data destruction?

  • (A) Formatting
  • (B) Deleting files
  • (C) Shredding the hard drive
  • (D) Moving files to recycle bin

A

Admin • 802.91K Points
Coach

Q. Which protocol is used to securely transfer files over the internet?

  • (A) FTP
  • (B) HTTP
  • (C) SFTP
  • (D) SMTP

A

Admin • 802.91K Points
Coach

Q. Which technique can help prevent SQL injection attacks?

  • (A) Using cookies
  • (B) Disabling JavaScript
  • (C) Parameterized queries
  • (D) Setting strong passwords

A

Admin • 802.91K Points
Coach

Q. What is the purpose of hashing in cybersecurity?

  • (A) Encrypting data
  • (B) Compressing data
  • (C) Verifying data integrity
  • (D) Monitoring network traffic

A

Admin • 802.91K Points
Coach

Q. Which of these is an open-source penetration testing tool?

  • (A) Kaspersky
  • (B) Metasploit
  • (C) Norton
  • (D) AVG