GATE Exam » GATE MCQs » Cyber Security

Cyber Security

MCQs on " Cyber Security": Find the multiple choice questions on " Cyber Security", frequently asked for all competitive examinations.

The technique of protecting laptops, websites, mobile platforms, communications devices, networking, and data from hostile intrusions is known as cyber security. Today, someone can send or receive any source of data, whether it’s videos, or mail, in just one click, but has he ever wondered how secure this information is conveyed to another person with no data leakage? Cybersecurity is the appropriate answer. Today more than 61% of full industry exchanges are done on the internet, so this for the area is a prerequisite for high-quality security for direct and best exchanges. Thus, cybersecurity has become the most recent issue (Dervojeda et al., 2014). More than two-thirds of whole market transactions are now conducted through online mode, demanding a degree of security for straight and best transactions in this field. As a result, cybersecurity has recently become a major topic.

Multiple Choice Questions(MCQ)

1. Cyber Security provide security against what?

    1. Against Malware
    2. Against cyber-terrorists
    3. Defends a device from threat.
    4. All mentioned options

Answer: D

2. Who is popularly known as the father of cyber security?

    1. Robert
    2. August Kerckhoffs
    3. Bob Thomas
    4. Charles

Answer: B

3. Which of the below is a kind of cyber security?

    1. Cloud Security
    2. Application Security
    3. Cloud Security
    4. All options mentioned above

Answer: D 

4. Which of the below does not constitute a cybercrime?

    1. refusal of service
    2. Man in the middle
    3. Phishing
    4. AES

Answer: D (AES stands for Advanced Encryption Standard) safeguards data by encoding it)

5. Which of the below benefits of cyber security is not true?

    1. System getting slower
    2. Computer lagging and crashes
    3. provide privacy to users
    4. Secures system against viruses  

Answer: A

6. Who coined the term “ Cyberspace”?

    1. William Gibson
    2. Andrew Tannenbaum
    3. Scott Fahlman
    4. Richard Stallman

Answer: A

7. Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic?

    1. Pharming
    2. Mimicking
    3. Spamming
    4. Website-Duplication

Answer: A ( Pharming is a method and technique used by cybercriminals to deceive people by creating fake websites and domains)

8. Which of the below is a popular victim of cyber attackers looking to gain the IP address of a target or victim user?

    1. emails
    2. websites
    3. IP tracer
    4. web pages

Answer: B

9. Which of the below does not qualify as a form of peer-to-peer cybercrime?

    1. Trojans are implanted into a targeted device.
    2. On the deep web, payment information is leaked.
    3. mm
    4. Phishing

Answer:  B

10. An act to injure, corrupt, or threaten a system or network is characterised as which of the below?

    1. Digital crime
    2. Threats
    3. System hijacking
    4. Cyber Attack

Answer: D

11. Any company or agency’s IT protection is managed and maintained by?

    1. Software Security Specialist
    2. CEO of the organisation
    3. Security Auditor
    4. IT Security Engineer

Answer: D ( This is a profession in which a professional develops and maintains various systems and security devices for the firm or organisation)

12. Which of the below is an internet fraud in which a consumer is digitally persuaded to reveal personal data by cybercriminals?

    1. MiTM attack
    2. Phishing attack
    3. Website attack
    4. DoS attack

Answer: B

13. Which of the below security encryption standards is the weakest?

    1. WPA3
    2. WPA2
    3. WPA
    4. WEP

Answer: D ( WEP stands for wired Equivalent Privacy. It is a most insecure encrypted protocol)

14. Which of the below measures can help reduce the risk of data leakage?

    1. Steganography
    2. Chorography
    3. Cryptography
    4. Authentication

Answer: A ( Steganography functions as  concealing information in a non-suspicious manner)

15. This is the concept for guiding information security policy within a corporation, firm, or organisation. What exactly is “this” in this context?

    1. Confidentiality
    2. Non-repudiation
    3. CIA Triad
    4. Authenticity

Answer: C (CIA Triad is the most popular and frequently used approach, focusing on the confidentiality of information)

16. ___________ means the security of data from tampering by unidentified users.

