Google News
logo
Cyber Security - Quiz(MCQ)
A)
Chorography
B)
Cryptography
C)
Authentication
D)
Steganography

Correct Answer : Option (D) :   Steganography


Explanation :

Ordinary files are targeted by hackers or other cyber criminals in order to disguise distinct data or information within another data file. You can reduce the risk of data leaking by employing steganography.

A)
Piracy
B)
Plagiarism
C)
Intellectual property rights
D)
All of the Above

Correct Answer : Option (D) :   All of the Above


Explanation : The stealing ideas or the invention of others and using them for their own profits can also be defined in several different ways, such as piracy, intellectual property rights, and plagiarism.

A)
Cyber Ethics
B)
Cyber Low
C)
Cyber Safety
D)
Cyber Security

Correct Answer : Option (A) :   Cyber Ethics


Explanation : Cyber Ethics refers to exploring the appropriate, ethical behaviors related to online environments and digital media.

A)
security auditor
B)
security officer
C)
malicious hacker
D)
network analyst

Correct Answer : Option (B) :   malicious hacker


Explanation : Malicious hackers can gain illegal access at OS level, application level or network level if the penetration testers or ethical hackers lack in testing and reporting the vulnerabilities in a system.

A)
Insecure network
B)
Cross Site Scripting
C)
Social Engineering
D)
Reverse Engineering

Correct Answer : Option (C) :   Social Engineering


Explanation : Using social engineering techniques, hackers try to exploit the victim’s mind to gain valuable information about that person such as his/her phone number, Date of Birth, pet name etc.

A)
Vishing
B)
Phishing
C)
Pretexting
D)
Spamming

Correct Answer : Option (C) :   Pretexting


Explanation : In the pretexting technique of social engineering, the attacker pretends in need of legitimate information from the victim for confirming his/her identity.

A)
Firewall
B)
Antivirus
C)
Pentesting Tools
D)
Network-security protocols

Correct Answer : Option (D) :   Network-security protocols


Explanation : The methods and processes in securing network data from unauthorized content extraction are controlled by network-security protocols.

A)
SMTP
B)
SSL
C)
SFTP
D)
HTTPS

Correct Answer : Option (A) :   SMTP


Explanation : SMTP (Simple Mail Transfer Protocol) is a standard protocol to transmit electronic mail and is a widely used mail transmitting protocol.

A)
POP3
B)
SSMTP
C)
S/MIME
D)
Mail using PGP

Correct Answer : Option (A) :   POP3


Explanation : POP (Post Office Protocol) is a simple protocol which fetches the updated mail stored for you by the server. S/MIME (Secure/Multipurpose Internet Mail Extensions), SSMTP (Secure-Simple Mail Transfer Protocol), and PGP (Pretty Good Privacy) are examples of protocols and methods for secure mailing.

A)
MAC (Machine Access Code)
B)
MAC (Message Authentication Code)
C)
MAC (Message Access Code)
D)
MAC (Machine Authentication Code)

Correct Answer : Option (B) :   MAC (Message Authentication Code)


Explanation : For authenticating in SSL, a short message known as MAC (Message Authentication Code) is used for authenticating a message; where both the sender & the receiver need to implement the same key in order to start communicating.