Access free live classes and tests on the app
Download
+
Unacademy
  • Goals
    • AFCAT
    • AP EAMCET
    • Bank Exam
    • BPSC
    • CA Foundation
    • CAPF
    • CAT
    • CBSE Class 11
    • CBSE Class 12
    • CDS
    • CLAT
    • CSIR UGC
    • GATE
    • IIT JAM
    • JEE
    • Karnataka CET
    • Karnataka PSC
    • Kerala PSC
    • MHT CET
    • MPPSC
    • NDA
    • NEET PG
    • NEET UG
    • NTA UGC
    • Railway Exam
    • SSC
    • TS EAMCET
    • UPSC
    • WBPSC
    • CFA
Login Join for Free
avtar
  • ProfileProfile
  • Settings Settings
  • Refer your friendsRefer your friends
  • Sign outSign out
  • Terms & conditions
  • •
  • Privacy policy
  • About
  • •
  • Careers
  • •
  • Blog

© 2023 Sorting Hat Technologies Pvt Ltd

Watch Free Classes
    • GATE 2024
    • GATE 2024 Question Papers
    • GATE Notes by Jaspal Singh
    • GATE Notes by S K Mondal
    • Downloads
    • GATE 2024 Rank Predictor
    • Notifications
    • MCQs
    • Question Bank
    • Video Lectures
    • Study Materials
    • PSU Recruitment
    • Difference Between
    • Full Forms
    • Exam Tips
    • GATE Books
GATE 2026 Exam Date Announced – Complete Schedule, Syllabus, and Key Details » GATE MCQs » Cyber Security
Prepare for GATE & ESE

Cyber Security

MCQs on " Cyber Security": Find the multiple choice questions on " Cyber Security", frequently asked for all competitive examinations.

Table of Content
  •  
GATE 2024 Rank Predictor

The technique of protecting laptops, websites, mobile platforms, communications devices, networking, and data from hostile intrusions is known as cyber security. Today, someone can send or receive any source of data, whether it’s videos, or mail, in just one click, but has he ever wondered how secure this information is conveyed to another person with no data leakage? Cybersecurity is the appropriate answer. Today more than 61% of full industry exchanges are done on the internet, so this for the area is a prerequisite for high-quality security for direct and best exchanges. Thus, cybersecurity has become the most recent issue (Dervojeda et al., 2014). More than two-thirds of whole market transactions are now conducted through online mode, demanding a degree of security for straight and best transactions in this field. As a result, cybersecurity has recently become a major topic.

Multiple Choice Questions(MCQ)

1. Cyber Security provide security against what?

    1. Against Malware
    2. Against cyber-terrorists
    3. Defends a device from threat.
    4. All mentioned options

Answer: D

2. Who is popularly known as the father of cyber security?

    1. Robert
    2. August Kerckhoffs
    3. Bob Thomas
    4. Charles

Answer: B

3. Which of the below is a kind of cyber security?

    1. Cloud Security
    2. Application Security
    3. Cloud Security
    4. All options mentioned above

Answer: D 

4. Which of the below does not constitute a cybercrime?

    1. refusal of service
    2. Man in the middle
    3. Phishing
    4. AES

Answer: D (AES stands for Advanced Encryption Standard) safeguards data by encoding it)

5. Which of the below benefits of cyber security is not true?

    1. System getting slower
    2. Computer lagging and crashes
    3. provide privacy to users
    4. Secures system against viruses  

Answer: A

6. Who coined the term “ Cyberspace”?

    1. William Gibson
    2. Andrew Tannenbaum
    3. Scott Fahlman
    4. Richard Stallman

Answer: A

7. Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic?

