Cyber Security Quiz Questions

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS, Computer Science |
Computer Expert
Review Board Member
Godwin is a proficient Database Administrator currently employed at MTN Nigeria. He holds as MS in Computer Science from the University of Bedfordshire, where he specialized in Agile Methodologies and Database Administration. He also earned a Bachelor's degree in Computer Science from the University of Port Harcourt. With expertise in SQL Server Integration Services (SSIS) and SQL Server Management Studio, Godwin's knowledge and experience enhance the authority of our quizzes, ensuring accuracy and relevance in the realm of computer science.
, MS, Computer Science
Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By PremierGaou
P
PremierGaou
Community Contributor
Quizzes Created: 3 | Total Attempts: 49,288
Questions: 20 | Attempts: 33,672

SettingsSettingsSettings
Cyber Security Quiz Questions - Quiz

Think you know about cyber security? Are you ready to take these Cyber Security Quiz Questions? There are many questions in this quiz related to cyber security to help assess your knowledge of different types of cyberattacks. If you think you know all about the right protocols, systems, & actions to be taken then take this quiz and try to answer all the questions correctly here. Played it. Best of luck!


Cyber Security Questions and Answers

  • 1. 

    What are two types of network layer firewalls?

    • A.

      Stateful and stateless

    • B.

      Dynamic and static

    • C.

      Anomaly and signature

    • D.

      Mandatory and discretionary

    Correct Answer
    A. Stateful and stateless
    Explanation
    Stateful and stateless are two types of network layer firewalls. Stateful firewalls keep track of the state of network connections and only allow incoming traffic that is part of an established connection. They examine the context of the traffic and make decisions based on the connection's state. On the other hand, stateless firewalls do not keep track of the connection state and make decisions based on individual packets. They examine the packet's header information, such as source and destination IP addresses, and apply filtering rules accordingly. Both types of firewalls are used to protect networks from unauthorized access and malicious activities.

    Rate this question:

  • 2. 

    Which of the following attacks requires a carrier file to self-replicate?

    • A.

      Trojan

    • B.

      Virus

    • C.

      Worm

    • D.

      Spam

    Correct Answer
    C. Worm
    Explanation
    A worm is a type of malware that replicates itself in order to spread to other computers. Unlike viruses, worms do not need a carrier file to infect a system. Instead, worms exploit vulnerabilities in network protocols to spread automatically from one computer to another. This self-replicating behavior distinguishes worms from other types of malware, such as trojans, which rely on user actions to propagate, and viruses, which typically require a host file to attach themselves to.

    Rate this question:

  • 3. 

    Which of the following uses asymmetric key encryption?

    • A.

      AES

    • B.

      PGP

    • C.

      3DES

    • D.

      RC5

    Correct Answer
    B. PGP
    Explanation
    PGP (Pretty Good Privacy) uses asymmetric key encryption. Asymmetric encryption involves the use of a pair of keys, a public key and a private key. The public key is used to encrypt data, while the private key is used to decrypt it. PGP utilizes this encryption method to secure communication and data transfer. It is commonly used for email encryption and digital signatures. AES (Advanced Encryption Standard), 3DES (Triple Data Encryption Standard), and RC5 are symmetric key encryption algorithms, which use the same key for both encryption and decryption.

    Rate this question:

  • 4. 

    Which of the following offers the strongest wireless signal encryption?

    • A.

      WEP

    • B.

      WAP

    • C.

      WIPS

    • D.

      WPA

    Correct Answer
    D. WPA
    Explanation
    WPA (Wi-Fi Protected Access) offers the strongest wireless signal encryption among the given options. WPA is a security protocol that provides improved encryption and authentication compared to its predecessor, WEP (Wired Equivalent Privacy). WPA uses a stronger encryption algorithm called TKIP (Temporal Key Integrity Protocol) and provides better protection against unauthorized access and attacks. WAP (Wireless Application Protocol) is a different technology used for accessing internet services on mobile devices, while WIPS (Wireless Intrusion Prevention System) is a security solution that detects and prevents unauthorized access to wireless networks.

    Rate this question:

  • 5. 

    Which of the following describes asymmetric key encryption?

    • A.

      Consists of a private signing key and a public verification key

    • B.

      The sender and receiver must securely share a key.

    • C.

      Cannot be used for non-repudiation purposes

    • D.

      Cannot be used for sender authentication

    Correct Answer
    A. Consists of a private signing key and a public verification key
    Explanation
    Asymmetric key encryption is a cryptographic system that uses a pair of keys, consisting of a private signing key and a public verification key. The private key is kept secret by the owner and is used for signing messages, while the public key is freely distributed and is used by others to verify the authenticity of the signed messages. This allows for secure communication without the need for the sender and receiver to share a common key. Asymmetric key encryption can be used for various purposes, including encryption, digital signatures, and authentication. However, it is not suitable for non-repudiation purposes, as it does not provide absolute proof of the sender's identity.

