CYBER SECURITY MCQS
Which of the following is NOT a type of malware?WormTrojan HorseFirewallVirusC) FirewallFirewall is a security mechanism, not malware.
Phishing is used to:Encrypt dataSteal sensitive informationClean virusesScan networksB) Steal sensitive informationPhishing tricks users into revealing confidential data.
Which of the following is a symmetric encryption algorithm?RSADESDiffie-HellmanECCB) DESDES (Data Encryption Standard) uses a single key for encryption and decryption.
Firewall works on which layer?Physical LayerNetwork LayerTransport LayerData Link LayerB) Network LayerFirewalls filter network traffic at the network layer.
Two-factor authentication provides:Single level securityMultiple layer securityData encryptionFile compressionB) Multiple layer security2FA uses two independent authentication methods for stronger security.
Which of the following is a symmetric key algorithm?RSAAESDiffie-HellmanDSAB) AESAES (Advanced Encryption Standard) uses the same key for encryption and decryption.
Which attack involves overwhelming a server with excessive requests?SQL InjectionMan-in-the-MiddleDenial-of-ServicePhishingC) Denial-of-ServiceDoS attacks flood the target with requests, making it unavailable to legitimate users.
Multi-factor authentication enhances security by:Requiring multiple passwordsCombining two or more independent authentication methodsEncrypting all network trafficDisabling user accountsB) Combining two or more independent authentication methodsMFA uses something you know, have, or are to improve authentication security.
The process of converting plain text into unreadable text is called:DecryptionEncodingEncryptionHashingC) EncryptionEncryption transforms data into cipher text to protect it from unauthorized access.
Hashing is mainly used for:Data EncryptionData Integrity VerificationData CompressionKey ExchangeB) Data Integrity VerificationHash functions verify that data has not been altered during transmission or storage.
Phishing is:Malware that replicates itselfSocial engineering attack to steal sensitive dataAttack exploiting network vulnerabilitiesBrute force password attackB) Social engineering attack to steal sensitive dataPhishing tricks users into revealing confidential information through fake messages or websites.
Which of the following is NOT a type of malware?WormTrojanRootkit ProxyD) ProxyA proxy is a network intermediary, not malicious software.
The principle of least privilege means:Give users all permissionsGive minimum permissions necessaryDeny access to all usersAllow admin rights to everyoneB) Give minimum permissions necessaryLeast privilege ensures users only have access required for their tasks, reducing risk.
IDS stands for:Internal Data SystemIntrusion Detection SystemInformation Defense ServiceInput Device SetupB) Intrusion Detection SystemIDS monitors network/system activities for malicious actions or policy violations.