Top 20 Cyber Security Questions & Answers

In today’s digitally interconnected world, cybersecurity is a crucial concern, with individuals, corporations, and governments confronting an ever-changing array of dangers. Here are the top 20 cybersecurity questions and answers to help shed light on this difficult and crucial field. These questions cover a wide range of topics, from fundamental ideas to sophisticated methods, with the goal of arming you with the knowledge you need to defend yourself and your digital assets in an increasingly digital society. This collection of questions and answers will be a great resource for understanding the principles and practices of cybersecurity, whether you’re a cybersecurity enthusiast, a business owner, or simply someone interested in securing your online presence.

Now, let’s move on to the top 20 Cyber Security Questions & Answers

Q1. The _ attack is designed to circumvent filtering rules that depend on TCP header information.

Select one:
a. tiny fragment
b. address spoofing
c. source routing
d. bastion host

Q2. __ control controls access to a service according to which user is attempting to access it.

Select one:
a. User
b. Direction
c. Service
d. Behavior

Q3. Typical for SOHO applications, a __ is a single router between internal and external networks with stateless or full packet filtering.

Select one:
a. single bastion T
b. double bastion inline
c. screening router
d. host-resident firewall

Q4. Distributed firewalls protect against internal attacks and provide protection tailored to specific machines and applications.

Select one:
a. True
b. False

Q5. A prime disadvantage of an application-level gateway is the additional processing overhead on each connection.

Select one:
a. True
b. False

Q6. A traditional packet filter makes filtering decisions on an individual packet basis and does not take into consideration any higher layer context. 

Select one:
a. True
b. False

Q7. The primary role of the personal firewall is to deny unauthorized remote access to the computer.

Select one:
a. True
b. False

Q8. A single device that integrates a variety of approaches to dealing with network-based attacks is referred to as a ____ system.

UTM (unified thread)

Q9. ____ protocols operate in networking devices, such as a router or firewall, and will encrypt and compress all traffic going into the WAN and decrypt and uncompress traffic coming from the WAN.


Q10. Snort Inline adds three new rule types: drop, reject, and ____


Q11. Snort Inline enables Snort to function as an intrusion prevention capability.

Select one:
a. True
b. False

Q12. The ______ IP address is the IP address of the system that originated the IP packet.


Q13. anomaly watches for unusual traffic activities, such as a flood of UDP packets or a new service appearing on the network.


Q14. A logical means of implementing an IPSec is in a firewall.

Select one:
a. True
b. False

Q15. A ______ firewall controls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the other side.


Q16. An intruder transmitting packets from the outside with a source IP address field containing an address of an internal host is known as IP address ____


Q17. ______ matching scans incoming packets for specific byte sequences (the signature) stored in a database of known attacks.


Q18. The ____ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter to protect the premises network from Internet-based attacks.


Q19. A __ gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.

Select one:
a. packet filtering
b. stateful inspection
c. application-level
d. circuit-level

Q20. __ scans for attack signatures in the context of a traffic stream rather than individual packets.

Select one:
a. Pattern matching
b. Protocol anomaly
c. Traffic anomaly
d. Stateful matching


  1. a
  2. a
  3. c
  4. a
  5. a
  6. a
  7. a
  8. UTM (unified thread)
  9. IPSec
  10. Sdrop
  11. a
  12. source
  13. Traffic
  14. a
  15. personal
  16. spoofing
  17. Pattern
  18. firewall
  19. d
  20. d