    1. Pharming
    2. Mimicking
    3. Spamming
    4. Website-Duplication

Answer: A ( Pharming is a method and technique used by cybercriminals to deceive people by creating fake websites and domains)

8. Which of the below is a popular victim of cyber attackers looking to gain the IP address of a target or victim user?

    1. emails
    2. websites
    3. IP tracer
    4. web pages

Answer: B

9. Which of the below does not qualify as a form of peer-to-peer cybercrime?

    1. Trojans are implanted into a targeted device.
    2. On the deep web, payment information is leaked.
    3. mm
    4. Phishing

Answer:  B

10. An act to injure, corrupt, or threaten a system or network is characterised as which of the below?

    1. Digital crime
    2. Threats
    3. System hijacking
    4. Cyber Attack

Answer: D

11. Any company or agency’s IT protection is managed and maintained by?

    1. Software Security Specialist
    2. CEO of the organisation
    3. Security Auditor
    4. IT Security Engineer

Answer: D ( This is a profession in which a professional develops and maintains various systems and security devices for the firm or organisation)

12. Which of the below is an internet fraud in which a consumer is digitally persuaded to reveal personal data by cybercriminals?

    1. MiTM attack
    2. Phishing attack
    3. Website attack
    4. DoS attack

Answer: B

13. Which of the below security encryption standards is the weakest?

    1. WPA3
    2. WPA2
    3. WPA
    4. WEP

Answer: D ( WEP stands for wired Equivalent Privacy. It is a most insecure encrypted protocol)

14. Which of the below measures can help reduce the risk of data leakage?

    1. Steganography
    2. Chorography
    3. Cryptography
    4. Authentication

Answer: A ( Steganography functions as  concealing information in a non-suspicious manner)

15. This is the concept for guiding information security policy within a corporation, firm, or organisation. What exactly is “this” in this context?

    1. Confidentiality
    2. Non-repudiation
    3. CIA Triad
    4. Authenticity

Answer: C (CIA Triad is the most popular and frequently used approach, focusing on the confidentiality of information)

16. ___________ means the security of data from tampering by unidentified users.

    1. Confidentiality
    2. Integrity
    3. Authentication
    4. Non-repudiation

Answer: B

17. Which of the below implemented is not a good means of safeguarding privacy?

    1. Biometric verification
    2. ID and password-based verification
    3. 2-factor authentication
    4. switching off the phone

Answer: D

18. When ____ and ____ are in charge of data, the integrity of the data is imperilled?

    1. Access control, file deletion
    2. Network, file permission
    3. Access control, file permission
    4. Network, system

Answer: C

19. The authenticity and security of data travelling over a network are ensured by?

    1. Firewall
    2. Antivirus
    3. Pentesting Tools
    4. Network-security protocols

Answer: D ( Network-security protocols govern the procedures and processes used to protect network data against illegal content collection)

20. _________ creates an isolated passage across a public network that enables computing devices to communicate and receive data discreetly as though they were directly linked to the private network.

    1. Visual Private Network
    2. Virtual Protocol Network
    3. Virtual Protocol Networking
    4. Virtual Private Network

Answer: D

21. ___________ is one of the safest Linux operating systems, offering invisibility and an incognito mode to protect user data.

    1. Fedora
    2. Tails
    3. Ubuntu
    4. OpenSUSE

Answer: B

22. What is a single entrance for multiple connectivities called?

    1. Web services
    2. phishing
    3. Directory service
    4. worms

Answer: C (A directory service is the following system of software and protocols that keep track of knowledge about the company, clients, or sometimes both)

23. Circuit-level gateway firewalls have which of the below disadvantages?

    1. They’re expensive
    2. They’re complex in architecture
    3. They do not filter individual packets
    4. They’re complex to setup

Answer: C 

24. The initial phase of ethical hacking is?

    1. DNS poisoning
    2. Footprinting
    3. ARP-poisoning
    4. Enumeration

Answer: B ( In this Phase, The attacker attempts to find as many attack vectors as he can, reconnaissance is another term for footprinting)

25. Which of the below can be classified as a type of computer threat?

    1. Dos Attack
    2. Phishing
    3. Soliciting
    4. Both A and C

Answer: A ( A denial of service attack is referred to as a dos attack, it’s a type of cyber-attack in which someone tries to prevent a machine from serving its intended consumers)

26. In system hacking, which of the below is the most crucial activity?

    1. Information gathering
    2. Covering tracks
    3. Cracking passwords
    4. None of the above

Answer: C 

27. When the number of users surpasses the network’s capacity, which of the below network factors suffers the most?

    1. Reliability
    2. Performance
    3. Security
    4. Longevity

Answer: D

28. Which of the below cyber security principles states that the security system should be as compact and straightforward as possible?

