Cyber Security Quiz


Play this quiz that will help you to excel in Cyber Security certification exams, placements etc. This Cyber Security quiz consist of 10 questions that you need to solve in 10 minutes. We’ve specially designed this quiz so that you can quickly acquaint to the pattern of questions you can be asked in placement drives, certification exams etc.

Take the Free Practice Test



Cyber Security MCQs

Practice Cyber Security MCQ Questions, which will help you to understand various digital threats and its prevention.

Cyber Security Quiz

Try Free Cyber Security Quiz, to start a quiz you need to login first, after login you will get start quiz button and then by clicking on that you can start quiz. You will get 10 Minutes to answer all questions.

Cyber Security Quiz

1. "If the boss demands root access to a UNIX system that you administer, he/she should not be given that right unless he/she has a task that requires such level of access" is the example of which cyber security principle?

Separation of Privilege
Least Privilege
Complete mediation
Open Design

2. Which of the following malware do not replicate or reproduce through infection?

Worms
Trojans
Viruses
Rootkits

3. What is true about Email security in Network security methods?

Phishing is one of the most common ways attackers gain access to a network.
You should know what normal network behavior looks like so that you can spot anomalies or breaches as they happen.
You need to employ hardware, software, and security processes to lock those apps down.
All of the above

4. Which of the following is not a type of hacking any smart-phone.

Target mobile hardware vulnerabilities
Target apps’ vulnerabilities
Snatching
Setup Keyloggers

5. Your password should be ?

at least six characters
at least seven characters
at least eight characters
at most eight characters

6. What is true regarding Trojans?

Trojans will conduct whatever action they have been programmed to carry out
"Trojan" alludes to the mythological story of Greek soldiers hidden inside a wooden horse that was given to the enemy city of Troy.
Trojans do not replicate or reproduce through infection.
All of the above

7. Base Transceiver Station (BTS) which is also known as a?

BA
BD
BS
BZ

8. Which of the following techniques are used during computer forensics investigations?

Cross-drive analysis
Live analysis
Deleted files
All of the above

9. What is Selective archiving?

the storage mechanisms we use for archiving data would change over time
we will archive only a selective part of data because not all data is equally important.
In the real world is archived data which is in an obsolete format.
All of the above

10. Interaction between the client and server starts via the ______ message.

client_hi
client_hello
server_hello
server_hi

Results