    1. Confidentiality
    2. Integrity
    3. Authentication
    4. Non-repudiation

Answer: B

17. Which of the below implemented is not a good means of safeguarding privacy?

    1. Biometric verification
    2. ID and password-based verification
    3. 2-factor authentication
    4. switching off the phone

Answer: D

18. When ____ and ____ are in charge of data, the integrity of the data is imperilled?

    1. Access control, file deletion
    2. Network, file permission
    3. Access control, file permission
    4. Network, system

Answer: C

19. The authenticity and security of data travelling over a network are ensured by?

    1. Firewall
    2. Antivirus
    3. Pentesting Tools
    4. Network-security protocols

Answer: D ( Network-security protocols govern the procedures and processes used to protect network data against illegal content collection)

20. _________ creates an isolated passage across a public network that enables computing devices to communicate and receive data discreetly as though they were directly linked to the private network.

    1. Visual Private Network
    2. Virtual Protocol Network
    3. Virtual Protocol Networking
    4. Virtual Private Network

Answer: D

21. ___________ is one of the safest Linux operating systems, offering invisibility and an incognito mode to protect user data.

    1. Fedora
    2. Tails
    3. Ubuntu
    4. OpenSUSE

Answer: B

22. What is a single entrance for multiple connectivities called?

    1. Web services
    2. phishing
    3. Directory service
    4. worms

Answer: C (A directory service is the following system of software and protocols that keep track of knowledge about the company, clients, or sometimes both)

23. Circuit-level gateway firewalls have which of the below disadvantages?

    1. They’re expensive
    2. They’re complex in architecture
    3. They do not filter individual packets
    4. They’re complex to setup

Answer: C 

24. The initial phase of ethical hacking is?

    1. DNS poisoning
    2. Footprinting
    3. ARP-poisoning
    4. Enumeration

Answer: B ( In this Phase, The attacker attempts to find as many attack vectors as he can, reconnaissance is another term for footprinting)

25. Which of the below can be classified as a type of computer threat?

    1. Dos Attack
    2. Phishing
    3. Soliciting
    4. Both A and C

Answer: A ( A denial of service attack is referred to as a dos attack, it’s a type of cyber-attack in which someone tries to prevent a machine from serving its intended consumers)

26. In system hacking, which of the below is the most crucial activity?

    1. Information gathering
    2. Covering tracks
    3. Cracking passwords
    4. None of the above

Answer: C 

27. When the number of users surpasses the network’s capacity, which of the below network factors suffers the most?

    1. Reliability
    2. Performance
    3. Security
    4. Longevity

Answer: D

28. Which of the below cyber security principles states that the security system should be as compact and straightforward as possible?

    1. Open-design
    2. The economy of the Mechanism
    3. Least privilege
    4. Fail-safe Defaults

Answer: B

29. Which of the below malware types permits the hackers to access administrative controls and do nearly everything he wants with the infected systems?

    1. RATs
    2. Worms
    3. Rootkits
    4. Botnets

Answer: A ( RATs stands for Remote Access Trojans which gives the attacker administrative power over your device, just as if they had physical access)

30. The first hacker’s conference was held in which of the below locations?

    1. OSCON
    2. DEVON
    3. DEFCON
    4. SECTION

Answer: C ( DEFCON is one of the most well-known and biggest hackers and security consultant conferences in the world. It’s often conducted in Las Vegas, Nevada, once a year)

31. When any IT device, service, or system requires security checks, the term “security testing” is employed.?

    1. Threat
    2. Vulnerability
    3. Objective of evaluation
    4. Attack

Answer: C ( When any IT system, device, or platform requires assessment for safety purposes or to address any faults after being evaluated by security researchers, the term “objective of evaluation” is used)

32. Which of the below is used to analyse network flow and monitor traffic?

    1. Managed detection and response
    2. Cloud access security broker
    3. Network traffic analysis
    4. Network traffic analysis

Answer: C

33. Which of the below is a method of gaining access to a computer program or an entire computer system while circumventing all security measures?

    1. Backdoor
    2. Masquerading
    3. Phishing
    4. Trojan Horse

Answer: Backdoor ( A backdoor is a sort of malware that bypasses standard authentication mechanisms to gain access to a system)

34. The term “protection from ______of source code” refers to limiting access to the source code to just authorised individuals.

    1. disclosure
    2. alteration
    3. destruction
    4. log of changes

Answer: C

35. _______________ are programmes or procedures that enable hackers to maintain control of a computer system.?

    1. Exploits
    2. Antivirus
    3. Firewall by-passers
    4. Worms

Answer: A ( Exploits are programs or algorithms that allow hackers to gain total control of a computer system)