The document contains multiple-choice questions (MCQs) related to cybersecurity concepts, including reconnaissance attacks, hacker types, the CIA triad, and DoS attack mitigation. It also describes various attack types and their characteristics, as well as the principles of confidentiality, integrity, and availability. The answers to the questions are provided, indicating the correct options for each query.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
27 views4 pages
Multiple Choice Questions
The document contains multiple-choice questions (MCQs) related to cybersecurity concepts, including reconnaissance attacks, hacker types, the CIA triad, and DoS attack mitigation. It also describes various attack types and their characteristics, as well as the principles of confidentiality, integrity, and availability. The answers to the questions are provided, indicating the correct options for each query.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
Multiple Choice Questions (MCQs)
1. What is the primary goal of reconnaissance attacks?
• A) To gain unauthorized access to sensitive databases • B) To disrupt network services • C) To gather information about systems, services, or vulnerabilities • D) To modify or delete critical network data Answer: C
2. Which type of hacker uses their skills for malicious
purposes? • A) White hat hacker • B) Gray hat hacker • C) Black hat hacker • D) Ethical hacker Answer: C
3. What does the “I” in the CIA triad stand for?
• A) Integrity • B) Information • C) Intelligence • D) Infrastructure Answer: A
4. Which of the following is a key component of mitigating
DoS attacks? • A) Encrypting all network traffic • B) Using antispoofing technologies like DHCP snooping • C) Performing regular penetration tests • D) Implementing BYOD policies Answer: B
5. What is the main purpose of a Bring Your Own Device
(BYOD) policy? • A) To monitor employee activities on the network • B) To ensure employees only use company devices • C) To define security measures for personal devices accessing company resources • D) To prohibit access to sensitive data Answer: C
6. What is the role of Cisco SecureX?
• A) To secure wireless networks • B) To integrate and unify network security tools for comprehensive visibility • C) To provide basic firewall protection • D) To replace antivirus software Answer: B
7. Which of the following is a characteristic of a worm
attack? • A) It targets authentication services • B) It is more network-based than a virus • C) It requires user intervention to spread • D) It is a form of a reconnaissance attack Answer: B
8. What does the “security onion” analogy represent?
• A) The complexity of ethical hacking tools • B) Layers of network defenses • C) The evolution of cybersecurity threats • D) The vulnerabilities in BYOD practices Answer: B
9. Which phase is NOT a part of worm mitigation?
• A) Containment • B) Inoculation • C) Eradication • D) Quarantine Answer: C
10. What is a key benefit of using penetration testing tools?
• A) They eliminate the need for encryption • B) They validate the strength of network security measures • C) They prevent DoS attacks • D) They stop malware from entering the network Answer: B
Attack Type Description
1. Reconnaissance Attack A. Exploits vulnerabilities in authentication or web services to gain unauthorized access. 2. Access Attack B. Gathers information about systems, services, or vulnerabilities for further exploitation. 3. Denial of Service (DoS) C. Disrupts services by overwhelming the network with traffic or malicious packets.
Answer: • 1→B • 2→A • 3→C
1. Confidentiality A. Ensures data is not altered
without authorization. 2. Integrity B. Ensures only authorized users have access to sensitive information. 3. Availability C. Ensures authorized users have uninterrupted access to required network resources.