    Rate this question:

  • 6. 

    Which of the following is NOT a type of virus?

    • A.

      Tunneling

    • B.

      Boot sector

    • C.

      Macro

    • D.

      Wrapper

    Correct Answer
    D. Wrapper
    Explanation
    The given options are Tunneling, Boot sector, Macro, and Wrapper. Tunneling, Boot sector, and Macro are all types of viruses that infect computer systems. However, a Wrapper is not a type of virus. A wrapper is a term used to describe a piece of code that is used to encapsulate or wrap around another program or component to provide additional functionality or to simplify the usage of the underlying code. It is not inherently malicious like a virus.

    Rate this question:

  • 7. 

    What of the following is a DoS attack?

    • A.

      Listening in on network traffic to identify the MAC address of a computer

    • B.

      Continually bombarding a targeted network with fake requests.

    • C.

      Injecting bogus networking re-configuration commands

    • D.

      Forcing computers to drop their connections and reconnect with the attacker’s access point

    Correct Answer
    B. Continually bombarding a targeted network with fake requests.
    Explanation
    Continually bombarding a targeted network with fake requests is a form of Denial of Service (DoS) attack. In this type of attack, the attacker overwhelms the network or system with a large volume of fake requests, consuming its resources and causing it to become slow or unresponsive to legitimate users. This hinders the network's ability to handle genuine traffic, resulting in a denial of service to legitimate users.

    Rate this question:

  • 8. 

    What information do you need to set up a wireless access point?

    • A.

      SSID

    • B.

      MAC address

    • C.

      IP address

    • D.

      ARP

    Correct Answer
    A. SSID
    Explanation
    To set up a wireless access point, you need the SSID (Service Set Identifier). The SSID is the name that identifies the wireless network, allowing devices to connect to it. By configuring the SSID, you can specify the network's name and make it visible to devices in range. This way, users can select and connect to the correct wireless network. The SSID is an essential piece of information required for setting up a wireless access point.

    Rate this question:

  • 9. 

    Which of the following is a password hashing algorithm?

    • A.

      AES

    • B.

      MD4

    • C.

      PGP

    • D.

      3DES

    Correct Answer
    B. MD4
    Explanation
    MD4 is a password hashing algorithm. It is a widely used cryptographic hash function that produces a 128-bit hash value. It is designed to be fast and efficient, making it suitable for password hashing. However, MD4 is considered to be insecure and vulnerable to various attacks, so it is not recommended for use in modern systems. AES, PGP, and 3DES are encryption algorithms, not password hashing algorithms.

    Rate this question:

  • 10. 

    What are two types of intrusion prevention systems?

    • A.

      Passive and active

    • B.

      Anomaly and signature

    • C.

      Host and network

    • D.

      Internal and external

    Correct Answer
    C. Host and network
    Explanation
    An IPS can be installed on the host computer or on the network server.

    Rate this question:

  • 11. 

    Which of the following is a test that gives little to no information about the system to the penetration tester?

    • A.

      Grey Box

    • B.

      White Box

    • C.

      Blue Box

    • D.

      Black Box

    Correct Answer
    D. Black Box
    Explanation
    Black Box testing is a type of testing where the tester has no prior knowledge about the system being tested. The tester is not provided with any information about the internal workings or architecture of the system. This type of testing simulates an attacker with no insider knowledge, allowing them to approach the system as an external entity. Therefore, Black Box testing provides little to no information about the system to the penetration tester.

    Rate this question:

  • 12. 

    Which of the following is NOT a DoS attack?

    • A.

      Server Spoofing

    • B.

      PIng Broadcast

    • C.

      Ping of Death

    • D.

      Smurf

    Correct Answer
    A. Server Spoofing
    Explanation
    Server spoofing is not a DoS attack because it involves impersonating a server to gain unauthorized access or deceive users, rather than overwhelming a server or network to cause a denial of service. DoS attacks, on the other hand, aim to disrupt the availability of a service by flooding it with excessive traffic or exploiting vulnerabilities.

    Rate this question:

  • 13. 

    Someone who is posing as an IT tech requests information about your computer configuration.  What kind of attack is this?

    • A.

      Insider threat

    • B.

      Phishing

    • C.

      Social engineering

    • D.

      Whaling

    Correct Answer
    C. Social engineering
    Explanation
    This is an example of social engineering because the attacker is manipulating and deceiving the victim by posing as an IT tech to gain access to their computer configuration information. Social engineering involves exploiting human psychology and trust to trick individuals into revealing sensitive information or performing actions that they normally wouldn't. In this case, the attacker is using their knowledge of IT to appear legitimate and convince the victim to disclose information that could potentially be used for malicious purposes.

