Cyber Security Quiz – Set 2
This section contains Cyber security Practice quiz set 2. Cybercrimes and cyber security are the most important topics in the field of information technology. The question related to the cybercrime and cyber security are asked in most of the competitive exams and IT certification exams
We have compiled the most relevant and important questions that are asked in competitive exams as well as IT certification exams. This online practice test will definitely help you to evaluate and check your IQ on cybercrimes and cyber security.
Each practice quiz section contains MCQ type questions. You have to choose the best correct answer. After finishing the quiz, the result will be shown immediately with correct and incorrect answers. You can repeat the quiz without any limit to make you more perfect and expert on the concerned topic.
QUIZ START
#1. Which of the following is the first boot sector virus?
#2. What type of attack is a phishing fraud?
#3. ._________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities
#4. What is the difference between HTTP and HTTPs?
#5. What is the full form of TKIP?
#6. Which of the following malware is self-replicate?
#7. What statements regarding encryption and hashing are true?
#8. ________ is a term applied to unwanted applications or files that are not classified as malware, but can worsen the performance of computers and may cause security risks
#9. Your I.T. department has enabled the use of TLS encryption on the email server, does this mean that all of your emails are guaranteed to be encrypted between third parties?
#10. What is a zero-day attack?
#11. In cyber security, the principle of least privilege means?
#12. Which of the following is the first computer virus?
#13. _____ is a trojan that targets Microsoft Windows to steal banking information by keystroke logging?
#14. What is the best method of protecting a website against cyber attacks?
#15. Which of the following will not protect data at rest on your computer?
#16. A website displaying a padlock with a valid certificate from a known certificate authority means that it is secure?
#17. What technology/system can you easily deploy in your network to identify a breach without any false positives?
#18. Which of the following options are best suitable for router security?
#19. What is the most cost effective way of delivering a distributed LAN that is secure and has a high fault tolerance?
#20. What is the full form of TLS?
Results
Congratulations ! You have successfully passed the test.
More Practice Quizzes
Cyber Security Practice Quiz
Computer Fundamentals Practice Quiz
Computer Networking Practice Quiz