Cyber Security MCQ questions and answers

Cyber Security MCQ

Cyber Security mcq questions and answers

Q. 1 _______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.

A : Network Security
B : Database Security
C : Information Security
D : Physical Security

Q. 2 _______ platforms are used for safety and protection of information in the cloud.

A : Cloud workload protection platforms
B : Cloud security protocols
C : AWS
D : One Drive

Q. 3 Compromising confidential information comes under _________

A : Bug
B : Threat
C : Vulnerability
D : Attack

Q. 4 An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

A : Cyber-crime
B : Cyber Attack
C : System hijacking
D : Digital crime

Q. 5 The CIA triad is often represented by which of the following?

A : Triangle
B : Diagonal
C : Ellipse
D : Circle

Q. 6 Related to information security, confidentiality is the opposite of which of the following?

A : Closure
B : Disclosure
C : Disaster
D : Disposal

Q. 7 _______ means the protection of data from modification by unknown users.

A : Confidentiality
B : Integrity
C : Authentication
D : Non-repudiationShow Answer

Q. 8 _______ of information means, only authorized users are capable of accessing the information.

A : Confidentiality
B : Integrity
C : Non-repudiation
D : Availability


Q. 9 This helps in identifying the origin of information and authentic user. This referred to here as _________

A : Confidentiality
B : Integrity
C : Authenticity
D : Availability

Q. 10 Data ___________ is used to ensure confidentiality.

A : Encryption
B : Locking
C : Decryption
D : Backup

Q. 11 What does OSI stand for in the OSI Security Architecure?

A : Open System Interface
B : Open Systems Interconnections
C : Open Source Initiative
D : Open Standard InterconnectionsShow Answer

Q. 12 A company requires its users to change passwords every month. This improves the ________ of the network.

A : Performance
B : Reliability
C : Security
D : None of the above

Q. 13 ________ provides privacy, integrity, and authentication in e-mail.

A : IPSec
B : SSL
C : PGP
D : none of the above

Q. 14 Release of message contents and Traffic analysis are two types of _________ attacks.

A : Active Attack
B : Modification of Attack
C : Passive attack
D : DoS AttackShow Answer

Q. 15 The ________ is encrypted text.

A : Cipher scricpt
B : Cipher text
C : Secret text
D : Secret script

Q. 16 Which of the following Algorithms not belong to symmetric encryption

A : 3DES (TripleDES)
B : RSA
C : RC5
D : IDEAShow Answer

Q. 17 Which is the largest disadvantage of the symmetric Encryption?

A : More complex and therefore more time-consuming calculations.
B : Problem of the secure transmission of the Secret Key.
C : Less secure encryption function.
D : Isn’t used any more.Show Answer

Q. 18 In cryptography, what is cipher?

A : algorithm for performing encryption and decryption
B : encrypted message
C : both algorithm for performing encryption and decryption and encrypted message
D : decrypted message

Q. 19 A ______ provides privacy for LANs that must communicate through the global Internet.

A : VPP
B : VNP
C : VNN
D : VPN

Q. 20 _______ uses the idea of certificate trust levels.

A : X509
B : PGP
C : KDC
D : none of the above

Q. 21 Which one of the following algorithm is not used in asymmetric-key cryptography?

A : rsa algorithm
B : diffie-hellman algorithm
C : electronic code book algorithm
D : dsa algorithm

Q. 22 What is data encryption standard (DES)?

A : block cipher
B : stream cipher
C : bit cipher
D : byte cipherShow Answer

Q. 23 A asymmetric-key (or public key ) cipher uses

A : 1 key
B : 2 key
C : 3 key
D : 4 keyShow Answer

Q. 24 _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

A : Malware Analysis
B : Exploit writing
C : Reverse engineering
D : Cryptography

Q.25 ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

A : Malware Analysis
B : Cryptography
C : Reverse engineering
D : Exploit writingShow Answer

Q. 26 Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.

A : secret key
B : external programs
C : add-ons
D : secondary keyShow Answer

Q. 27 Conventional cryptography is also known as _____________ or symmetric-key encryption.

A : secret-key
B : public key
C : protected key
D : primary key

Q. 28 The procedure to add bits to the last block is termed as _________________

A : decryption
B : hashing
C : tuning
D : paddingShow Answer

Q. 29 ECC encryption system is __________

A : symmetric key encryption algorithm
B : asymmetric key encryption algorithm
C : not an encryption algorithm
D : block cipher method

Q. 30 ________function creates a message digest out of a message.

A : encryption
B : decryption
C : hash
D : none of the aboveShow Answer

Q. 31 Extensions to the X.509 certificates were added in version ____

A : 1
B : 2
C : 3
D : 4Show Answer

Q. 32 A digital signature needs ____ system

A : symmetric-key
B : asymmetric-key
C : either (a) or (b)
D : neither (a) nor (b)

Q. 33 Elliptic curve cryptography follows the associative property.

A : TRUE
B : FALSE

Q. 34 ECC stands for

A : Elliptic curve cryptography
B : Enhanced curve cryptography
C : Elliptic cone cryptography
D : Eclipse curve cryptography

Q. 35 When a hash function is used to provide message authentication, the hash function value is referred to as

A : Message Field
B : Message Digest
C : Message Score
D : Message Leap

Q. 36 Message authentication code is also known as

A : key code
B : hash code
C : keyed hash function
D : message key hash function

Q. 37 The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.

A : TRUE
B : FALSE

Q. 38 The DSS signature uses which hash algorithm?

A : MD5
B : SHA-2
C : SHA-1
D : Does not use hash algorithm

Q. 39 What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

A : 42 bytes
B : 32 bytes
C : 36 bytes
D : 48 bytes

Q. 40 In the handshake protocol which is the message type first sent between client and server ?

A : server_hello
B : client_hello
C : hello_request
D : certificate_request

Q. 41 One commonly used public-key cryptography method is the ______ algorithm.

A : RSS
B : RAS
C : RSA
D : RAA


Q. 42 The ________ method provides a one-time session key for two parties.

A : Diffie-Hellman
B : RSA
C : DES
D : AES

Q. 43 The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.

A : man-in-the-middle
B : ciphertext attack
C : plaintext attack
D : none of the above

Q. 44 VPN is abbreviated as __________

A : Visual Private Network
B : Virtual Protocol Network
C : Virtual Private Network
D : Virtual Protocol Networking

Q. 45 __________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.

A : Visual Private Network
B : Virtual Protocol Network
C : Virtual Protocol Networking
D : Virtual Private Network

Q. 46 Which of the statements are not true to classify VPN systems?

A : Protocols used for tunnelling the traffic
B : Whether VPNs are providing site-to-site or remote access connection
C : Securing the network from bots and malwares
D : Levels of security provided for sending and receiving data privately

Q. 47 What types of protocols are used in VPNs?

A : Application level protocols
B : Tunnelling protocols
C : Network protocols
D : Mailing protocols

Q. 48 VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.

A : TRUE
B : False

Q. 49 There are _________ types of VPNs.

A : 3
B : 2
C : 5
D : 4

Q. 50 _________ type of VPNs are used for home private and secure connectivity.
A : Remote access VPNs
B : Site-to-site VPNs
C : Peer-to-Peer VPNs
D : Router-to-router VPNsShow

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top