Professional Documents
Culture Documents
ccc cyber security 100 MCQ
ccc cyber security 100 MCQ
A) Confidentiality
B) Reliability
C) Integrity
D) Availability
Answer: B) Reliability
B) A software or hardware-based security system that monitors and controls incoming and
outgoing network traffic
Answer: B) A software or hardware-based security system that monitors and controls incoming and
outgoing network traffic
A) 123456
B) Password123
Skill Book Skill Development Center
C) CorrectHorseBatteryStaple
D) Username
Answer: C) CorrectHorseBatteryStaple
6. Which of the following is a type of malware that spreads by attaching itself to other files?
A) Spyware
B) Worm
C) Adware
D) Rootkit
Answer: B) Worm
A) SQL injection
Skill Book Skill Development Center
B) Shoulder surfing
C) Man-in-the-middle attack
D) Buffer overflow
B) Fingerprint scanner
C) Security question
D) Captcha verification
11. What does the acronym "SSL" stand for in the context of cybersecurity?
13. Which of the following is a best practice for protecting against malware?
A) Retina scan
B) Voice recognition
C) PIN code
D) Facial recognition
B) Data breach
C) Password reset
D) System backup
B) Data leak
C) Password change
D) System backup
23. Which of the following is NOT a common example of a cybersecurity threat actor?
A) Insider
B) Phisher
C) Hacker
D) Firewall
A) A network of honeypots
B) A type of malware
in cybersecurity?
A) Firewall
C) Buffer overflow
D) Antivirus software
A) Antivirus software
B) Password manager
C) Web browser
D) Operating system
B) A type of malware
A) HTTPS
B) ISO/IEC 27001
C) SQL injection
D) Buffer overflow
A) Phishing attack
B) Data breach
C) System backup
D) Ransomware attack
Answer: B) The protection of computer systems and networks from digital attacks
Skill Book Skill Development Center
43. Which of the following is a common example of a security vulnerability?
A) Firewall
C) Buffer overflow
D) Antivirus software
B) Data leak
C) Password change
D) System backup
48. Which of the following is NOT a common example of a cybersecurity threat actor?
A) Insider
B) Phisher
C) Hacker
D) Firewall
Answer: D) Firewall
) A network of honeypots
B) A type of malware
51. What is the primary goal of a DDoS (Distributed Denial of Service) attack?
A) Antivirus software
B) Password manager
C) Web browser
D) Operating system
A) HTTPS
B) ISO/IEC 27001
C) SQL injection
D) Buffer overflow
B) Data breach
C) System backup
D) Ransomware attack
B) A type of malware
A) Firewall
C) Buffer overflow
D) Antivirus software
A) Antivirus software
B) Password manager
C) Web browser
D) Operating system
B) A type of malware
A) HTTPS
B) ISO/IEC 27001
Skill Book Skill Development Center
C) SQL injection
D) Buffer overflow
A) Phishing attack
B) Data breach
C) System backup
D) Ransomware attack
Answer: B) The protection of computer systems and networks from digital attacks
A) Firewall
Skill Book Skill Development Center
B) Intrusion detection system
C) Buffer overflow
D) Antivirus software
A) Antivirus software
B) Password manager
C) Web browser
D) Operating system
D) To prevent DDoS
attacks
Skill Book Skill Development Center
Answer: C) To provide secure authentication
B) A type of malware
A) HTTPS
B) ISO/IEC 27001
C) SQL injection
D) Buffer overflow
A) Phishing attack
B) Data breach
C) System backup
Skill Book Skill Development Center
D) Ransomware attack
Answer: B) The protection of computer systems and networks from digital attacks
A) Firewall
C) Buffer overflow
D) Antivirus software