0% found this document useful (0 votes)
27 views4 pages

Multiple Choice Questions

The document contains multiple-choice questions (MCQs) related to cybersecurity concepts, including reconnaissance attacks, hacker types, the CIA triad, and DoS attack mitigation. It also describes various attack types and their characteristics, as well as the principles of confidentiality, integrity, and availability. The answers to the questions are provided, indicating the correct options for each query.

Uploaded by

amal98.alaskari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views4 pages

Multiple Choice Questions

The document contains multiple-choice questions (MCQs) related to cybersecurity concepts, including reconnaissance attacks, hacker types, the CIA triad, and DoS attack mitigation. It also describes various attack types and their characteristics, as well as the principles of confidentiality, integrity, and availability. The answers to the questions are provided, indicating the correct options for each query.

Uploaded by

amal98.alaskari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Multiple Choice Questions (MCQs)

1. What is the primary goal of reconnaissance attacks?


• A) To gain unauthorized access to sensitive databases
• B) To disrupt network services
• C) To gather information about systems, services, or
vulnerabilities
• D) To modify or delete critical network data
Answer: C

2. Which type of hacker uses their skills for malicious


purposes?
• A) White hat hacker
• B) Gray hat hacker
• C) Black hat hacker
• D) Ethical hacker
Answer: C

3. What does the “I” in the CIA triad stand for?


• A) Integrity
• B) Information
• C) Intelligence
• D) Infrastructure
Answer: A

4. Which of the following is a key component of mitigating


DoS attacks?
• A) Encrypting all network traffic
• B) Using antispoofing technologies like DHCP snooping
• C) Performing regular penetration tests
• D) Implementing BYOD policies
Answer: B

5. What is the main purpose of a Bring Your Own Device


(BYOD) policy?
• A) To monitor employee activities on the network
• B) To ensure employees only use company devices
• C) To define security measures for personal devices
accessing company resources
• D) To prohibit access to sensitive data
Answer: C

6. What is the role of Cisco SecureX?


• A) To secure wireless networks
• B) To integrate and unify network security tools for
comprehensive visibility
• C) To provide basic firewall protection
• D) To replace antivirus software
Answer: B

7. Which of the following is a characteristic of a worm


attack?
• A) It targets authentication services
• B) It is more network-based than a virus
• C) It requires user intervention to spread
• D) It is a form of a reconnaissance attack
Answer: B

8. What does the “security onion” analogy represent?


• A) The complexity of ethical hacking tools
• B) Layers of network defenses
• C) The evolution of cybersecurity threats
• D) The vulnerabilities in BYOD practices
Answer: B

9. Which phase is NOT a part of worm mitigation?


• A) Containment
• B) Inoculation
• C) Eradication
• D) Quarantine
Answer: C

10. What is a key benefit of using penetration testing tools?


• A) They eliminate the need for encryption
• B) They validate the strength of network security
measures
• C) They prevent DoS attacks
• D) They stop malware from entering the network
Answer: B

Attack Type Description


1. Reconnaissance Attack A. Exploits vulnerabilities in
authentication or web services
to gain unauthorized access.
2. Access Attack B. Gathers information about
systems, services, or
vulnerabilities for further
exploitation.
3. Denial of Service (DoS) C. Disrupts services by
overwhelming the network with
traffic or malicious packets.

Answer:
• 1→B
• 2→A
• 3→C

1. Confidentiality A. Ensures data is not altered


without authorization.
2. Integrity B. Ensures only authorized users
have access to sensitive
information.
3. Availability C. Ensures authorized users
have uninterrupted access to
required network resources.

1→B
• 2→A
• 3→C

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy