CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
Cyber Security Techniques
1. What is the primary goal of cybersecurity?
a) Protecting physical assets
b) Safeguarding only personal information
c) Ensuring the confidentiality, integrity, and availability of data
d) Preventing all cyberattacks
Answer: c
Explanation: The main goal of cybersecurity is to ensure data confidentiality, integrity, and
availability, often referred to as the CIA triad.
2. Which of the following is a type of malware?
a) Firewall
b) Worm
c) HTTPS
d) Encryption
Answer: b
Explanation: Worms are a type of malware designed to self-replicate and spread across networks
without human intervention.
3. What is the purpose of a firewall in cybersecurity?
a) Detecting and removing viruses
b) Blocking unauthorized access to or from a network
c) Encrypting sensitive information
d) Monitoring physical security
Answer: b
Explanation: Firewalls prevent unauthorized access by filtering incoming and outgoing network
traffic based on predefined security rules.
4. What does "phishing" refer to in cybersecurity?
a) Unauthorized code execution
b) Email-based attacks to steal sensitive information
c) Encrypting files for ransom
d) Scanning for vulnerabilities
Answer: b
Explanation: Phishing attacks involve sending deceptive emails to trick users into revealing
sensitive information such as passwords or credit card numbers.
5. Which encryption standard is widely used for secure online communication?
a) MD5 b) AES c) SHA-256 d) DES
Answer: b
Explanation: AES (Advanced Encryption Standard) is widely used for secure data transmission due
to its strength and efficiency.
6. What is a zero-day vulnerability?
a) A vulnerability exploited before being patched
b) A vulnerability in outdated software
c) A network misconfiguration
d) A denial-of-service attack
Answer: a
Explanation: Zero-day vulnerabilities are exploited before the vendor or developers can issue a
patch to fix them.
7. What does SSL stand for?
a) Secure Socket Layer b) Secure Software License
c) System Security Layer d) Socket Safety Level
Answer: a
Explanation: SSL (Secure Socket Layer) is a cryptographic protocol for secure communication over
a computer network.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
8. Which technique involves converting plaintext into unreadable text?
a) Hashing b) Encryption c) Decryption d) Authentication
Answer: b
Explanation: Encryption converts plaintext into ciphertext to protect sensitive information during
transmission.
9. What is the main characteristic of a denial-of-service (DoS) attack?
a) Encrypting data for ransom
b) Overwhelming a system with traffic
c) Exploiting software vulnerabilities
d) Intercepting data in transit
Answer: b
Explanation: DoS attacks flood a system with traffic, causing it to become unavailable to legitimate
users.
10. What does two-factor authentication (2FA) provide?
a) Single-step login process
b) Enhanced security by requiring two verification methods
c) Automatic password resets
d) Encrypted communication
Answer: b
Explanation: 2FA enhances security by requiring two independent methods of verifying the user’s
identity.
11. What is SQL injection?
a) Encrypting database records
b) Maliciously injecting code into SQL queries
c) A method to secure SQL databases
d) A denial-of-service attack on databases
Answer: b
Explanation: SQL injection involves injecting malicious SQL code into queries to manipulate or
compromise databases.
12. Which of the following is a type of social engineering attack?
a) Ransomware
b) Phishing
c) Brute force attack
d) DDoS attack
Answer: b
Explanation: Phishing is a common social engineering tactic used to manipulate individuals into
revealing sensitive information.
13. What is the role of intrusion detection systems (IDS)?
a) Blocking network intrusions
b) Detecting and alerting on suspicious activities
c) Encrypting network traffic
d) Performing penetration testing
Answer: b
Explanation: IDS are designed to monitor networks and systems for malicious activities or policy
violations.
14. Which term describes the process of testing a system for security vulnerabilities?
a) Cryptanalysis
b) Penetration testing
c) Intrusion detection
d) Social engineering
Answer: b
Explanation: Penetration testing involves simulating cyberattacks to identify and fix security
weaknesses.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
15. What is ransomware?
a) A tool for secure communication
b) Malware that encrypts data and demands payment for decryption
c) A type of firewall software
d) A legal security framework
Answer: b
Explanation: Ransomware is malicious software that locks files and demands a ransom for their
release.
16. What is a brute force attack?
a) Guessing credentials by trying all possible combinations
b) Disrupting services through excessive traffic
c) Exploiting known vulnerabilities
d) Manipulating social engineering tactics
Answer: a
Explanation: Brute force attacks involve systematically trying all possible combinations of
passwords to gain access.
