Cyber Security Quiz Questions

25 Questions | Total Attempts: 16272

SettingsSettingsSettings
Please wait...
Cyber Security Quiz Questions

Questions and Answers
  • 1. 
    Which of the following attacks requires a carrier file to self-replicate?
    • A. 

      Trojan

    • B. 

      Virus

    • C. 

      Worm

    • D. 

      Spam

  • 2. 
    Which of the following offers the strongest wireless signal encryption?
    • A. 

      WEP

    • B. 

      WAP

    • C. 

      WIPS

    • D. 

      WPA

  • 3. 
    What of the following is a DoS attack?
    • A. 

      Listening in on network traffic to identify the MAC address of a computer

    • B. 

      Continually bombarding a targeted network with fake requests

    • C. 

      Injecting bogus networking re-configuration commands

    • D. 

      Forcing computers to drop their connections and reconnect with the attacker’s access point

  • 4. 
    What information do you need to set up a wireless access point?
    • A. 

      SSID

    • B. 

      MAC address

    • C. 

      IP address

    • D. 

      ARP

  • 5. 
    Someone posing as an IT tech requests information about your computer configuration.  What kind of attack is this?
    • A. 

      Insider threat

    • B. 

      Phishing

    • C. 

      Social engineering

    • D. 

      Whaling

  • 6. 
    What are two types of intrusion prevention systems?
    • A. 

      Passive and active

    • B. 

      Anomaly and signature

    • C. 

      Host and network

    • D. 

      Internal and external

  • 7. 
    Which of the following uses asymmetric key encryption?
    • A. 

      AES

    • B. 

      PGP

    • C. 

      3DES

    • D. 

      RC5

  • 8. 
    Which of the following describes asymmetric key encryption?
    • A. 

      Consists of a private signing key and a public verification key

    • B. 

      The sender and receiver must securely share a key

    • C. 

      Cannot be used for non-repudiation purposes

    • D. 

      Cannot be used for sender authentication

  • 9. 
    Which of the following is the security standard for WPA2?
    • A. 

      802.11ad

    • B. 

      802.11i

    • C. 

      802.11n

    • D. 

      802.11a

  • 10. 
    Which of the following describes monitoring software installed without your consent?
    • A. 

      Malware

    • B. 

      Adware

    • C. 

      Spyware

    • D. 

      Ransomware

  • 11. 
    Which of the following is NOT a type of virus?
    • A. 

      Tunneling

    • B. 

      Boot sector

    • C. 

      Macro

    • D. 

      Wrapper

  • 12. 
    Which of the following describes a zero-day vulnerability?
    • A. 

      Developer releasing a fix that address recently discovered exploit

    • B. 

      Testing whether the system is vulnerable to attack

    • C. 

      Developer or public becoming aware of the exploited vulnerability

    • D. 

      Attack that exploits a previously unknown vulnerability

  • 13. 
    Which of the following is an ARP spoofing attack?
    • A. 

      Making independent connections with the victims and relaying messages between them

    • B. 

      Associating the attacker's MAC address with the IP address of another host

    • C. 

      Creating a forged source IP address to conceal sender's identity

    • D. 

      Causing the name server to return an incorrect IP address

  • 14. 
    Which of the following is a test that gives little to no information about the system to the penetration tester?
    • A. 

      Grey Box

    • B. 

      White Box

    • C. 

      Blue Box

    • D. 

      Black Box

  • 15. 
    What are two types of network layer firewalls?
    • A. 

      Stateful and stateless

    • B. 

      Dynamic and static

    • C. 

      Anomaly and signature

    • D. 

      Mandatory and discretionary

  • 16. 
    Which of the following is NOT a DoS attack?
    • A. 

      Server Spoofing

    • B. 

      PIng Broadcast

    • C. 

      Ping of Death

    • D. 

      Smurf

  • 17. 
    Which of the following is a password hashing algorithm?
    • A. 

      AES

    • B. 

      MD4

    • C. 

      PGP

    • D. 

      3DES

  • 18. 
    Where in the network infrastructure would a DMZ be set up?
    • A. 

      Between the internal network and the firewall

    • B. 

      In the internal network but not directly connected to the firewall

    • C. 

      Between the external network and the firewall

    • D. 

      Behind the firewall but not not directly connected to the internal network

  • 19. 
    Which of the following would NOT help secure a wireless access point?
    • A. 

      Implement Smart Card authentication

    • B. 

      Disable SSID broadcast

    • C. 

      Disable MAC filtering

    • D. 

      Enable encryption

  • 20. 
    Which of the remote is a secure remote access protocol?
    • A. 

      SSH

    • B. 

      FTP

    • C. 

      Telnet

    • D. 

      SMTP

  • 21. 
    A network site that appears to be have valuable information but is in fact isolated and monitored is what kind of security measure?
    • A. 

      Pseudo-network

    • B. 

      Honeypot

    • C. 

      Virtual Network

    • D. 

      Canary Trap

  • 22. 
    What are two types of intrusion detection systems?
    • A. 

      Anomaly and signature

    • B. 

      Passive and active

    • C. 

      Internal and external

    • D. 

      Host and network

  • 23. 
    Which of the following is NOT a password cracking software tool?
    • A. 

      HoneyMonkey

    • B. 

      Cain and Abel

    • C. 

      John the Ripper

    • D. 

      Hashcat

  • 24. 
    An event signaling an IDS to produce an alarm when no attack has taken place would be classified as which of the following?
    • A. 

      False Positive

    • B. 

      False Negative

    • C. 

      True Negative

    • D. 

      True Positive

  • 25. 
    What are two types of role-based access control lists?
    • A. 

      Object and permission

    • B. 

      Filesystem and networking

    • C. 

      Dynamic and static

    • D. 

      Mandatory and discretionary

Back to Top Back to top