Computer

Cybersecurity & Network Security MCQs with Answers

What is the primary goal of cybersecurity?
a) To prevent unauthorized access to systems and data
b) To increase the speed of the network
c) To ensure high system uptime
d) To provide customer support

Answer
a) To prevent unauthorized access to systems and data

Which of the following is a type of malware that spreads through email attachments?
a) Worm
b) Virus
c) Trojan Horse
d) Phishing

Answer
b) Virus

What does a firewall primarily protect against?
a) Unauthorized access and attacks from the internet
b) Loss of data
c) Physical damage to the hardware
d) Software bugs and crashes

Answer
a) Unauthorized access and attacks from the internet

Which of the following is used to secure communication over the internet?
a) VPN
b) SMTP
c) DNS
d) FTP

Answer
a) VPN

What is the purpose of an Intrusion Detection System (IDS)?
a) To monitor network traffic for malicious activity
b) To back up data
c) To encrypt sensitive files
d) To perform system updates

Answer
a) To monitor network traffic for malicious activity

What is a common characteristic of a DDoS (Distributed Denial of Service) attack?
a) It aims to steal sensitive data from a system
b) It floods a system with excessive traffic to make it unavailable
c) It spreads malware through email
d) It targets physical hardware directly

Answer
b) It floods a system with excessive traffic to make it unavailable

Which of the following protocols is used to secure HTTP traffic?
a) HTTPS
b) HTTP
c) FTP
d) SMTP

Answer
a) HTTPS

What is the function of a VPN (Virtual Private Network)?
a) To create a secure connection between a user and the internet
b) To allow users to access web pages more quickly
c) To perform regular system backups
d) To monitor network traffic

Answer
a) To create a secure connection between a user and the internet

Which of the following is a type of attack that involves tricking a user into revealing sensitive information?
a) Phishing
b) Spoofing
c) Buffer Overflow
d) Ransomware

Answer
a) Phishing

What is a “zero-day” vulnerability?
a) A vulnerability that has been patched by the developer
b) A vulnerability that has not been discovered yet
c) A vulnerability that is exploited before the developer can issue a patch
d) A vulnerability that is intentionally created for testing purposes

Answer
c) A vulnerability that is exploited before the developer can issue a patch

Which of the following is a common method used in data encryption?
a) SSL/TLS
b) SSH
c) DNS
d) FTP

Answer
a) SSL/TLS

Which of the following is a technique used to prevent unauthorized access to a network?
a) Two-factor authentication
b) File sharing
c) Network management
d) Email encryption

Answer
a) Two-factor authentication

What is a common symptom of a ransomware attack?
a) System crashes without warning
b) Files are encrypted and demand for payment is made
c) Unauthorized emails are sent from the system
d) Network speeds slow down significantly

Answer
b) Files are encrypted and demand for payment is made

What is the purpose of an anti-virus program?
a) To protect the system from viruses and other types of malware
b) To perform regular system backups
c) To increase system performance
d) To monitor network traffic

Answer
a) To protect the system from viruses and other types of malware

Which of the following is a technique used in network security to prevent unauthorized access to a system?
a) Firewall
b) VPN
c) Encryption
d) All of the above

Answer
d) All of the above

What is a key difference between a virus and a worm?
a) A virus requires human action to propagate, whereas a worm does not
b) A worm requires human action to propagate, whereas a virus does not
c) A virus is smaller in size compared to a worm
d) A virus can only be spread through email, whereas a worm cannot

Answer
a) A virus requires human action to propagate, whereas a worm does not

What is the main purpose of penetration testing?
a) To detect and remove malware
b) To simulate attacks to identify vulnerabilities in a system
c) To perform regular system backups
d) To encrypt sensitive data

Answer
b) To simulate attacks to identify vulnerabilities in a system

Which of the following is a form of social engineering?
a) Phishing
b) SQL Injection
c) Cross-Site Scripting (XSS)
d) Buffer Overflow

Answer
a) Phishing

What does the term “cyber hygiene” refer to?
a) Regularly updating and securing systems and devices
b) Monitoring network traffic for suspicious activity
c) Ensuring that all devices have sufficient memory
d) Cleaning physical hardware to prevent damage

Answer
a) Regularly updating and securing systems and devices

Which of the following is a type of attack where an attacker intercepts and modifies communications between two parties?
a) Man-in-the-middle
b) Denial of Service
c) Phishing
d) Ransomware

Answer
a) Man-in-the-middle

What is the purpose of multi-factor authentication (MFA)?
a) To improve network performance
b) To require users to provide multiple forms of verification to access a system
c) To encrypt sensitive data
d) To manage user roles and permissions

Answer
b) To require users to provide multiple forms of verification to access a system

Which of the following best describes a Denial of Service (DoS) attack?
a) An attack that prevents legitimate users from accessing a system by overwhelming it with traffic
b) An attack that involves stealing sensitive data from a system
c) An attack that installs malware on a system
d) An attack that intercepts and modifies data transmissions

Answer
a) An attack that prevents legitimate users from accessing a system by overwhelming it with traffic

What is the function of encryption in network security?
a) To hide data from unauthorized users
b) To speed up data transmission
c) To prevent data loss
d) To back up system data

Answer
a) To hide data from unauthorized users

Which of the following is a technique for securing wireless networks?
a) Using strong WPA2 encryption
b) Disabling firewalls
c) Allowing open access for users
d) Using default passwords

Answer
a) Using strong WPA2 encryption

What is the purpose of an Access Control List (ACL) in network security?
a) To define the permissions and access rights for users and devices
b) To monitor network traffic
c) To perform data encryption
d) To back up system data

Answer
a) To define the permissions and access rights for users and devices

Which of the following is a potential consequence of a security breach?
a) Loss of sensitive data
b) Damage to a company’s reputation
c) Financial loss
d) All of the above

Answer
d) All of the above

What is the primary function of an SSL certificate in network security?
a) To encrypt data between the server and the client
b) To monitor network traffic for threats
c) To secure email communications
d) To prevent malware infections

Answer
a) To encrypt data between the server and the client

Which of the following is a key principle of the principle of least privilege?
a) Users should have access only to the data and systems they need for their roles
b) All users should have admin-level privileges
c) Users should never change their passwords
d) System updates should be avoided

Answer
a) Users should have access only to the data and systems they need for their roles

What is the primary purpose of network segmentation in cybersecurity?
a) To divide a network into smaller segments for improved security
b) To increase the bandwidth of the network
c) To monitor network traffic
d) To perform regular backups

Answer
a) To divide a network into smaller segments for improved security

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button