40 cyber security mcq
Which of the following is an example of a strong password?
a) Password123
b) 123456
c) P@$$w0rd
d) MyDog’sName
Answer: c) P@$$w0rd
What does the term phishing refer to in cyber security?
a) Gaining unauthorized access to a network
b) Sending malicious emails to steal personal information
c) Using malware to encrypt files and demand a ransom
d) Exploiting software vulnerabilities to gain control of a system
Answer: b) Sending malicious emails to steal personal information
What is the purpose of a firewall in cyber security?
a) Detect and remove viruses from a computer
b) Protect a network from unauthorized access
c) Encrypt data to ensure confidentiality
d) Track and monitor user activity
Answer: b) Protect a network from unauthorized access
Which of the following is a common example of two factor authentication?
a) Username and password
b) Fingerprint scan
c) Captcha verification
d) Email verification
Answer: b) Fingerprint scan
What is the main purpose of encryption in cyber security?
a) Preventing unauthorized access to data
b) Identifying and removing malware
c) Tracking and monitoring network traffic
d) Speeding up data transmission
Answer a) Preventing unauthorized access to data
What is the term for malicious software that disguises itself as legitimate software
a) Virus
b) Worm
c) Trojan horse
d) Spyware
Answer: c) Trojan horse
What is the term for a cyber attack that overwhelms a target system with excessive traffic?
a) Spoofing
b) Phishing
c) DDoS ( Distributed Denial of Service)
d) Ransomware
Answer: c) DDoS (Distributed Denial of Service)
What does the acronym VPN stand for in the context of cyber security?
a) Virtual Private Network
b) Virus Protection Network
c) Virtual Personal Navigator
d) Volatile Packet Networking
Answer: a) Virtual Private Network
What is the purpose of a digital certificate in cyber security?
a) Encrypting data during transmission
b) Authenticating the identity of a website or entity
c) Detecting and removing malware from a computer
d) Protecting against DDoS attacks
Answer: b) Authenticating the identity of a website or entity
Which of the following is an example of social engineering in cyber security?
a) Brute force attack
b) SQL injection
c) Phishing
d) Zero-day exploit
Answer: c) Phishing
What is the term for the practice of reusing the same password across multiple accounts?
a) Encryption
b) Two-factor authentication
c) Credential stuffing
d) Keylogging
Answer: c) Credential stuffing

What is the purpose of a CAPTCHA in cyber security?
a) Encrypting data during transmission
b) Authenticating user credentials
c) Protecting against automated bots or spam
d) Detecting and removing malware
Answer: c) Protecting against automated bots or spam
What is the primary purpose of an antivirus software?
a) Encrypting sensitive data
b) Preventing unauthorized access to a network
c) Detecting and removing malware
d) Monitoring network traffic
Answer: c) Detecting and removing malware
What is the term for a cyber attack that involves blocking access to a system until a ransom is paid?
a) Phishing
b) Spoofing
c) Ransomware
d) Pharming
Answer: c) Ransomware
What is the term for the process of converting data into a format that is unreadable by unauthorized users?
a) Firewall
b) Encryption
c) Intrusion detection
d) Malware
Answer: b) Encryption
Which of the following is an example of a physical security measure in cyber security?
a) Antivirus software
b) Biometric authentication
c) Intrusion detection system
d) Firewall configuration
Answer: b) Biometric authentication
What is the purpose of a vulnerability assessment in cyber security?
a) Encrypting data during transmission
b) Identifying weaknesses and potential entry points in a system
c) Tracking and monitoring network traffic
d) Preventing phishing attacks
Answer: b) Identifying weaknesses and potential entry points in a system
CLICK HERE for more MCQ
What is the term for the practice of monitoring and analyzing network traffic for suspicious activities?
a) Firewall
b) Intrusion detection system IDS)
c) VPN
d) Malware
Answer: b Intrusion detection system IDS)
What is the term for a software vulnerability that is unknown, to the software vendor?
a) Zero-day exploit
b) Ransomware
c) SQL injection
d) Brute force attack
Answer: a) Zero-day exploit
Which of the following is an example of a cyber security best practice?
