Sample Questions and Answers
What is the primary goal of penetration testing?
A) To identify and exploit vulnerabilities to improve security
B) To install antivirus software
C) To update software patches
D) To monitor network traffic
Answer: A) To identify and exploit vulnerabilities to improve security
Explanation: Pen tests simulate attacks to find weaknesses.
Which attack involves intercepting and altering communication between two parties?
A) Man-in-the-Middle
B) Phishing
C) Ransomware
D) Worm
Answer: A) Man-in-the-Middle
Explanation: MITM intercepts data to eavesdrop or modify it.
What does ‘sandboxing’ refer to in cybersecurity?
A) Isolating programs to limit their access to the rest of the system
B) Encrypting data
C) Blocking IP addresses
D) Backing up files
Answer: A) Isolating programs to limit their access to the rest of the system
Explanation: Sandboxing confines untrusted code to prevent harm.
What is the function of a botnet?
A) To spread spam emails
B) To perform coordinated attacks using multiple compromised systems
C) To encrypt user data
D) To manage firewalls
Answer: B) To perform coordinated attacks using multiple compromised systems
Explanation: Botnets are networks of infected devices used in attacks like DDoS.
What is the primary purpose of the CIA triad in cybersecurity?
A) To ensure Confidentiality, Integrity, and Availability of data
B) To create new software
C) To manage user accounts
D) To track hardware inventory
Answer: A) To ensure Confidentiality, Integrity, and Availability of data
Explanation: The CIA triad is the fundamental model for protecting information.
Which port number is commonly used for HTTPS traffic?
A) 21
B) 80
C) 443
D) 25
Answer: C) 443
Explanation: HTTPS traffic is typically encrypted and uses TCP port 443.
What does the term ‘phishing’ refer to in cybersecurity?
A) Attempting to guess passwords using brute force
B) Sending fraudulent communications to trick victims into revealing sensitive info
C) Scanning networks for vulnerabilities
D) Installing malware silently
Answer: B) Sending fraudulent communications to trick victims into revealing sensitive info
Explanation: Phishing uses social engineering to steal information.
Which of the following is NOT a valid reason to perform a vulnerability scan?
A) To identify security weaknesses in systems
B) To detect unauthorized software installed on a network
C) To automatically block network traffic
D) To prioritize remediation efforts
Answer: C) To automatically block network traffic
Explanation: Vulnerability scans identify issues but do not block traffic.
What does ‘least privilege’ mean in access control?
A) Giving all users maximum access
B) Giving users only the minimum access necessary to perform their tasks
C) Allowing all access during business hours
D) Removing access after a user leaves
Answer: B) Giving users only the minimum access necessary to perform their tasks
Explanation: Limits potential damage from compromised accounts.
Which protocol is commonly used to securely transfer files over a network?
A) FTP
B) SFTP
C) Telnet
D) SMTP
Answer: B) SFTP
Explanation: SFTP encrypts file transfers, unlike FTP.
What is a ‘zero-day’ vulnerability?
A) A vulnerability that has been patched immediately
B) A previously unknown vulnerability exploited before a fix is available
C) A vulnerability that affects only zero users
D) A vulnerability that is harmless
Answer: B) A previously unknown vulnerability exploited before a fix is available
Explanation: Zero-days are highly dangerous because no patch exists yet.
Which of the following is a secure method for storing passwords?
A) Plain text files
B) Using salted and hashed passwords
C) Using reversible encryption
D) Writing them down on paper
Answer: B) Using salted and hashed passwords
Explanation: Salting and hashing protect against password cracking.
What does an SSL/TLS certificate primarily provide?
A) Encrypts data transmitted between client and server
B) Authenticates the identity of a website
C) Both A and B
D) Blocks malware on websites
Answer: C) Both A and B
Explanation: SSL/TLS certificates enable encrypted and trusted communication.
Which security model enforces mandatory access control (MAC)?
A) Bell-LaPadula Model
B) Discretionary Access Control (DAC)
C) Role-Based Access Control (RBAC)
D) Rule-Based Access Control
Answer: A) Bell-LaPadula Model
Explanation: Bell-LaPadula focuses on data confidentiality using MAC.
What is ‘port scanning’ used for?
A) Detecting open ports on a target system to find vulnerabilities
B) Encrypting network data
C) Blocking malicious traffic
D) Authenticating users
Answer: A) Detecting open ports on a target system to find vulnerabilities
Explanation: Attackers and defenders use port scanning to identify active services.
Which type of malware attempts to hide its presence by modifying system processes?
A) Rootkit
B) Spyware
C) Adware
D) Trojan
Answer: A) Rootkit
Explanation: Rootkits operate at a low level to evade detection.
What is the primary purpose of a firewall?
A) To encrypt data
B) To block or allow network traffic based on security policies
C) To monitor user activity
D) To detect malware
Answer: B) To block or allow network traffic based on security policies
Explanation: Firewalls control traffic flow to protect networks.
