Cybersecurity Quiz: 24 High-Level GATE-style MCQs
◯ A) To store user data securely ◯ B) To encrypt data transmission between the server and client ◯ C) To
1. 1. What is the primary purpose of SSL/TLS in website security?
improve website speed ◯ D) To block malware
2. 2. Which of the following are defenses against Cross-Site Scripting (XSS)?
□ A) Escaping untrusted data □ B) Using HTTPS □ C) Validating user inputs
□ D) Limiting database size
◯ A) An attacker intercepting communications between two parties ◯ B) A denial-of-service attack
3. 3. What is a “man-in-the-middle” attack?
◯ C) A physical theft of a server ◯ D) Unauthorized login attempts
◯ A) Zeus ◯ B) Stuxnet ◯ C) Reaper Exploit ◯ D) Friday the 13
4. 4. Which of the following is a micro-virus that compromises email confidentiality?
5. 5. Which practices help preserve email security?
□ A) Create a strong password □ B) Use two-factor authentication
□ C) Connect email to a phone number □ D) Click on unknown links
◯ A) Pretty Good Privacy ◯ B) Powerful Good Privacy
6. 6. What does PGP stand for in email encryption?
◯ C) Protocol Giving Privacy ◯ D) Pretty Good Protocol
◯ A) Target mobile hardware vulnerabilities ◯ B) Target apps’ vulnerabilities
7. 7. Which of the following is not a type of smartphone hacking?
◯ C) Snatching ◯ D) Setup Keyloggers
8. 8. Malware can propagate through which of the following?
□ A) SMS □ B) Bluetooth □ C) Wireless □ D) USB
◯ A) WPA ◯ B) Access Point ◯ C) WAP ◯ D) Access Port
9. 9. What is the central node of 802.11 wireless operations?
◯ A) Maximizing cloud performance ◯ B) Ensuring data availability
10. 10. What is the primary purpose of cloud security?
◯ C) Protecting data, applications, and infrastructure ◯ D) Reducing cloud costs
11. 11. Which components are part of Identity and Access Management (IAM)?
□ A) Authentication □ B) Authorization □ C) Access control □ D) Encryption
◯ A) Cloud providers are solely responsible ◯ B) Customers are solely responsible
12. 12. What is the shared responsibility model in cloud security?
◯ C) Security is shared between provider and customer ◯ D) Government takes responsibility
◯ A) To enhance global internet speed ◯ B) To network physical devices
13. 13. What is the primary goal of IoT?
◯ C) To increase smartphone usage ◯ D) To improve social media platforms
14. 14. Which protocols are commonly used for secure IoT communication?
□ A) MQTT □ B) CoAP □ C) HTTPS □ D) FTP
◯ A) To increase Wi-Fi range ◯ B) To convert between communication protocols
15. 15. What is the function of a Gateway in IoT networks?
◯ C) To store data from IoT devices ◯ D) To generate power
◯ A) Criminals ◯ B) Internet-connected systems ◯ C) Hackers ◯ D) None of the above
16. 16. What does cyber security protect?
17. 17. Which are objectives of network security?
□ A) Confidentiality □ B) Integrity □ C) Availability □ D) Redundancy
◯ A) Phishing ◯ B) SQL Injection ◯ C) Password Attack ◯ D) All of the above
18. 18. Which of the following is a cyber attack?
19. 19. Which of the following is the most viral section of the internet?
◯ A) Chat Messenger ◯ B) Social networking sites
◯ C) Tutorial sites ◯ D) Chat-rooms
20. 20. Which practices enhance social media account security?
□ A) Strong passwords □ B) Avoiding meaningful passwords
□ C) Logging out when stepping away □ D) Clicking enticing ads
◯ A) Fader ◯ B) Blur ◯ C) Social-Media Blocker ◯ D) Ad-blocker
21. 21. What is a popular tool to block social-media tracking?
◯ A) Seed Block ◯ B) Origin Block ◯ C) Genesis Block ◯ D) Root Block
22. 22. What is the first block of a blockchain called?
23. 23. Which are key features of blockchain?
□ A) Immutability □ B) Decentralization □ C) Transparency □ D) Centralized control
◯ A) A legally binding document ◯ B) A digitized physical contract
24. 24. What is a smart contract?
◯ C) A self-executing program on blockchain ◯ D) A contract requiring central validation