Home > MCQs > IT & Programming > Cyber Security MCQs

Cyber Security MCQ

Cyber Security Quick Quiz

Question 1 of 10
  • The ASD Top Four are application whitelisting, patching of applications, patching of operating systems, and limiting administrative privileges. What percent of breaches do these account for?

    Answer & Explanation

    Correct Answer: 85 percent

    Note: This Question is unanswered, help us to find answer for this one

  • Proxy servers perform operations on ____-level data.

    Answer & Explanation

    Correct Answer: Application

    Note: This Question is unanswered, help us to find answer for this one

  • Which malware changes an operating system and conceals its tracks?

    Answer & Explanation

    Correct Answer: Rootkit

    Note: This Question is unanswered, help us to find answer for this one

  • You have just identified and mitigated an active malware attack on a user's computer, in which command and control was established. What is the next step in the process?

    Answer & Explanation

    Correct Answer: Eradiction / Remediation

    Note: This Question is unanswered, help us to find answer for this one

  • When implementing a data loss prevention (DLP) strategy, what is the first step in the process?

    Answer & Explanation

    Correct Answer: Evaluate the features of available DLP products to determine which best meet your organizations's needs.

    Note: This Question is unanswered, help us to find answer for this one

  • The DLP project team is about to classify your organization's data. Whats is the primary purpose of classifying data?

    Answer & Explanation

    Correct Answer: It quantifies the potential cost of a data breach.

    Note: This Question is unanswered, help us to find answer for this one

  • You organization is conducting a pilot deployment of a new e-commerce application being considered for purchase. You need to recommend a strategy to evaluate the security of the new software. Your organization does not have access to the application's source code. Which strategy should you choose?

    Answer & Explanation

    Correct Answer: Dynamic application security testing

    Note: This Question is unanswered, help us to find answer for this one

  • Which main reference coupled with the Cloud Security Alliance Guidance comprise the Security Guidance for Critical Areas of Focus in Cloud Computing?

    Answer & Explanation

    Correct Answer: Cloud Controls Matrix

    Note: This Question is unanswered, help us to find answer for this one

  • Which attack exploits input validation vulnerabilities?

    Answer & Explanation

    Correct Answer: Cross-site scripting (XSS)

    Note: This Question is unanswered, help us to find answer for this one

  • The us anticybersquatting act makes ____ cybersquatting illegal

    Answer & Explanation

    Correct Answer: Domain name

    Note: This Question is unanswered, help us to find answer for this one

  • Cyber Security Quick Quiz

    battery

    Poor Results!

    You need a lot of improvement.

    Just don't give up!

    Correct Answers: 0/10

    Start Practicing with our MCQs given below.