With each visit of this Cyber Security online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.Which of the following is a VALID digital signature key?
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2. What is the significance of a recovery time objective (RTO) in disaster recovery planning?
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.What is the function of MTA(Mail Transfer Agent)?
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.How many keys are required if two parties communicate using Symmetric Cryptography?
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5. Which cloud deployment model is suitable for organizations with specific security and compliance requirements, providing dedicated infrastructure for their exclusive use?
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.Which of the following is a VALID type of Key Management System?
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.In which of the following fraud methods is a legitimate/legal-looking email sent in an attempt to gather personal and financial information from recipients?
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8. What security benefit does MDM provide by enforcing encryption on mobile devices to protect data at rest?
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.Which of the following actions can be taken while filtering SMTP spam traffic?
Delete the spam mail Redirect it to the spam mail box Return it to the sender. Tag the spam mail
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10. It is a program or hardware device that filters the information coming through an internet
connection to a network or computer system.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.Which of the following are the ways through which virus spreads?
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12. In what way does AI contribute to the identification of fake news and disinformation campaigns online?
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13. In the context of business continuity planning, what does the term "alternate processing site" refer to?
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14. What is the role of a hash pointer in linking blocks in a blockchain?
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.Which of the following is a standalone computer program that pretends to be a well-known program in order to steal confidential data ?
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16. How does a man-in-the-middle attack work?
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17. In the Shared Responsibility Model, which party is responsible for managing and securing customer data?
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.Daniel has deployed an antispam solution in his network. If a spam SMTP is accepted, it is called:
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19. What legal concept involves allowing individuals to access and review their personal data held by organizations?
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20. What legal concept involves the unauthorized access and use of computer systems to disrupt normal functioning?
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.Firewall as part of a router program
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22. Which mobile device vulnerability involves attackers gaining unauthorized access to a device's stored data by exploiting a USB connection?
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23. Which cloud deployment model involves providing cloud services to a specific group of organizations with shared interests or requirements?
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.Which of the following are disadvantages of the Symmetric Key Cryptography?
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25. What is the main benefit of using a public cloud service?
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.What is the less secure AES encryption mode?
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27. What is the primary purpose of implementing two-factor authentication (2FA) in mobile applications?
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28. What is the primary purpose of a Cloud Access Security Broker (CASB)?
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29. What ethical principle involves recognizing and respecting the rights of individuals to make informed decisions?
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30. What is the purpose of a hard fork in blockchain technology?
Your Answer:Correct
Your Answer:Incorrect