Cyber Security MCQs – Test Your Knowledge
1. Which of the following is the strongest password?
a) 123456
 b) Qwerty@2020
 c) M@rket!2025#
 d) password123
Answer: c) M@rket!2025#
 ✔ Strong passwords include uppercase, lowercase, numbers, and special symbols.
2. What does VPN stand for?
a) Virtual Protection Network
 b) Virtual Private Network
 c) Verified Protected Node
 d) Virtual Processing Network
Answer: b) Virtual Private Network
 ✔ VPN ensures secure data transmission over public networks.
3. Phishing attacks are usually carried out through:
a) Hardware devices
 b) Email or fake websites
 c) Firewall misconfigurations
 d) Physical theft
Answer: b) Email or fake websites
 ✔ Attackers trick users into revealing sensitive data like passwords.
4. Which protocol is used for secure communication over the internet?
a) HTTP
 b) FTP
 c) HTTPS
 d) SMTP
Answer: c) HTTPS
 ✔ HTTPS encrypts communication using SSL/TLS for security.
5. A firewall is used to:
a) Monitor CPU performance
 b) Block unauthorized access
 c) Increase internet speed
 d) Store encryption keys
Answer: b) Block unauthorized access
 ✔ Firewalls filter incoming and outgoing traffic to protect networks.
6. Malware is short for:
a) Malfunction Software
 b) Malicious Hardware
 c) Malicious Software
 d) Mainframe Software
Answer: c) Malicious Software
 ✔ Malware includes viruses, worms, trojans, spyware, etc.
7. Which type of cyber-attack floods a network with traffic?
a) SQL Injection
 b) Brute Force
 c) DDoS Attack
 d) Phishing
Answer: c) DDoS Attack
 ✔ Distributed Denial of Service overloads systems to disrupt services.
8. Ransomware does what?
a) Encrypts files and demands payment
 b) Deletes all system data
 c) Repairs corrupted files
 d) Steals hardware devices
Answer: a) Encrypts files and demands payment
 ✔ Attackers lock files and ask for ransom to unlock.
9. Which of these is a strong security practice?
a) Using one password everywhere
 b) Regular software updates
 c) Clicking unknown links
 d) Ignoring backups
Answer: b) Regular software updates
 ✔ Updates patch vulnerabilities and reduces attack risks.
10. Which is an example of social engineering?
a) DDoS attack
 b) SQL Injection
 c) Pretexting call
 d) Malware infection
Answer: c) Pretexting call
 ✔ Social engineering manipulates human psychology for data theft.
11. Which tool is commonly used for network scanning?
a) Photoshop
 b) Nmap
 c) MS Word
 d) PowerPoint
Answer: b) Nmap
 ✔ Nmap is a security scanner used to discover hosts and services.
12. What does the CIA triad stand for in Cyber Security?
a) Confidentiality, Integrity, Availability
 b) Control, Inspection, Authentication
 c) Cyber, Internet, Access
 d) Confidential, Information, Assurance
Answer: a) Confidentiality, Integrity, Availability
 ✔ These are the three main principles of information security.
13. Which of the following is NOT malware?
a) Virus
 b) Worm
 c) Trojan
 d) Firewall
Answer: d) Firewall
 ✔ Firewall is a protective tool, not malware.
14. A brute-force attack means:
a) Guessing passwords repeatedly
 b) Injecting malicious SQL code
 c) Sending fake emails
 d) Stealing hardware
Answer: a) Guessing passwords repeatedly
 ✔ Attackers try multiple password combinations until successful.
15. What is Two-Factor Authentication (2FA)?
a) Using two passwords
 b) Password + OTP or biometric
 c) Two antivirus software programs
 d) Password + username
Answer: b) Password + OTP or biometric
 ✔ 2FA adds an extra security layer beyond passwords.
16. Which attack involves injecting malicious code into a database?
a) DDoS
 b) SQL Injection
 c) Phishing
 d) Cross-Site Scripting
Answer: b) SQL Injection
 ✔ Attackers exploit weak input validation in databases.
17. Which Cyber Security law in India covers IT crimes?
a) Indian Penal Code
 b) Information Technology Act, 2000
 c) Cybercrime Protection Act
 d) Digital India Act
Answer: b) Information Technology Act, 2000
 ✔ The IT Act regulates cybercrimes and digital offenses.
18. Which of these is NOT a cyber threat?
a) Viruses
 b) Phishing
 c) Encryption
 d) Spyware
Answer: c) Encryption
 ✔ Encryption is a protective measure, not a threat.
19. Which device ensures secure remote login?
a) Firewall
 b) VPN
 c) Proxy server
 d) Switch
Answer: b) VPN
 ✔ VPNs protect data while accessing networks remotely.
20. A honeypot in Cyber Security is used for:
a) Storing passwords
 b) Trapping attackers
 c) Speeding up the internet
 d) Backup creation
Answer: b) Trapping attackers
 ✔ Honeypots lure hackers to study attack behavior.
21. Which cyber-attack targets web applications?
a) SQL Injection
 b) Cross-Site Scripting (XSS)
 c) Both a & b
 d) None
Answer: c) Both a & b
 ✔ Web apps are highly vulnerable to these attacks.
22. Which encryption is more secure?
a) Symmetric
 b) Asymmetric
 c) Plain text
 d) None
Answer: b) Asymmetric
 ✔ Asymmetric uses public & private keys for higher security.
23. Zero-day vulnerability refers to:
a) A virus detected on the first day
 b) Unknown software flaws not yet patched
 c) 24-hour attack duration
 d) An expired password
Answer: b) Unknown software flaws not yet patched
 ✔ Hackers exploit vulnerabilities before developers fix them.
24. Which is the safest way to browse the internet?
a) Using Incognito Mode only
 b) Using a VPN and HTTPS
 c) Disabling antivirus
 d) Ignoring updates
Answer: b) Using a VPN and HTTPS
 ✔ VPN + HTTPS ensures privacy and security online.
25. Which skill is MOST important for a Cyber Security career?
a) Coding only
 b) Analytical & problem-solving skills
 c) Designing logos
 d) MS Office knowledge
Answer: b) Analytical & problem-solving skills
 ✔ Cybersecurity experts must analyze threats and solve issues quickly.
Conclusion
Cyber Security MCQs are an excellent way to test your knowledge and prepare for real-world challenges in the digital security domain. By practicing regularly, you can strengthen your understanding of core concepts like network defense, encryption, and threat prevention. Consistency and revision are the keys to success in this ever-evolving field. With TrainingX’s Cyber Security training and practical guidance, you can master essential skills and build a successful career in one of the most in-demand industries.

Comments
Post a Comment