Cybersecurity & Network Security MCQs with Answers
What is the primary goal of cybersecurity?
a) To prevent unauthorized access to systems and data
b) To increase the speed of the network
c) To ensure high system uptime
d) To provide customer support
Which of the following is a type of malware that spreads through email attachments?
a) Worm
b) Virus
c) Trojan Horse
d) Phishing
What does a firewall primarily protect against?
a) Unauthorized access and attacks from the internet
b) Loss of data
c) Physical damage to the hardware
d) Software bugs and crashes
Which of the following is used to secure communication over the internet?
a) VPN
b) SMTP
c) DNS
d) FTP
What is the purpose of an Intrusion Detection System (IDS)?
a) To monitor network traffic for malicious activity
b) To back up data
c) To encrypt sensitive files
d) To perform system updates
What is a common characteristic of a DDoS (Distributed Denial of Service) attack?
a) It aims to steal sensitive data from a system
b) It floods a system with excessive traffic to make it unavailable
c) It spreads malware through email
d) It targets physical hardware directly
Which of the following protocols is used to secure HTTP traffic?
a) HTTPS
b) HTTP
c) FTP
d) SMTP
What is the function of a VPN (Virtual Private Network)?
a) To create a secure connection between a user and the internet
b) To allow users to access web pages more quickly
c) To perform regular system backups
d) To monitor network traffic
Which of the following is a type of attack that involves tricking a user into revealing sensitive information?
a) Phishing
b) Spoofing
c) Buffer Overflow
d) Ransomware
What is a “zero-day” vulnerability?
a) A vulnerability that has been patched by the developer
b) A vulnerability that has not been discovered yet
c) A vulnerability that is exploited before the developer can issue a patch
d) A vulnerability that is intentionally created for testing purposes
Which of the following is a common method used in data encryption?
a) SSL/TLS
b) SSH
c) DNS
d) FTP
Which of the following is a technique used to prevent unauthorized access to a network?
a) Two-factor authentication
b) File sharing
c) Network management
d) Email encryption
What is a common symptom of a ransomware attack?
a) System crashes without warning
b) Files are encrypted and demand for payment is made
c) Unauthorized emails are sent from the system
d) Network speeds slow down significantly
What is the purpose of an anti-virus program?
a) To protect the system from viruses and other types of malware
b) To perform regular system backups
c) To increase system performance
d) To monitor network traffic
Which of the following is a technique used in network security to prevent unauthorized access to a system?
a) Firewall
b) VPN
c) Encryption
d) All of the above
What is a key difference between a virus and a worm?
a) A virus requires human action to propagate, whereas a worm does not
b) A worm requires human action to propagate, whereas a virus does not
c) A virus is smaller in size compared to a worm
d) A virus can only be spread through email, whereas a worm cannot
What is the main purpose of penetration testing?
a) To detect and remove malware
b) To simulate attacks to identify vulnerabilities in a system
c) To perform regular system backups
d) To encrypt sensitive data
Which of the following is a form of social engineering?
a) Phishing
b) SQL Injection
c) Cross-Site Scripting (XSS)
d) Buffer Overflow
What does the term “cyber hygiene” refer to?
a) Regularly updating and securing systems and devices
b) Monitoring network traffic for suspicious activity
c) Ensuring that all devices have sufficient memory
d) Cleaning physical hardware to prevent damage
Which of the following is a type of attack where an attacker intercepts and modifies communications between two parties?
a) Man-in-the-middle
b) Denial of Service
c) Phishing
d) Ransomware
What is the purpose of multi-factor authentication (MFA)?
a) To improve network performance
b) To require users to provide multiple forms of verification to access a system
c) To encrypt sensitive data
d) To manage user roles and permissions
Which of the following best describes a Denial of Service (DoS) attack?
a) An attack that prevents legitimate users from accessing a system by overwhelming it with traffic
b) An attack that involves stealing sensitive data from a system
c) An attack that installs malware on a system
d) An attack that intercepts and modifies data transmissions
What is the function of encryption in network security?
a) To hide data from unauthorized users
b) To speed up data transmission
c) To prevent data loss
d) To back up system data
Which of the following is a technique for securing wireless networks?
a) Using strong WPA2 encryption
b) Disabling firewalls
c) Allowing open access for users
d) Using default passwords
What is the purpose of an Access Control List (ACL) in network security?
a) To define the permissions and access rights for users and devices
b) To monitor network traffic
c) To perform data encryption
d) To back up system data
Which of the following is a potential consequence of a security breach?
a) Loss of sensitive data
b) Damage to a company’s reputation
c) Financial loss
d) All of the above
What is the primary function of an SSL certificate in network security?
a) To encrypt data between the server and the client
b) To monitor network traffic for threats
c) To secure email communications
d) To prevent malware infections
Which of the following is a key principle of the principle of least privilege?
a) Users should have access only to the data and systems they need for their roles
b) All users should have admin-level privileges
c) Users should never change their passwords
d) System updates should be avoided
What is the primary purpose of network segmentation in cybersecurity?
a) To divide a network into smaller segments for improved security
b) To increase the bandwidth of the network
c) To monitor network traffic
d) To perform regular backups