Cyber Security Quiz


Play this quiz that will help you to excel in Cyber Security certification exams, placements etc. This Cyber Security quiz consist of 10 questions that you need to solve in 10 minutes. We’ve specially designed this quiz so that you can quickly acquaint to the pattern of questions you can be asked in placement drives, certification exams etc.

Take the Free Practice Test



Cyber Security MCQs

Practice Cyber Security MCQ Questions, which will help you to understand various digital threats and its prevention.

Cyber Security Quiz

Try Free Cyber Security Quiz, to start a quiz you need to login first, after login you will get start quiz button and then by clicking on that you can start quiz. You will get 10 Minutes to answer all questions.

Cyber Security Quiz

1. Which of the following is one of the Cyber Security Goals?

Protect the confidentiality of data.
Preserve the integrity of data
Promote the availability of data for authorized users
All of the above

2. Cybersecurity is primarily about ?

people
processes
technologies
All of the above

3. Which of the following are data security consideration?

Backups
Archival Storage
Disposal of Data
All of the above

4. What is Selective archiving?

the storage mechanisms we use for archiving data would change over time
we will archive only a selective part of data because not all data is equally important.
In the real world is archived data which is in an obsolete format.
All of the above

5. What is true about VPN in Network security methods?

A tool that authenticates the communication between a device and a secure network
VPN creating a secure, encrypted "tunnel" across the open internet.
VPN typically based on IPsec or SSL
All of the above

6. Which cyber security principle principle restricts how privileges are initialized when a subject or object is created?

Fail-safe defaults
Least Privilege
Complete mediation
Open Design

7. In which year, Moris worm virus named?

1988
1989
1990
1991

8. In which year, the first computer worm (virus) created?

1969
1970
1971
1972

9. Which of the following techniques are used during computer forensics investigations?

Cross-drive analysis
Live analysis
Deleted files
All of the above

10. Which of the following is not a type of hacking any smart-phone.

Target mobile hardware vulnerabilities
Target apps’ vulnerabilities
Snatching
Setup Keyloggers

Results