    Rate this question:

  • 14. 

    Which of the following is NOT a password-cracking software tool?

    • A.

      HoneyMonkey

    • B.

      Cain and Abel

    • C.

      John the Ripper

    • D.

      Hashcat

    Correct Answer
    A. HoneyMonkey
    Explanation
    HoneyMonkey is a Microsoft research honeypot. The others are tools used to crack passwords. Hashcat is specifically for password hashes, while Cain and Abel are designed for password recovery.

    Rate this question:

  • 15. 

    Which of the following describes monitoring software installed without your consent?

    • A.

      Malware

    • B.

      Adware

    • C.

      Spyware

    • D.

      Ransomware

    Correct Answer
    C. Spyware
    Explanation
    Spyware is a type of monitoring software that is installed on a device without the user's consent or knowledge. It secretly gathers information about the user's activities, such as browsing habits, keystrokes, and personal data, and sends it to a third party without the user's permission. Unlike malware, adware, and ransomware, which may cause harm or disrupt the device, spyware primarily focuses on collecting information covertly.

    Rate this question:

  • 16. 

    Which of the remote is a secure remote access protocol?

    • A.

      SSH

    • B.

      FTP

    • C.

      Telnet

    • D.

      SMTP

    Correct Answer
    A. SSH
    Explanation
    Of the choices, only SSH and Telnet are remote access protocols. SSH is encrypted while Telnet is not.

    Rate this question:

  • 17. 

    An event signaling an IDS to produce an alarm when no attack has taken place would be classified as which of the following?

    • A.

      False Positive

    • B.

      False Negative

    • C.

      True Negative

    • D.

      True Positive

    Correct Answer
    A. False Positive
    Explanation
    A false positive is when an event is incorrectly identified as an attack by an IDS (Intrusion Detection System) when in fact no attack has taken place. This can occur due to misconfiguration, false alarms, or the IDS misinterpreting normal behavior as malicious activity. In this scenario, the IDS produces an alarm, indicating a potential attack, even though there is none. This can lead to wasted resources and time investigating non-existent threats.

    Rate this question:

  • 18. 

    Which of the following is the security standard for WPA2?

    • A.

      802.11ad

    • B.

      802.11i

    • C.

      802.11n

    • D.

      802.11a

    Correct Answer
    B. 802.11i
    Explanation
    802.11i is the correct answer because it is the security standard for WPA2. WPA2 (Wi-Fi Protected Access 2) is a security protocol that provides encryption and authentication for wireless networks. It is based on the IEEE 802.11i standard, which specifies the implementation of advanced encryption algorithms such as AES (Advanced Encryption Standard) and CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol). WPA2 is considered more secure than its predecessor, WPA, and is widely used to protect Wi-Fi networks from unauthorized access.

    Rate this question:

  • 19. 

    A network site that appears to have valuable information but is isolated and monitored is what kind of security measure?

    • A.

      Pseudo-network

    • B.

      Honeypot

    • C.

      Virtual Network

    • D.

      Canary Trap

    Correct Answer
    B. Honeypot
    Explanation
    A honeypot is a security measure that involves creating a network site that appears to contain valuable information, but is actually isolated and monitored. The purpose of a honeypot is to attract potential attackers and gather information about their techniques and tactics. By luring attackers into the honeypot, organizations can gain valuable insights into their methods and enhance their overall security measures.

    Rate this question:

  • 20. 

    What are two types of role-based access control lists?

    • A.

      Object and permission

    • B.

      Filesystem and networking

    • C.

      Dynamic and static

    • D.

      Mandatory and discretionary

    Correct Answer
    D. Mandatory and discretionary
    Explanation
    Mandatory and discretionary are two types of role-based access control lists. Mandatory access control (MAC) is a security model where access decisions are based on the classification level of the information and the security clearance of the user. Discretionary access control (DAC) is a security model where access decisions are based on the discretion of the owner of the resource. These two types of access control lists provide different levels of control and security in managing access to resources.

    Rate this question:

Godwin Iheuwa |MS, Computer Science |
Computer Expert
Godwin is a proficient Database Administrator currently employed at MTN Nigeria. He holds as MS in Computer Science from the University of Bedfordshire, where he specialized in Agile Methodologies and Database Administration. He also earned a Bachelor's degree in Computer Science from the University of Port Harcourt. With expertise in SQL Server Integration Services (SSIS) and SQL Server Management Studio, Godwin's knowledge and experience enhance the authority of our quizzes, ensuring accuracy and relevance in the realm of computer science.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 26, 2024
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Jan 13, 2014
    Quiz Created by
    PremierGaou
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.