Cyber Security Quiz Questions

20 Questions | Total Attempts: 26758

SettingsSettingsSettings
Cyber Security Quiz Questions - Quiz

Think you know about cyber security? Are you ready to take these Cyber Security Quiz Questions? There are many questions in this quiz related to cyber security to help assess your knowledge of different types of cyberattacks. If you think you know all about the right protocols, systems, & actions to be taken then take this quiz and try to answer all the questions correctly here. Played it. Best of luck!Quiz Description


Questions and Answers
  • 1. 
    What of the following is a DoS attack?
    • A. 

      Listening in on network traffic to identify the MAC address of a computer

    • B. 

      Continually bombarding a targeted network with fake requests.

    • C. 

      Injecting bogus networking re-configuration commands

    • D. 

      Forcing computers to drop their connections and reconnect with the attacker’s access point

  • 2. 
    What information do you need to set up a wireless access point?
    • A. 

      SSID

    • B. 

      MAC address

    • C. 

      IP address

    • D. 

      ARP

  • 3. 
    Which of the following attacks requires a carrier file to self-replicate?
    • A. 

      Trojan

    • B. 

      Virus

    • C. 

      Worm

    • D. 

      Spam

  • 4. 
    Which of the following offers the strongest wireless signal encryption?
    • A. 

      WEP

    • B. 

      WAP

    • C. 

      WIPS

    • D. 

      WPA

  • 5. 
    Someone who is posing as an IT tech requests information about your computer configuration.  What kind of attack is this?
    • A. 

      Insider threat

    • B. 

      Phishing

    • C. 

      Social engineering

    • D. 

      Whaling

  • 6. 
    Which of the following uses asymmetric key encryption?
    • A. 

      AES

    • B. 

      PGP

    • C. 

      3DES

    • D. 

      RC5

  • 7. 
    Which of the following describes asymmetric key encryption?
    • A. 

      Consists of a private signing key and a public verification key

    • B. 

      The sender and receiver must securely share a key.

    • C. 

      Cannot be used for non-repudiation purposes

    • D. 

      Cannot be used for sender authentication

  • 8. 
    Which of the following is the security standard for WPA2?
    • A. 

      802.11ad

    • B. 

      802.11i

    • C. 

      802.11n

    • D. 

      802.11a

  • 9. 
    Which of the following describes monitoring software installed without your consent?
    • A. 

      Malware

    • B. 

      Adware

    • C. 

      Spyware

    • D. 

      Ransomware

  • 10. 
    Which of the following is NOT a type of virus?
    • A. 

      Tunneling

    • B. 

      Boot sector

    • C. 

      Macro

    • D. 

      Wrapper

  • 11. 
    Which of the following is a test that gives little to no information about the system to the penetration tester?
    • A. 

      Grey Box

    • B. 

      White Box

    • C. 

      Blue Box

    • D. 

      Black Box

  • 12. 
    Which of the following is NOT a DoS attack?
    • A. 

      Server Spoofing

    • B. 

      PIng Broadcast

    • C. 

      Ping of Death

    • D. 

      Smurf

  • 13. 
    Which of the following is a password hashing algorithm?
    • A. 

      AES

    • B. 

      MD4

    • C. 

      PGP

    • D. 

      3DES

  • 14. 
    Which of the remote is a secure remote access protocol?
    • A. 

      SSH

    • B. 

      FTP

    • C. 

      Telnet

    • D. 

      SMTP

  • 15. 
    A network site that appears to have valuable information but is isolated and monitored is what kind of security measure?
    • A. 

      Pseudo-network

    • B. 

      Honeypot

    • C. 

      Virtual Network

    • D. 

      Canary Trap

  • 16. 
    What are two types of intrusion prevention systems?
    • A. 

      Passive and active

    • B. 

      Anomaly and signature

    • C. 

      Host and network

    • D. 

      Internal and external

  • 17. 
    Which of the following is NOT a password cracking software tool?
    • A. 

      HoneyMonkey

    • B. 

      Cain and Abel

    • C. 

      John the Ripper

    • D. 

      Hashcat

  • 18. 
    An event signaling an IDS to produce an alarm when no attack has taken place would be classified as which of the following?
    • A. 

      False Positive

    • B. 

      False Negative

    • C. 

      True Negative

    • D. 

      True Positive

  • 19. 
    What are two types of role-based access control lists?
    • A. 

      Object and permission

    • B. 

      Filesystem and networking

    • C. 

      Dynamic and static

    • D. 

      Mandatory and discretionary

  • 20. 
    What are two types of network layer firewalls?
    • A. 

      Stateful and stateless

    • B. 

      Dynamic and static

    • C. 

      Anomaly and signature

    • D. 

      Mandatory and discretionary

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.