Cyber Security I M.SC QB Final
Cyber Security I M.SC QB Final
Summary of Questions
Page 1 of
26
3 Which layer of security focuses on preventing unauthorized access to
networks and systems by inspecting data packets?
a) Worm b) Firewall
c) Phishing d) Denial-of-Service (DoS)
7 What type of cyber threat involves tricking individuals into
revealing personal information such as passwords or credit
card details?
a) Ransomware b) Phishing
c) SQL Injection d) Keylogging
8 A Denial-of-Service (DoS) attack typically results in which of the following?
a) Phishing b) Eavesdropping
c) Social engineering d) Espionage
15 What is the main purpose of encryption in cybersecurity?
Page 3 of
26
16 Which of the following is an example of a security vulnerability in
software?
a) HTTP b) FTP
c) OpenVPN d) SMTP
35 What is the primary purpose of an Intrusion Detection System
(IDS)?
a) Nmap b) Wireshark
c) cURL d) Netcat
39 Which HTTP utility allows you to capture and analyze HTTP
traffic between a client and a server, making it useful for
debugging and security analysis?
a) HTTPWatch b) Netcat
c) Burp Suite d) ireshark
40 What is the primary function of the "HTTP Response
Headers" in an HTTP request-response cycle?
a) Curl b) Nmap
c) Postman d) Netcat
42 Which of the following HTTP status codes indicates that the
request was successful and the server has returned the
requested data?
a) Worm b) Firewall
c) Phishing d) Denial-of-Service (DoS)
63 What type of cyber threat involves tricking individuals into revealing personal
information such as passwords or credit card details?
a) Ransomware b) Phishing
c) SQL Injection d) Keylogging
Page 14 of
26
a) To block suspicious traffic from b) To protect sensitive data by making
entering the network it unreadable to unauthorized users
c) To prevent physical theft of devices d) To monitor user activity in real-
time
82 Why is cybersecurity important for businesses in the digital
age?
a) Phishing b) Ransomware
c) Denial-of-Service (DoS) attack d) All of the above
Page 15 of
26
87 Which of the following is the primary purpose of access control in cybersecurity?
Page 16 of
26
93 Which type of NAT allows multiple devices on a local network to be mapped to a
single public IP address but uses different port numbers to distinguish the
connections?
a) HTTP b) OpenVPN
c) SMTP d) FTP
96 Which type of detection system is better at identifying previously unknown or
zero-day attacks?
Page 17 of
26
99 Which Linux utility is commonly used for configuring and managing a firewall?
a) iptables b) sshd
c) wget d) nmap
100 Which of the following is a default policy in iptables that drops packets not
explicitly allowed by any rule?
a) ACCEPT b) REJECT
c) DENY d) DROP
101 Which HTTP utility allows you to capture and analyze HTTP traffic between a
client and a server, making it useful for debugging and security analysis?
a) HTTPWatch b) Netcat
c) Wireshark d) Burp Suite
102 Which of the following tools can be used to send customized HTTP requests,
including specific headers, methods, and payloads, to analyze web applications
and test for vulnerabilities?
a) Nmap b) Postman
c) Netcat d) Curl
103 Which vulnerability scanning tool is often used by penetration testers to identify
security flaws in web applications, such as insecure HTTP methods, outdated
software, and misconfigured servers?
a) Nessus b) Nikto
c) Metasploit d) Netcat
Page 18 of
26
4 Explain about security layer focuses on protecting individual devices, such
as laptops and mobile phones, from malware and unauthorized access?
Page 19 of
26
31 What criteria should be used to define and classify computer crimes in a
digital context, particularly in cases involving non-physical assets like data
breaches or intellectual property theft?
32 How do cybercriminals exploit the evolving nature of digital technologies,
such as cloud computing and block chain, to commit crimes, and how does
this challenge traditional definitions of computer crime?
33 What are the key indicators or red flags that cyber security professionals
should look for in order to identify potential computer crimes such as
ransom ware attacks, data exfiltration, or fraud?
34 How can legal systems adapt to the constantly changing landscape of
computer crime, particularly in distinguishing between unauthorized
activities, cyber vandalism, and more severe crimes like cyber terrorism?
35 How do different layers of the cyber world, such as the surface web, deep
web, and dark web, impact the landscape of cyber security threats and
criminal activity?
36 What role do virtual private networks (VPNs) and Tor play in safeguarding
privacy in the cyber world, and how do they complicate the detection of
cybercriminal activities?
37 What are the unique cyber security challenges posed by the proliferation of
smart cities and connected infrastructure, where interconnected devices
introduce new vulnerabilities and attack vectors?
38 What are the key differences between advanced persistent threats (APTs)
and traditional cyber attacks, and how do these variations impact the design
of defense mechanisms against evolving attack vectors?
39 How do programming languages like Python and C++ play a role in both
the development of security tools and the creation of malicious exploits,
and what makes these languages particularly effective for each purpose?
40 How do attackers exploit vulnerabilities in operating systems and software
applications to compromise computers, and what makes these targets
particularly attractive for launching widespread attacks like malware
distribution or bot net creation?
41 What is one limitation of using a basic packet filtering firewall to protect a
network?
42 How does a stateful firewall differ from a packet filtering firewall in terms
of security functionality?
43 What is typically used to define the rules for allowing or blocking traffic?
44 What is a rule for IP addresses, ports, and protocols but does not track the
state of connections?
45 What is the primary function of spyware in a cyberattack?
46 What is a typical behavior of spyware once it infects a computer?
47 What is an example of a common type of spyware?
48 What is the main purpose of steganography in cyber security?
49 What is the primary purpose of a digital signature in cyber security?
50 How do key loggers typically capture sensitive information from a user's
Page 20 of
26
computer?
7 Describe the key differences between an Intrusion Detection System (IDS) and an
Intrusion Prevention System (IPS)?
8 Explain the concept of an Intrusion Detection System (IDS) and its primary
functions?
9 What are the two primary detection techniques used in Intrusion Detection
Systems, and how do they work?
10 Discuss about the role of Security Information and Event Management (SIEM)
systems in detecting and managing cyber security incidents?
11 Explain the concept of Port Forwarding in networking and its role in cyber
security?
12 What is the role of firewalls in managing Port Forwarding, and how do firewalls
help mitigate associated risks?
Page 22 of
26
Answers for Multiple Choice Questions
Page 23 of
26
33 a) It hides the user’s real IP 34 c) OpenVPN
address, providing anonymity
and making it harder for
attackers to target the user.
35 d) To monitor network traffic for 36 d) Anomaly-based IDS
signs of malicious activities and
generate alerts
Page 24 of
26
63 b) Phishing 64 a) System downtime or service
unavailability
65 a) Ransomware 66 d) SQL Injection