    1. Open-design
    2. The economy of the Mechanism
    3. Least privilege
    4. Fail-safe Defaults

Answer: B

29. Which of the below malware types permits the hackers to access administrative controls and do nearly everything he wants with the infected systems?

    1. RATs
    2. Worms
    3. Rootkits
    4. Botnets

Answer: A ( RATs stands for Remote Access Trojans which gives the attacker administrative power over your device, just as if they had physical access)

30. The first hacker’s conference was held in which of the below locations?

    1. OSCON
    2. DEVON
    3. DEFCON
    4. SECTION

Answer: C ( DEFCON is one of the most well-known and biggest hackers and security consultant conferences in the world. It’s often conducted in Las Vegas, Nevada, once a year)

31. When any IT device, service, or system requires security checks, the term “security testing” is employed.?

    1. Threat
    2. Vulnerability
    3. Objective of evaluation
    4. Attack

Answer: C ( When any IT system, device, or platform requires assessment for safety purposes or to address any faults after being evaluated by security researchers, the term “objective of evaluation” is used)

32. Which of the below is used to analyse network flow and monitor traffic?

    1. Managed detection and response
    2. Cloud access security broker
    3. Network traffic analysis
    4. Network traffic analysis

Answer: C

33. Which of the below is a method of gaining access to a computer program or an entire computer system while circumventing all security measures?

    1. Backdoor
    2. Masquerading
    3. Phishing
    4. Trojan Horse

Answer: Backdoor ( A backdoor is a sort of malware that bypasses standard authentication mechanisms to gain access to a system)

34. The term “protection from ______of source code” refers to limiting access to the source code to just authorised individuals.

    1. disclosure
    2. alteration
    3. destruction
    4. log of changes

Answer: C

35. _______________ are programmes or procedures that enable hackers to maintain control of a computer system.?

    1. Exploits
    2. Antivirus
    3. Firewall by-passers
    4. Worms

Answer: A ( Exploits are programs or algorithms that allow hackers to gain total control of a computer system)

Related Pages:

GATE Study Material GATE Downloads
GATE Video Lectures GATE Notifications
GATE Exam Tips GATE PSU Recruitments
Data Mining MCQs
Mobile Computing
Operating Systems MCQs MCQs on HTML
C-Programming MCQs
Python MCQs


Important Links:

GATE CSE Preparation Strategy

How to Prepare for GATE CSE

GATE Previous Year Question Papers With Solutions for ECE PDF Free Download

Best GATE Preparation Books for ECE

How to Prepare for GATE Exam Without Coaching

GATE Rank Predictor

Crack GATE with Unacademy

Get subscription and access unlimited live and recorded courses from India’s best educators

  • Structured syllabus
  • Daily live classes
  • Ask doubts
  • Tests & practice
Learn more

Notifications

Get all the important information related to the GATE Exam including the process of application, important calendar dates, eligibility criteria, exam centers etc.

Complete Guide to GATE 2025 Syllabus for CSE with Subject-wise Weightage – Quick Guide
GATE 2012 Questions with Answers
GATE 2013 Question with Answers
GATE 2014 Question with Answers
GATE 2015 Questions with Answers
GATE 2016 Questions with Answers
GATE 2017 Questions with Answers
GATE 2018 Questions with Answers
GATE 2019 Questions with Answers
GATE 2020 Question Paper with Answer: Download PDFs
GATE 2021 Questions with Answers
GATE 2022 Rankers Summit
GATE 2023 Admit Card – Release Date, How to Download & Direct Link
GATE 2023 Exam Dates
GATE 2024 Registration – Application Form at gate2024.iisc.ac.in
GATE 2026 Detailed Paper Analysis & Solution
GATE CS & IT Engineering Previous Year Questions with Answers
GATE Cutoff 2023 – Brach-wise and Category-wise cut-off
GATE Electrical Engineering Previous Year Questions with Answers
GATE Electronics and Communication Engineering (ECE) Previous Year Questions with Answers
GATE Eligibility Criteria 2026: Age Restrictions, Qualifications, and Applicants
GATE Exam Calendar 2023
GATE Exam Pattern 2023 – New Test Structure, Paper Pattern, Marking Scheme for all papers
GATE Mechanical Engineering Previous Year Questions with Answers
GATE Previous Year Question Papers with Solution – Download PDFs
GATE Previous Year Question Papers with Solutions for Civil Engineering
GATE Result 2023 Out – Steps to check GATE Result
GATE Syllabus 2026: Download GATE Syllabus PDF
See all