a) Sharing passwords with trusted colleagues
b) Clicking on links in unsolicited emails
c) Keeping software and operating systems updated
d) Disabling firewalls for faster internet speed
Answer: c) Keeping software and operating systems updated
What is the purpose of a honeypot in cyber security?
a) Protecting against DDoS attacks
b) Tracking and monitoring user activity
c) Detecting and diverting potential cyber attacks
d) Encrypting sensitive data
Answer: c) Detecting and diverting potential cyber attacks
What is the term for a software program that replicates itself and spreads to other computers?
a) Worm
b) Virus
c) Trojan horse
d) Spyware
Answer: a) Worm
Which of the following is an example of a network security protocol?
a) HTTPS
b) FTP
c) HTTP
d) DNS
Answer: a) HTTPS
What is the purpose of a sandbox in cyber security?
a) Detecting and removing malware from a computer
b) Encrypting sensitive data during transmission
c) Isolating potentially malicious software for analysis
d) Monitoring network traffic for suspicious activities
Answer: c) Isolating potentially malicious software for analysis
What is the term for a cyber attack that redirects website traffic to a fake website?
a) Spoofing
b) Phishing
c) Pharming
d) Ransomware
Answer: c) Pharming
Which of the following is an example of a biometric authentication factor?
a) Password
b) PIN code
c) Fingerprint
d) Security question
Answer: c) Fingerprint
What is the term for a method of hiding sensitive data within other seemingly harmless data?
a) Firewall
b) Intrusion detection
c) Steganography
d) Malware
Answer: c) Steganography
Which of the following is an example of a social media privacy setting?
a) Enabling two-factor authentication
b) Using a strong password
c) Adjusting visibility of personal information
d) Regularly updating privacy policies
Answer: c) Adjusting visibility of personal information
What is the purpose of a security audit in cyber security?
a) Encrypting sensitive data during transmission
b) Identifying vulnerabilities and assessing security measures
c) Tracking and monitoring network traffic
d) Preventing phishing attacks
Answer: b) Identifying vulnerabilities and assessing security measures
What is the term for the practice of accessing a wireless network without authorization?
a) Phishing
b) Spoofing
c) Hacking
d) Piggybacking
Answer: d) Piggybacking
What is the purpose of a security patch in cyber security?
a) Encrypting sensitive data during transmission
b) Preventing unauthorized access to a network
c) Fixing software vulnerabilities and bugs
d) Tracking and monitoring user activity
Answer: c) Fixing software vulnerabilities and bugs
Which of the following is an example of a hardware security measure in cyber security?
a) Antivirus software
b) Intrusion detection system (IDS)
c) Secure socket layer (SSL)
d) Biometric authentication device
Answer: d) Biometric authentication device
What is the term for the process of restoring data and systems after a cyber attack?
a) Firewall
b) Encryption
c) Intrusion detection
d) Incident response
Answer: d) Incident response
What is the purpose of data backup in cyber security?
a) Encrypting sensitive data during transmission
b) Preventing unauthorized access to a network
c) Protecting data from loss or damage
d) Tracking and monitoring network traffic
Answer: c) Protecting data from loss or damage
What is the term for the practice of impersonating a trusted entity to deceive individuals or gain unauthorized access?
a) Spoofing
b) Phishing
c) Ransomware
d) Pharming
Answer: a) Spoofing
Which of the following is an example of a secure web protocol?
a) HTTP
b) FTP
c) SMTP
d) HTTPS
Answer: d) HTTPS
What is the purpose of a security token in cyber security?
a) Detecting and removing malware from a computer
b) Encrypting sensitive data during transmission
c) Authenticating user identity for secure access
d) Monitoring network traffic for suspicious activities
Answer: c) Authenticating user identity for secure access
What is the term for a cyber attack , that targets a specific individual or organization?
a) Brute force attack
b) SQL injection
c) Spear phishing
d) Denial of Service ,DoS
Answer: c) Spear phishing
What is the purpose of network segmentation in cyber security?
a) Encrypting data during transmission
b) Authenticating user credentials
c) Dividing a network into smaller isolated segments
d) Detecting and removing malware
Answer: c) Dividing a network into smaller, isolated segments
What is the term for a cyber attack that involves intercepting, and altering communication between two parties?
a) Spoofing
b) Man in the middle attack
c) Ransomware
d) Phishing
Answer b) Man in the middle attack