Cyber Security Quiz


Play this quiz that will help you to excel in Cyber Security certification exams, placements etc. This Cyber Security quiz consist of 10 questions that you need to solve in 10 minutes. We’ve specially designed this quiz so that you can quickly acquaint to the pattern of questions you can be asked in placement drives, certification exams etc.

Take the Free Practice Test



Cyber Security MCQs

Practice Cyber Security MCQ Questions, which will help you to understand various digital threats and its prevention.

Cyber Security Quiz

Try Free Cyber Security Quiz, to start a quiz you need to login first, after login you will get start quiz button and then by clicking on that you can start quiz. You will get 10 Minutes to answer all questions.

Cyber Security Quiz

1. In which year, Moris worm virus named?

1988
1989
1990
1991

2. Which of the following are data security consideration?

Backups
Archival Storage
Disposal of Data
All of the above

3. Does swimming1 use as secure password?

Yes
No
Maybe
Don't know

4. Which of the following is an example of archives online?

On removable media
document files
dedicated archive server
DVD drives

5. Which of the following are objectives of Malware?

Provide remote control for an attacker to use an infected machine.
Investigate the infected user’s local network.
Steal sensitive data.
All of the above

6. In which year, the first computer worm (virus) created?

1969
1970
1971
1972

7. What is Selective archiving?

the storage mechanisms we use for archiving data would change over time
we will archive only a selective part of data because not all data is equally important.
In the real world is archived data which is in an obsolete format.
All of the above

8. Which of the following is not a type of hacking any smart-phone.

Target mobile hardware vulnerabilities
Target apps’ vulnerabilities
Snatching
Setup Keyloggers

9. CHAP stands for?

Challenge Handshake authentication protocol
Challenge Hardware authentication protocol
Circuit Hardware authentication protocol
Circuit Handshake authentication protocol

10. Cybersecurity encompass the full range of?

vulnerability reduction
incident response
recovery policies
All of the above

Results