17. What does "hashing" achieve in cybersecurity?
a) Encryption of messages
b) Verification of data integrity
c) Decryption of ciphertext
d) Network monitoring
Answer: b
Explanation: Hashing ensures data integrity by generating a fixed-size hash value from the original
data.
18. Which protocol ensures secure browsing?
a) FTP b) HTTP c) HTTPS d) SMTP
Answer: c
Explanation: HTTPS (HyperText Transfer Protocol Secure) ensures secure communication over the
internet using encryption.
19. What is the primary purpose of a Virtual Private Network (VPN)?
a) Encrypting local files
b) Securely connecting remote users to private networks
c) Managing user credentials
d) Detecting malware
Answer: b
Explanation: VPNs create secure, encrypted connections over the internet, allowing remote users to
access private networks securely.
20. What is the principle of least privilege?
a) Giving minimal rights to users to perform their job
b) Allowing all users administrative rights
c) Restricting access to high-level managers only
d) Ensuring that no user has access to the system
Answer: a
Explanation: The principle of least privilege minimizes risk by limiting user access rights to only
what is necessary for their tasks.
21. What does "Man-in-the-Middle" (MitM) attack involve?
a) Denying service to a legitimate user
b) Eavesdropping on communication between two parties
c) Encrypting data on a compromised system
d) Overloading a server with traffic
Answer: b
Explanation: A MitM attack intercepts communication between two parties to steal, manipulate, or
eavesdrop on data.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
22. Which of the following is an example of multi-factor authentication (MFA)?
a) Password and username
b) PIN and security question
c) Password and fingerprint
d) Password only
Answer: c
Explanation: MFA combines two or more independent authentication factors, such as something
you know (password) and something you have (fingerprint).
23. What is the main goal of a honeypot in cybersecurity?
a) To protect endpoints from malware
b) To trap and analyze attackers
c) To encrypt sensitive files
d) To patch vulnerabilities automatically
Answer: b
Explanation: A honeypot is a decoy system designed to attract attackers, enabling analysis of their
methods.
24. What is a botnet?
a) A network of computers infected with malware and controlled remotely
b) A secure cloud computing platform
c) A type of phishing attack
d) A cybersecurity framework
Answer: a
Explanation: Botnets are networks of infected computers controlled by a single attacker, often used
for launching large-scale attacks.
25. What is the key characteristic of spyware?
a) Encrypting data for ransom
b) Stealing sensitive information by monitoring user activity
c) Spreading through network vulnerabilities
d) Disabling system functions
Answer: b
Explanation: Spyware secretly monitors user activity and collects sensitive data, such as passwords
and browsing history.
26. What is the purpose of a digital certificate?
a) To encrypt data at rest
b) To verify the authenticity of entities in digital communication
c) To detect malware in a system
d) To manage firewalls and intrusion prevention systems
Answer: b
Explanation: Digital certificates are used to verify the identity of entities, ensuring secure
communication between them.
27. Which cybersecurity framework focuses on identifying, protecting, detecting, responding, and
recovering?
a) ISO 27001 b) NIST Cybersecurity Framework c) COBIT d) GDPR
Answer: b
Explanation: The NIST Cybersecurity Framework outlines a lifecycle approach for managing and
reducing cybersecurity risks.
28. What is steganography?
a) The encryption of messages
b) Hiding information within non-secret data, such as images or audio files
c) Securing network protocols
d) Generating strong passwords
Answer: b
Explanation: Steganography involves concealing information within other non-secret data to avoid
detection.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
29. Which of the following is a common endpoint security measure?
a) Virtual Private Networks (VPNs)
b) Antivirus software
c) Encryption protocols
d) Firewalls
Answer: b
Explanation: Antivirus software is commonly used on endpoints to detect and remove malicious
software.
30. What is the difference between symmetric and asymmetric encryption?
a) Symmetric uses a single key for encryption and decryption, while asymmetric uses two keys
(public and private).
b) Symmetric is slower, while asymmetric is faster.
c) Symmetric works only for digital signatures, while asymmetric works for data encryption.
d) Symmetric uses two keys, while asymmetric uses a single key.
Answer: a
Explanation: Symmetric encryption uses one key for both encryption and decryption, while
asymmetric encryption uses a pair of public and private keys for secure communication.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315