0% found this document useful (0 votes)
7 views2 pages

Cybersecurity Quiz 24 MCQs Labeled

The document consists of a cybersecurity quiz featuring 24 high-level multiple-choice questions (MCQs) that cover various topics such as SSL/TLS, XSS defenses, man-in-the-middle attacks, email security, cloud security, IoT, network security, and blockchain. Each question includes multiple answer options, testing knowledge on key cybersecurity concepts and practices. The quiz aims to assess understanding of critical cybersecurity principles and threats.

Uploaded by

AnilKarwankar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views2 pages

Cybersecurity Quiz 24 MCQs Labeled

The document consists of a cybersecurity quiz featuring 24 high-level multiple-choice questions (MCQs) that cover various topics such as SSL/TLS, XSS defenses, man-in-the-middle attacks, email security, cloud security, IoT, network security, and blockchain. Each question includes multiple answer options, testing knowledge on key cybersecurity concepts and practices. The quiz aims to assess understanding of critical cybersecurity principles and threats.

Uploaded by

AnilKarwankar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Cybersecurity Quiz: 24 High-Level GATE-style MCQs

 ◯ A) To store user data securely ◯ B) To encrypt data transmission between the server and client ◯ C) To
1. 1. What is the primary purpose of SSL/TLS in website security?

improve website speed ◯ D) To block malware


2. 2. Which of the following are defenses against Cross-Site Scripting (XSS)?
 □ A) Escaping untrusted data □ B) Using HTTPS □ C) Validating user inputs
 □ D) Limiting database size

 ◯ A) An attacker intercepting communications between two parties ◯ B) A denial-of-service attack


3. 3. What is a “man-in-the-middle” attack?

 ◯ C) A physical theft of a server ◯ D) Unauthorized login attempts

 ◯ A) Zeus ◯ B) Stuxnet ◯ C) Reaper Exploit ◯ D) Friday the 13


4. 4. Which of the following is a micro-virus that compromises email confidentiality?

5. 5. Which practices help preserve email security?


 □ A) Create a strong password □ B) Use two-factor authentication
 □ C) Connect email to a phone number □ D) Click on unknown links

 ◯ A) Pretty Good Privacy ◯ B) Powerful Good Privacy


6. 6. What does PGP stand for in email encryption?

 ◯ C) Protocol Giving Privacy ◯ D) Pretty Good Protocol

 ◯ A) Target mobile hardware vulnerabilities ◯ B) Target apps’ vulnerabilities


7. 7. Which of the following is not a type of smartphone hacking?

 ◯ C) Snatching ◯ D) Setup Keyloggers


8. 8. Malware can propagate through which of the following?
 □ A) SMS □ B) Bluetooth □ C) Wireless □ D) USB

 ◯ A) WPA ◯ B) Access Point ◯ C) WAP ◯ D) Access Port


9. 9. What is the central node of 802.11 wireless operations?

 ◯ A) Maximizing cloud performance ◯ B) Ensuring data availability


10. 10. What is the primary purpose of cloud security?

 ◯ C) Protecting data, applications, and infrastructure ◯ D) Reducing cloud costs


11. 11. Which components are part of Identity and Access Management (IAM)?
 □ A) Authentication □ B) Authorization □ C) Access control □ D) Encryption

 ◯ A) Cloud providers are solely responsible ◯ B) Customers are solely responsible


12. 12. What is the shared responsibility model in cloud security?

 ◯ C) Security is shared between provider and customer ◯ D) Government takes responsibility

 ◯ A) To enhance global internet speed ◯ B) To network physical devices


13. 13. What is the primary goal of IoT?

 ◯ C) To increase smartphone usage ◯ D) To improve social media platforms


14. 14. Which protocols are commonly used for secure IoT communication?
 □ A) MQTT □ B) CoAP □ C) HTTPS □ D) FTP

 ◯ A) To increase Wi-Fi range ◯ B) To convert between communication protocols


15. 15. What is the function of a Gateway in IoT networks?

 ◯ C) To store data from IoT devices ◯ D) To generate power

 ◯ A) Criminals ◯ B) Internet-connected systems ◯ C) Hackers ◯ D) None of the above


16. 16. What does cyber security protect?

17. 17. Which are objectives of network security?


 □ A) Confidentiality □ B) Integrity □ C) Availability □ D) Redundancy

 ◯ A) Phishing ◯ B) SQL Injection ◯ C) Password Attack ◯ D) All of the above


18. 18. Which of the following is a cyber attack?

19. 19. Which of the following is the most viral section of the internet?
◯ A) Chat Messenger ◯ B) Social networking sites
◯ C) Tutorial sites ◯ D) Chat-rooms


20. 20. Which practices enhance social media account security?
 □ A) Strong passwords □ B) Avoiding meaningful passwords
 □ C) Logging out when stepping away □ D) Clicking enticing ads

◯ A) Fader ◯ B) Blur ◯ C) Social-Media Blocker ◯ D) Ad-blocker


21. 21. What is a popular tool to block social-media tracking?

◯ A) Seed Block ◯ B) Origin Block ◯ C) Genesis Block ◯ D) Root Block


22. 22. What is the first block of a blockchain called?

23. 23. Which are key features of blockchain?
 □ A) Immutability □ B) Decentralization □ C) Transparency □ D) Centralized control

◯ A) A legally binding document ◯ B) A digitized physical contract


24. 24. What is a smart contract?

◯ C) A self-executing program on blockchain ◯ D) A contract requiring central validation



You might also like