Cyber Security Quiz

Most Essential Cyber Security Quiz MCQs

A stead reduction in memory available on the heap to the point where it is completely exhausted
is known as a __.

Select one:
a. fuzzing
b. deadlock
c. memory injection
d. memory leak

A __ is any action that compromises the security of information owned by an organization.

Select one:
a. security mechanism
b. security attack
c. security policy
d. security service

__ is a function that removes specific identifying information from query results, such as last name and telephone number, but creates some sort of unique identifier so that analysts can detect connections between queries.

Select one:
a. Anonymization
b. Data transformation
c. Immutable audit
d. Selective revelation

A capability set up for the purpose of assisting in responding to computer security-related incidents that involve sites within a defined constituency is called a __.

Select one:
d. all of the above

The __ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.

Select one:
a. ECC
b. RSA
c. DSS
d. XOR

ESP supports two modes of use: transport and _.

Select one:
a. padding
b. tunnel
c. payload
d. sequence

With _ the linking to shared library routines is deferred until load time so that if changes are made any program that references the library is unaffected.

Select one:
a. statically linked shared libraries
b. dynamically linked shared libraries
c. system linked shared libraries
d. all of the above

_ is a markup language that uses sets of embedded tags or labels to characterize text elements within a document so as to indicate their appearance, function, meaning, or context.

Select one:
a. HML
c. XML

Digital signatures and key management are the two most important applications of __ encryption.

Select one:
a. private-key
b. public-key
c. preimage resistant
d. advanced

__ encompasses intrusion detection, prevention and response.

Select one:
a. Intrusion management
b. Security assessments
c. Database access control
d. Data loss prevention

_ scan critical system files, directories, and services to ensure they have not been changed without proper authorization.

Select one:
a. Intrusion prevention systems
b. System integrity verification tools
c. Log analysis tools
d. Network and host intrusion detection systems

The MPDU exchange for distributing pairwise keys is known as the _.

Select one:
a. pseudorandom function
b. cryptographic function
c. nonce
d. 4-way handshake

__ refers to setting a maximum number with respect to roles.

Select one:
a. Cardinality
b. Prerequisite
c. Exclusive
d. Hierarchy

A __ interconnects the IoT-enabled devices with the higher-level communication networks.

Select one:
a. microcontroller
b. gateway
c. carrier
d. sensor

_ is a minimal set of conventions for invoking code using XML over HTTP that enables applications to request services from one another with XML-based requests and receive responses as data formatted with XML.

Select one:
d. WS-Security

The buffer is located __ .

Select one:
a. in the heap
b. on the stack
c. in the data section of the process
d. all the above

__ specification indicates the impact on the organization should the particular threat in question actually eventuate.

Select one:
a. Risk
b. Consequence
c. Threat
d. Likelihood

__ are resources that should be used as part of the system security planning process.

Select one:
a. Texts
b. Online resources
c. Specific system hardening guides
d. All of the above

It is possible to specifically defend against the __ by using a modified version of the TCP connection handling code.

Select one:
a. three-way handshake
b. UDP flood
c. SYN spoofing attack
d. flash crowd

The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186, known as the __.

Select one:
a. XOR
b. MD5
c. MAC
d. DSS


  1. d
  2. b
  3. a
  4. d
  5. c
  6. b
  7. b
  8. c
  9. b
  10. a
  11. b
  12. d
  13. a
  14. b
  15. a
  16. d
  17. b
  18. b
  19. c
  20. d