Cyber Security Quiz


Play this quiz that will help you to excel in Cyber Security certification exams, placements etc. This Cyber Security quiz consist of 10 questions that you need to solve in 10 minutes. We’ve specially designed this quiz so that you can quickly acquaint to the pattern of questions you can be asked in placement drives, certification exams etc.

Take the Free Practice Test



Cyber Security MCQs

Practice Cyber Security MCQ Questions, which will help you to understand various digital threats and its prevention.

Cyber Security Quiz

Try Free Cyber Security Quiz, to start a quiz you need to login first, after login you will get start quiz button and then by clicking on that you can start quiz. You will get 10 Minutes to answer all questions.

Cyber Security Quiz

1. Which cyber security principle states that Security mechanisms should be as simple and small as possible?

Fail-safe defaults
Least Privilege
Economy of mechanism
Open Design

2. "If the boss demands root access to a UNIX system that you administer, he/she should not be given that right unless he/she has a task that requires such level of access" is the example of which cyber security principle?

Separation of Privilege
Least Privilege
Complete mediation
Open Design

3. Which of the following is used to crack the security of a system and gain access for stealing data?

System hacking
hacking methodologies
online attack
offline attack

4. The ________ needs _________ to the system that is having a password file or the hacker needs to crack the system by other means.

Physical access, Offline attack
Offline attack, Physical access
Physical access, Online attack
Online attack, Physical access

5. _______________ is the central node of 802.11 wireless operations.

WPA
Access Point
WAP
Access Port

6. Which of the following techniques are used during computer forensics investigations?

Cross-drive analysis
Live analysis
Deleted files
All of the above

7. Which malware are often the armies behind today's distributed denial-of-service (DDoS) attacks?

Botnets
botnetsSpyware
Trojans
Viruses

8. Which of the following are data security consideration?

Backups
Archival Storage
Disposal of Data
All of the above

9. Which signatures include details such as an image of our physical signature, location, date, and official seal?

Approval Signatures
Certified Signatures
Visible Digital Signature
Invisible Digital Signature

10. Mobile security is also known as?

OS Security
APIs Security
Wireless Security
Database security

Results