Related articles

Learn more topics related to GATE MCQs
Python MCQs

Python is a programming language, basically a very high-level and a general-purpose language. The design is such that it lays emphasis on code readability with the use of significant indentation. The language used in python helps construct an object-oriented approach with the aim to help the programmers write clear and logical codes for small and large-scale products.

Organisational Behaviour

The below articles contains MCQs on Organisational Behaviour. These questions involves the types of questions that are frequently asked in the examination.

Operating System MCQs

This article will discuss important points about operating systems and will as mention multiple choice questions on operating systems. The article will further explain the answers to each question in brief. Further questions related to various sections under the operating system are covered throughout the article.

Mobile Computing

MCQs on " Mobile Computing": Find the multiple choice questions on " Mobile Computing", frequently asked for all competitive examinations.

See all
Access more than

10,997+ courses for GATE & ESE

Get subscription

Trending Topics

  • Comprehensive Guide for GATE Data Science
  • GATE PYQs Test Series (DS & AI Engineering)
  • GATE DS & AI UA Lite – 2026
  • Unacademy Subscription – GATE CSIT, DSAI & Interview Preparation
  • Foundation Batch for GATE & PSUs 2028 – DSAI 4.0
  • GATE Preparation Books

Related Links

  • Abhyaas : Practice Program Batch for GATE & ESE 2026 – CE
  • Starters Kit for GATE 2027 & 2028 – CE
  • Abhyaas : Practice Batch for GATE, ESE & PSUs 2026 – ME
  • Course On Measurements & Instrumentation
  • Starters Kit for GATE 2027 & 2028 – EC
  • Distance Learning Program for GATE – ECE 2025
  • Aasha : Batch for WBSEDCL JE Gr-II 2025
  • GATE Civil Engineering Syllabus 2026
  • GATE Exam Syllabus For Mechanical Engineering
  • Best GATE Preparation Books for ECE
  • How to Prepare for GATE CS & IT
  • GATE Preparation
Download previous years papers
.
Company Logo

Unacademy is India’s largest online learning platform. Download our apps to start learning


Starting your preparation?

Call us and we will answer all your questions about learning on Unacademy

Call +91 8585858585

Company
About usShikshodayaCareers
we're hiring
BlogsPrivacy PolicyTerms and Conditions
Help & support
User GuidelinesSite MapRefund PolicyTakedown PolicyGrievance Redressal
Products
Learner appLearner appEducator appEducator appParent appParent app
Popular goals
IIT JEEUPSCSSCCSIR UGC NETNEET UG
Trending exams
GATECATCANTA UGC NETBank Exams
Study material
UPSC Study MaterialNEET UG Study MaterialCA Foundation Study MaterialJEE Study MaterialSSC Study Material

© 2026 Sorting Hat Technologies Pvt Ltd

Unacademy
  • Goals
    • AFCAT
    • AP EAMCET
    • Bank Exam
    • BPSC
    • CA Foundation
    • CAPF
    • CAT
    • CBSE Class 11
    • CBSE Class 12
    • CDS
    • CLAT
    • CSIR UGC
    • GATE
    • IIT JAM
    • JEE
    • Karnataka CET
    • Karnataka PSC
    • Kerala PSC
    • MHT CET
    • MPPSC
    • NDA
    • NEET PG
    • NEET UG
    • NTA UGC
    • Railway Exam
    • SSC
    • TS EAMCET
    • UPSC
    • WBPSC
    • CFA

Share via

COPY