Which of the following describes a ‘brute force’ attack?
A) Exploiting software bugs to gain access
B) Repeatedly trying many password combinations until successful
C) Tricking users into providing credentials
D) Intercepting network traffic
Answer: B) Repeatedly trying many password combinations until successful
Explanation: Brute force attacks rely on trial and error.
Which cybersecurity principle ensures data is accurate and unaltered?
A) Confidentiality
B) Availability
C) Integrity
D) Authentication
Answer: C) Integrity
Explanation: Integrity means data is protected from unauthorized modification.
What kind of attack involves intercepting and possibly altering communication between two parties without their knowledge?
A) Denial of Service (DoS)
B) Man-in-the-Middle (MITM)
C) Phishing
D) Spoofing
Answer: B) Man-in-the-Middle (MITM)
Explanation: MITM attacks eavesdrop or tamper with communications.
Which is a common indicator that a system may be infected with malware?
A) Unusually slow performance and unknown processes running
B) Increased disk space
C) Faster internet speeds
D) Longer battery life
Answer: A) Unusually slow performance and unknown processes running
Explanation: Malware often consumes resources or runs stealthily.
What is the function of an endpoint detection and response (EDR) tool?
A) To detect, investigate, and respond to threats on endpoints like laptops and servers
B) To backup data
C) To manage network traffic
D) To provide antivirus only
Answer: A) To detect, investigate, and respond to threats on endpoints like laptops and servers
Explanation: EDR tools provide real-time threat detection and remediation.
Which of the following is considered a physical security control?
A) Antivirus software
B) Security guards and locks
C) Firewalls
D) Encryption
Answer: B) Security guards and locks
Explanation: Physical controls prevent unauthorized physical access.
What is the difference between a vulnerability assessment and a penetration test?
A) Vulnerability assessments find weaknesses; penetration tests exploit them
B) Both are the same
C) Penetration tests find weaknesses; vulnerability assessments exploit them
D) Neither find weaknesses
Answer: A) Vulnerability assessments find weaknesses; penetration tests exploit them
Explanation: Pen tests simulate attacks, while assessments identify risks.
Which tool is used to test the security of wireless networks by capturing and analyzing Wi-Fi traffic?
A) Metasploit
B) Aircrack-ng
C) Nmap
D) Wireshark
Answer: B) Aircrack-ng
Explanation: Aircrack-ng focuses on wireless security auditing.
What does the term ‘sandboxing’ mean in cybersecurity?
A) Isolating suspicious programs in a controlled environment to observe behavior
B) Encrypting data
C) Blocking IP addresses
D) Running software with full system access
Answer: A) Isolating suspicious programs in a controlled environment to observe behavior
Explanation: Sandboxing limits potential harm from unknown software.
Which of the following is a biometric authentication method?
A) Password
B) Security token
C) Fingerprint scan
D) PIN
Answer: C) Fingerprint scan
Explanation: Biometrics use unique physical traits for identity verification.
What does the acronym DLP stand for in cybersecurity?
A) Data Loss Prevention
B) Digital Log Protocol
C) Dynamic Link Protection
D) Data Leak Program
Answer: A) Data Loss Prevention
Explanation: DLP systems monitor and protect sensitive data from unauthorized access or transmission.
Which protocol is primarily used for sending email?
A) FTP
B) SMTP
C) HTTP
D) SNMP
Answer: B) SMTP
Explanation: Simple Mail Transfer Protocol is used for email transmission.
What is the primary purpose of a vulnerability disclosure program?
A) To penalize hackers
B) To encourage reporting of security vulnerabilities so they can be fixed
C) To ignore reported vulnerabilities
D) To disclose all company secrets
Answer: B) To encourage reporting of security vulnerabilities so they can be fixed
Explanation: Responsible disclosure helps improve security.
What does the ‘principle of separation of duties’ help prevent?
A) System downtime
B) Conflicts of interest and fraud by dividing responsibilities
C) User login failures
D) Malware infections
Answer: B) Conflicts of interest and fraud by dividing responsibilities
Explanation: Separation of duties ensures no single individual has excessive control.
Which type of firewall filters traffic based on packet headers, including IP addresses and ports?
A) Stateful firewall
B) Packet-filtering firewall
C) Proxy firewall
D) Application firewall
Answer: B) Packet-filtering firewall
Explanation: Packet filters analyze packets individually without context.
What is the main characteristic of ‘ransomware’?
A) It steals data silently
B) It locks or encrypts user data and demands payment for release
C) It spreads through email attachments only
D) It slows down the internet
Answer: B) It locks or encrypts user data and demands payment for release
Explanation: Ransomware extorts victims financially.
What is the purpose of a digital certificate?
A) To provide proof of identity for websites and users
B) To block unwanted traffic
C) To encrypt files locally
D) To back up data
Answer: A) To provide proof of identity for websites and users
Explanation: Digital certificates enable trust and secure communication.
Reviews
There are no reviews yet.