
Cyber Security Quiz – Set 2
This section contains Cyber security Practice quiz set 2. Cybercrimes and cyber security are the most important topics in the field of information technology. The question related to the cybercrime and cyber security are asked in most of the competitive exams and IT certification exams
We have compiled the most relevant and important questions that are asked in competitive exams as well as IT certification exams. This online practice test will definitely help you to evaluate and check your IQ on cybercrimes and cyber security.
Each practice quiz section contains MCQ type questions. You have to choose the best correct answer. After finishing the quiz, the result will be shown immediately with correct and incorrect answers. You can repeat the quiz without any limit to make you more perfect and expert on the concerned topic.
START QUIZ
#1. ._________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities
#2. Which of the following malware is self-replicate?
#3. What type of attack is a phishing fraud?
#4. Which of the following is the first boot sector virus?
#5. Which of the following will not protect data at rest on your computer?
#6. _____ is a trojan that targets Microsoft Windows to steal banking information by keystroke logging?
#7. What is the best method of protecting a website against cyber attacks?
#8. What is the full form of TLS?
#9. What is the difference between HTTP and HTTPs?
#10. What is the full form of TKIP?
#11. In cyber security, the principle of least privilege means?
#12. What is the most cost effective way of delivering a distributed LAN that is secure and has a high fault tolerance?
#13. Which of the following options are best suitable for router security?
#14. Which of the following is the first computer virus?
#15. What technology/system can you easily deploy in your network to identify a breach without any false positives?
#16. A website displaying a padlock with a valid certificate from a known certificate authority means that it is secure?
#17. Your I.T. department has enabled the use of TLS encryption on the email server, does this mean that all of your emails are guaranteed to be encrypted between third parties?
#18. What is a zero-day attack?
#19. What statements regarding encryption and hashing are true?
#20. ________ is a term applied to unwanted applications or files that are not classified as malware, but can worsen the performance of computers and may cause security risks
Results
Congratulations ! You have successfully passed the test.
More Practice Quizzes
Cyber Security Practice Quiz
Computer Fundamentals Practice Quiz
Computer Networking Practice Quiz