MCQOPTIONS
Saved Bookmarks
This section includes 20 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system. |
| A. | System error |
| B. | Bugged system |
| C. | Security bug |
| D. | System virus |
| Answer» D. System virus | |
| 2. |
___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems. |
| A. | Exploiting |
| B. | Cracking |
| C. | Hacking |
| D. | Pivoting |
| Answer» E. | |
| 3. |
________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit. |
| A. | Local exploits |
| B. | Remote exploits |
| C. | System exploits |
| D. | Network exploits |
| Answer» B. Remote exploits | |
| 4. |
Remote exploits is that type of exploits acts over any network to exploit on security vulnerability. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 5. |
_____________ is a special type of vulnerability that doesn’t possess risk. |
| A. | Vulnerabilities without risk |
| B. | Vulnerabilities without attacker |
| C. | Vulnerabilities without action |
| D. | Vulnerabilities no one knows |
| Answer» B. Vulnerabilities without attacker | |
| 6. |
_________TYPE_OF_EXPLOIT_REQUIRES_ACCESSING_TO_ANY_VULNERABLE_SYSTEM_FOR_ENHANCING_PRIVILEGE_FOR_AN_ATTACKER_TO_RUN_THE_EXPLOIT.?$ |
| A. | Local exploits |
| B. | Remote exploits |
| C. | System exploits |
| D. | Network exploits |
| Answer» B. Remote exploits | |
| 7. |
A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system.$ |
| A. | System error |
| B. | Bugged system |
| C. | Security bug |
| D. | System virus |
| Answer» D. System virus | |
| 8. |
____________is_a_technique_used_by_penetration_testers_to_compromise_any_system_within_a_network_for_targeting_other_systems.$ |
| A. | Exploiting |
| B. | Cracking |
| C. | Hacking |
| D. | Pivoting |
| Answer» E. | |
| 9. |
A zero-day vulnerability is a type of vulnerability unknown to the creator or vendor of the system or software. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 10. |
ISMS is abbreviated as __________ |
| A. | Information Server Management System |
| B. | Information Security Management Software |
| C. | Internet Server Management System |
| D. | Information Security Management System |
| Answer» E. | |
| 11. |
__________ is the timeframe from when the loophole in security was introduced till the time when the bug was fixed. |
| A. | Time-frame of vulnerability |
| B. | Window of vulnerability |
| C. | Time-lap of vulnerability |
| D. | Entry-door of vulnerability |
| Answer» C. Time-lap of vulnerability | |
| 12. |
Security bugs are also known as _______ |
| A. | security defect |
| B. | security problems |
| C. | system defect |
| D. | software error |
| Answer» B. security problems | |
| 13. |
Remote exploits is that type of exploits acts over any network to exploit on security vulnerability? |
| A. | True |
| B. | False |
| Answer» B. False | |
| 14. |
There are ________ types of exploit. |
| A. | 3 |
| B. | 2 |
| C. | 5 |
| D. | 4 |
| Answer» C. 5 | |
| 15. |
A/An __________ is a piece of software or a segment of command that usually take advantage of a bug to cause unintended actions and behaviors. |
| A. | malware |
| B. | trojan |
| C. | worms |
| D. | exploit |
| Answer» E. | |
| 16. |
_____________ is a special type of vulnerability that doesn’t possess risk.$ |
| A. | Vulnerabilities without risk |
| B. | Vulnerabilities without attacker |
| C. | Vulnerabilities without action |
| D. | Vulnerabilities no one knows |
| Answer» B. Vulnerabilities without attacker | |
| 17. |
Risk and vulnerabilities are the same things. |
| A. | True |
| B. | False |
| Answer» C. | |
| 18. |
____________ is the cyclic practice for identifying & classifying and then solving the vulnerabilities in a system. |
| A. | Bug protection |
| B. | Bug bounty |
| C. | Vulnerability measurement |
| D. | Vulnerability management |
| Answer» E. | |
| 19. |
_________ is the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system. |
| A. | Attack vector |
| B. | Attack surface |
| C. | Attack point |
| D. | Attack arena |
| Answer» C. Attack point | |
| 20. |
___________ is a weakness that can be exploited by attackers. |
| A. | System with Virus |
| B. | System without firewall |
| C. | System with vulnerabilities |
| D. | System with strong password |
| Answer» D. System with strong password | |