Technical and general Cyber Security questions. These questions are designed to help you prepare for a role as a Cyber Security Specialist. Our 100+ Cyber Security questions and answers focus on all aspects of Cyber Security subject and topics. These questions are chosen from a collection of most questions asked on Cyber Security. Practice, spend at least 1 hour daily for a month to learn and assimilate Cyber Security.
Subscribe to our youtube channel, to get discount.
Who should Practice these Cyber Security Questions
- Anyone preparing for an aptitude test in Cyber Security
- Anyone wishing to broaden their knowledge in Cyber Security
- Anyone preparing for interviews
- Everyone – Students and Experienced.
The section contains questions on cyber attack types, hacking, security protocols, social engineering, terminologies, network intrusion, firewalls, security skills, exploits and exploitation, generally CNSS Certified Network Security Specialist examinations.
Part 1: Network Security and Cyber Defence Quiz
- What is the acronym of URL.
Answer- Uniform Resource Locator
- The most desirable approach to security is one which is:
Answer- Layered and dynamic
- Which of the following is not one of the major classes of threats?
Answer- Online auction fraud
- Malware is NOT a common threat for systems.
- Server Message Block (SMB) protocol runs on which port?
- Subnetting is used to split a network into smaller portions.
- Blocking attacks seek to accomplish what?
Answer- Prevent Legitimate users from accessing a system
- Trivial File Transfer Protocol (TFTP) runs on which port?
- Class A Ips with range 0-126 are reserved for multicasting.
- Which of the following is the best definition for non-repudiation?
Answer- Processes that verify which user performs what action
Part 2: Types of Attacks
- Which of the following best describes session hacking?
Answer- Taking control of communication link between two machines
- Which of the following is the best definition of a virus?
Answer- Software that self-replicates
- The most common session-hijacking is man in the middle attack
- What is Trojan horse?
- Answer- Software that appears to be benign but really has some malicious purpose
- Answer- Software that causes harm to your system
- The point of hijacking a connection is to exploit trust and gain access to a system
- What is danger inherent in IP spoofing attacks?
Answer- Many firewalls do not examine packets that seem to come from within the network
- Which of the following is the best definition of IP spoofing?
Answer- Sending a packet that appears to come from a trusted IP address
- To be protected against Ping of death attacks ensure that all operating systems are patched.
- Smurf attack is a popular DoS attack
Part 3: Fundamentals of Firewalls
- Why a stateful packet inspection firewall is less susceptible to spoofing attacks?
Answer- It examines the source IP of all packets
- Which type of firewall is considered the most secure?
Answer- Stateful packet inspection
- Which of the following are four basics types of Firewalls?
Answer- Packet Filtering, application gateway, circuit level, stateful packet inspection
- Which of the following is an advantage of the network host-based configuration?
Answer- It is inexpensive or free
- Which of the following is combination of firewalls?
Answer- Screened firewalls
- What is the most important security advantage to NAT
Answer- It blocks incoming ICMP packets
- What type of firewall requires client applications to be authorized to connect?
Answer- Application gateway
- A device that hides its internal IP addresses is called?
Answer- Proxy Server
- Which of the following can be shipped preconfigured?
Answer- Router-based firewalls
- Why might a proxy gateway be susceptible to a flood attack?
Answer- It allows multiple simultaneous connections
Part 4: Intrusion Detection Systems
- A series of ICMP packets sent to your ports in sequence might indicate what?
Answer- A ping flood
- IDS is an acronym for:
Answer- Intrusion-detection system
- A system that is set up for attracting and monitoring intruders is called?
- Specter aggressive mode tries to trace the attacker and gain its identity
- Which of the following is not a profiling strategy used in anomaly detection?
Answer- System monitoring
- What type of IDS is Snort?
Answer- Host based
- Specter is an advanced IDS System
- Attempting to attract intruders to a system setup for monitoring is called?
Answer- Intrusion banishment
- A profiling technique that monitors how applications use resources is called?
Answer- Executable profiling
- What is another term for preemptive blocking?
Part 5: Fundamentals of Encryption
- Which of the following is the symmetric key system using blocks?
- Blowfish is an asymmetric stream cipher
- Which encryption algorithm uses a variable length symmetric key?
- Which of the following is an encryption method developed by three mathematicians?
- Which hashing algorithm do modern windows system use?
- What is a digital signature?
Answer- A piece of encrypted data added to other data to verify the sender
- What is the purpose of a certificate?
Answer- To validate the sender of a digital signature or software
- Which of the following encryption algorithms is a block cipher and uses the Rijndael algorithm?
- Which of the following uses key sizes equal to 128, 192 and 256 bits?
- Secure Multipurpose Internet Mail Extensions (S/MIME) use X.509 certificates to secure e-mail communication
Part 6: Virtual Private Networks (VPN)
- The ESP Protocol provides data confidentiality and authentication.
- Which of the following is an important security feature in CHAP
Answer- It periodically re-authenticates
- Which authentication protocols are available under PPTP?
- Which of the following is generally considered the least secure?
- What is the purpose of IKE?
Answer- Key exchange
- Which of the following is a weakness in PPTP?
Answer- No encryption
- Openswan is a VPN solution provided by CISCO.
- PPTP is based on which protocol?
- PPTP is an acronym for which of the following?
Answer- Point-to-Point Tunneling Protocol
- What does L2TP stand for?
Answer- Layer 2 Tuneling Protocol
Part 7: Operating System Hardening
- Which of the following best describes the registry
Answer- A database containing system settings
- What account lockout threshold does the NSA recommends?
Answer- 3 tries
- The command sudo find/-perm -4000 checks for the location of suid binaries
- What minimum password length does the NSA recommends?
- What level of privileges all users must have?
Answer- Least possible
- What maximum password age does Microsoft recommend?
Answer- 42 days
- What type of encryption does EFS utilize?
Answer-Public key encryption
- What is the rule for unused services on any computer?
Answer- Turn them off
- A Linux system has a repository of packages available to be installed on the system
- What operating system requires periodic patches?
To get full access to the pdf file
Note: The pdf file contains over 200+ questions and it goes for NGN(₦) 3000
Make Payment here: https://switchwebstudio.com/payment-page/
Ensure the form is filled correctly as pdf will be sent to your email address. For enquires: Contact us: https://switchwebstudio.com/contact-us/