Cyber Security Quiz

Play this quiz that will help you to excel in Cyber Security certification exams, placements etc. This Cyber Security quiz consist of 10 questions that you need to solve in 10 minutes. We’ve specially designed this quiz so that you can quickly acquaint to the pattern of questions you can be asked in placement drives, certification exams etc.

Take the Free Practice Test

Cyber Security MCQs

Practice Cyber Security MCQ Questions, which will help you to understand various digital threats and its prevention.

Cyber Security Quiz

Try Free Cyber Security Quiz, to start a quiz you need to login first, after login you will get start quiz button and then by clicking on that you can start quiz. You will get 10 Minutes to answer all questions.

Cyber Security Quiz

1. Network security consists of:

All of the above

2. How many c's in computer forensics?


3. What is Eliminate potential clues?

we have to clear the configuration settings from networking equipment.
it can provide crucial clues to a security cracker to break into our network and the systems that reside on it.
Both A and B
None of the above

4. _____________ is a process which verifies the identity of a user who wants to access the system.

None of the above

5. Which of the following is designed to perform legitimate tasks but it also performs unknown and unwanted activity?

Trojan horses
Semantic attack

6. Which of the following is used to crack the security of a system and gain access for stealing data?

System hacking
hacking methodologies
online attack
offline attack

7. What is true about VPN in Network security methods?

A tool that authenticates the communication between a device and a secure network
VPN creating a secure, encrypted "tunnel" across the open internet.
VPN typically based on IPsec or SSL
All of the above

8. Which is true about Worms ?

Self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.
Worms on existing programs and can only be activated when a user opens the program.
Worms vary and hide themselves in the operating system.
All of the above

9. Which of the following techniques are used during computer forensics investigations?

Cross-drive analysis
Live analysis
Deleted files
All of the above

10. ______ is needed in _______ to the system that is having a password file or the hacker needs to crack the system by other means.

Physical access, Offline attack
Offline attack, Physical access
Physical access, Online attack
Online attack, Physical access