My Report (&Account)

Cyber Security Online Test


Correct Answer: 2 points | Wrong: -1 point
Grades: A* (100% score) | A (80%-99%) | B (60%-80%) | C (40%-60%) | D (0%-40%)

Here is the complete list of test quizzes on Cyber Security.

1. Which of the following is not a spot from where attackers seek information?

Question 1 of 50

2. Which of the following online services’ privacy cannot be protected using Tor?

Question 2 of 50

3. Data leakage is popularly known as ___________

Question 3 of 50

4. The full form of EDR is _______

Question 4 of 50

5. Sniffing is also known as ___________________

Question 5 of 50

6. ESP is abbreviated as ____________

Question 6 of 50

7. Information about people is available people search sites. Which of them is an example of people data searching site?

Question 7 of 50

8. Using _____________ for doing competitive information gathering is a crime.

Question 8 of 50

9. Physical ports are usually referred to as ___________

Question 9 of 50

10. Unknown exploits are those exploits that have not yet been reported openly and hence present a straightforward attack at firms and the government agencies.

Question 10 of 50

11. For discovering the OS running on the target system, the scanning has a specific term. What is it?

Question 11 of 50

12. In which year computer scientists try to integrate encryption techniques in TCP/IP protocol?

Question 12 of 50

13. ______________ is the unauthorized movement of data.

Question 13 of 50

14. Which one of them is not a network scanner?

Question 14 of 50

15. In which year, hacking became a practical crime and a matter of concern in the field of technology?

Question 15 of 50

16. Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

Question 16 of 50

17. DNS poisoning is very dangerous because it can extend its reach from one ___________ to another.

Question 17 of 50

18. Which of the following is not a decompiler tool?

Question 18 of 50

19. When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called _____________

Question 19 of 50

20. ________ Injection attack is a special attack done through character elements “Carriage Return” or “Line Feed.” Exploitation can be done when an attacker is capable to inject a CRLF series in an HTTP stream.

Question 20 of 50

21. Stateful Multilayer firewalls are also called ____________

Question 21 of 50

22. Finding & publishing any user’s identity with the help of different personal details is called ________

Question 22 of 50

23. VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.

Question 23 of 50

24. Which of the following is a Wireless traffic Sniffing tool?

Question 24 of 50

25. Mapping of data-flow in an organization is very useful in understanding the risk better due to actual & potential data leakage.

Question 25 of 50

26. Activate _____________ when you’re required it to use, otherwise turn it off for security purpose.

Question 26 of 50

27. Which of the following is not a web server attack type?

Question 27 of 50

28. Which of the following is the port number for Telnet?

Question 28 of 50

29. Before performing any penetration test, through legal procedure, which key points listed below is not mandatory?

Question 29 of 50

30. Instead of implementing single computer & its internet bandwidth, a ____________ utilizes various systems & their connections for flooding the targeted website.

Question 30 of 50

31. App permissions can cause trouble as some apps may secretly access your memory card or contact data.

Question 31 of 50

32. _______________ is a popular tool used for network analysis in multiprotocol diverse network.

Question 32 of 50

33. _______________________ is based on sniffer traces from the remote system.

Question 33 of 50

34. Performing a shoulder surfing in order to check other’s password is ____________ ethical practice.

Question 34 of 50

35. Which of them is not a track clearing technique?

Question 35 of 50

36. Trojans can not ______________

Question 36 of 50

37. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

Question 37 of 50

38. Which of the following is not a function or use of disassembler?

Question 38 of 50

39. DoS is abbreviated as _____________________

Question 39 of 50

40. Which of the following is not an anti-spam technique?

Question 40 of 50

41. Malicious code can be pushed into the _________ during ______________ attack.

Question 41 of 50

42. Which of them is not an example of business email security tool?

Question 42 of 50

43. Which of them is not a proper method for email security?

Question 43 of 50

44. Circuit-level gateway firewalls are installed in _______ layer of OSI model.

Question 44 of 50

45. Which of the following is an example of a Botnet program?

Question 45 of 50

46. There are _______ types of spamming.

Question 46 of 50

47. Which of the following is the port number for SMTP service?

Question 47 of 50

48. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.

Question 48 of 50

49. Tor is written in ______ language having roughly 146,000 LOC (lines of code).

Question 49 of 50

50. Strangers cannot cause much trouble if we connect to them over social media.

Question 50 of 50


 

Topic wise Test Quizzes on Cyber Security

Cyber Security tests, quizzes, and exams are great ways to learn and test your Cyber Security skills. Whether you’re a beginner or experienced, challenge and boost your confidence with our engaging online quizzes on Cyber Security Basics, Ethical Hacking, Security Protocol, Hacking, Cyber Law, Network Model Security, Security Phase, Cyber Attack, Web Security, Cyber Security Technology and Techniques. Start the Cyber Security online test now!



Cyber Security Certification Test

Cyber Security Certification Test is a free certification exam. However, you need to score an A grade in each of the "Certification Level Tests 1 to 10" to be eligible to take part in this certification test. So, take all the "10 Tests" starting from Certification Level 1 upto Level 10, before taking the final Certification test.


Level 1 to 10 Tests:
Total Questions: 25, Total Time: 30 min, Correct Answer: 2 points, Wrong Answer: -1 point

Certification Test:
Total Questions: 50, Total Time: 1 hour, Correct Answer: 2 points, Wrong Answer: -1 point

Cyber Security Internship Test

If you scored either Grade A* or Grade A in our Cyber Security Internship Test, then you can apply for Internship at Sanfoundry in Cyber Security.


Total Questions: 50, Total Time: 1 hour, Correct Answer: 2 points, Wrong Answer: -1 point

Cyber Security Job Test

It is designed to test and improve your skills for a successful career, as well as to apply for jobs.


Total Questions: 50, Total Time: 1 hour, Correct Answer: 2 points, Wrong Answer: -1 point

Note: Before you get started on these series of online tests, you should practice our collection of 1000 MCQs on Cyber Security .

Sanfoundry Scoring & Grading System

Sanfoundry tests and quizzes are designed to provide a real-time online exam experience. Here is what you need to know about them.

  • Scoring System: You get 2 points for each correct answer but lose 1 point for every wrong answer.
  • Grading System: Your grade depends on your final score and can be one of the following:

    • Grade A* - Genius (100%)
    • Grade A - Excellent (80% to 99%)
    • Grade B - Good (60% to 80%)
    • Grade C - Average (40% to 60%)
    • Grade D - Poor (0% to 40%)
advertisement
advertisement
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.