Information and Network Security MCQs with answers Page - 2

Here, you will find a collection of MCQ questions on Information and Network Security. Go through these questions to enhance your preparation for upcoming examinations and interviews.

To check the correct answer, simply click the View Answer button provided for each question.

Have your own questions to contribute? Click the button below to share your MCQs with others!

+ Add Question

A

Admin • 831.35K Points
Coach

Q. Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.

  • (A) Virus, Cyber-Criminals
  • (B) Malware, Penetration Testers
  • (C) Trojans, Cyber-Criminals
  • (D) Virus, Penetration Testers

A

Admin • 831.35K Points
Coach

Q. During a DOS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted.

  • (A) Network
  • (B) System
  • (C) Website
  • (D) Router

A

Admin • 831.35K Points
Coach

Q. The intent of a __________ is to overkill the targeted server’s bandwidth and other resources of the target website.

  • (A) Phishing attack
  • (B) DoS attack
  • (C) Website attack
  • (D) MiTM attack

A

Admin • 831.35K Points
Coach

Q. In ________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.

  • (A) URL Redirection
  • (B) DOS
  • (C) Phishing
  • (D) MiTM attack

A

Admin • 831.35K Points
Coach

Q. Trojan creators do not look for _______________.

  • (A) Credit card information
  • (B) Confidential data
  • (C) Important documents
  • (D) Securing systems with such programs

A

Admin • 831.35K Points
Coach

Q. 1. When one participant in a communication pretends to be someone else, it is called _________?

  • (A) Virus Attacks
  • (B) Fire Attacks
  • (C) Data Driven Attacks
  • (D) Masquerade

A

Admin • 831.35K Points
Coach

Q. ________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities.

  • (A) Message Authentication Code
  • (B) Steganography
  • (C) Whale phishing
  • (D) A cipher

A

Admin • 831.35K Points
Coach

Q. Compromising confidential information comes under _________.

  • (A) Bug
  • (B) Threat
  • (C) Vulnerability
  • (D) Attack

A

Admin • 831.35K Points
Coach

Q. When an attacker sends unsolicited communication, it is an example of_____.

  • (A) Spoofing
  • (B) Spamming
  • (C) Crackers
  • (D) Sniffers

A

Admin • 831.35K Points
Coach

Q. Masquerading is _______.

  • (A) Attempting to hack a system through backdoors to an operating system or application.
  • (B) Pretending to be an authorized user
  • (C) Always done through IP spoofing
  • (D) Applying a subnet mask to an internal IP range

Add MCQ in this Category

If you want to share an MCQ question in this category, it's a great idea! It will be helpful for many other students using this website.

Share Your MCQ