Cyber Security Quiz
Cyber Security Quiz
CEH Certification (Certified Ethical Hacker) and CompTIA Security+ can be quite extensive. Here's a
detailed quiz covering various topics from these certifications:
- A) Virus
- B) Worm
- C) Trojan
- D) Spyware
- A) HTTP
- B) FTP
- C) HTTPS
- D) SMTP
- A) Phishing
- B) IP Spoofing
- C) SQL Injection
- D) Denial of Service
- B) To trap malware.
- A) Wireshark
- B) Nmap
- D) Nessus
9. In penetration testing, what is a "zero-day exploit"?
10. Which type of scan is used to determine open ports and services on a target system?
- A) Vulnerability Scan
- B) Port Scan
- C) Network Scan
- D) Service Scan
- A) To detect intrusions.
- A) To encrypt data.
- A) Encryption
- B) Firewalls
- C) CCTV Cameras
- D) Antivirus Software
17. Which type of malware can replicate itself and spread to other systems without any user
intervention?
- A) Virus
- B) Worm
- C) Trojan
- D) Ransomware
18. What does the principle of least privilege refer to?
- A) Granting users the minimum levels of access necessary to perform their job functions.
- A) Metasploit
- B) Wireshark
- C) Hydra
- D) Burp Suite
21. What type of attack involves an attacker intercepting and altering communications between two
parties without their knowledge?
- A) Phishing
- B) Man-in-the-middle attack
- C) Denial of Service
- D) SQL Injection
22. Which security model uses labels to determine access levels for users?
- A) Discretionary Access Control (DAC)
24. Which of the following is a technique used to verify the identity of a user or device?
- A) Authorization
- B) Encryption
- C) Authentication
- D) Auditing
26. Which type of attack aims to make a system or network resource unavailable to users?
- A) Phishing
- B) Man-in-the-middle attack
- C) Denial of Service
- D) SQL Injection
27. What is the purpose of a Security Information and Event Management (SIEM) system?
29. Which cryptographic method uses the same key for both encryption and decryption?
- A) Asymmetric encryption
- B) Symmetric encryption
- C) Hashing
- D) Digital Signatures
- B) To act as an intermediary for requests from clients seeking resources from other servers.
- A) Adware
- B) Rootkit
- C) Botnet
- D) Spyware
- A) Telnet
- B) SSH
- C) FTP
- D) HTTP
- C) To encrypt data.
- A) Phishing
- B) Spam
- C) Man-in-the-middle attack
- D) SQL Injection
- A) Encryption
- B) Hashing
- C) Salting
- D) Scripting
- B) Code that triggers a malicious action when certain conditions are met.
- A) To encrypt data.
- C) To back up data.
50. Which type of attack involves overwhelming a system with a flood of traffic?
- A) Phishing
- B) Man-in-the-middle attack
- C) Denial of Service
- D) SQL Injection
55. What is the primary function of a network access control (NAC) system?
- A) RSA
- B) AES
- C) DSA
- D) ECC
- C) To authenticate users.
- C) To perform hashing.
- B) Tracks the state of active connections and makes decisions based on the context of the
traffic.
- C) Blocks all incoming traffic by default.
- A) HTTP
- B) FTP
- C) SFTP
- D) Telnet
- A) Password policy
- B) Firewall
- C) Security badge
- D) Antivirus software
67. What is the primary function of a web application firewall (WAF)?
- A) Sending emails that appear to be from a legitimate source to trick recipients into divulging
personal information.
69. Which type of encryption is commonly used to protect data stored on a mobile device?
- A) Symmetric encryption
- B) Asymmetric encryption
- C) Hashing
- D) Steganography
- B) To ensure the availability and recovery of critical systems and data after a disaster.
- D) A system update.
- A) To encrypt data.
73. Which type of attack involves the attacker disguising themselves as a trusted entity in
communication?
- A) Phishing
- B) Man-in-the-middle
attack
- C) Denial of Service
- D) SQL Injection
- A) To encrypt data.
- B) To generate a unique fixed-size string from input data, often used for data integrity verification.
- A) HTTP
- B) FTP
- C) IMAP
- D) S/MIME
79. Which of the following best describes an advanced persistent threat (APT)?
- A) It replicates itself.
- A) To prevent incidents.
- A) Firewall
- B) Security policy
- C) Antivirus software
- D) Encryption
85. Which type of attack uses multiple compromised systems to launch an attack on a single
target?
- A) Phishing
- B) Man-in-the-middle attack
- A) Sending too much data to a buffer, causing it to overflow and overwrite adjacent memory.
- A) HTTP
- B) FTP
- C) SMTP
- D) HTTPS
- B) A training program to educate users about security threats and best practices.
- C) A tool for monitoring network traffic.
94. Which type of attack attempts to guess passwords by trying many possibilities?
- A) Phishing
- B) Man-in-the-middle attack
- D) SQL Injection
- A) Encrypting data.
- A) To encrypt data.
- B) To generate a unique fixed-size output from input data, used for data integrity verification.
1. A
2. C
3. C
4. C
5. A
6. B
7. A
8. C
9. A
10. B
11. C
12. B
13. B
14. C
15. A
16. A
17. B
18. A
19. B
20. A
21. B
22. B
23. B
24. C
25. A
26. C
27. A
28. A
29. B
30. B
31. B
32. B
33. A
34. C
35. B
36. B
37. B
38. B
39. A
40. B
41. A
42. C
43. A
44. B
45. B
46. A
47. B
48. A
49. B
50. C
51. B
52. B
53. A
54. B
55. B
56. B
57. B
58. B
59. A
60. B
61. B
62. B
63. C
64. B
65. C
66. C
67. B
68. A
69. A
70. B
71. A
72. B
73. B
74. B
75. B
76. D
77. B
78. A
79. B
80. B
81. B
82. B
83. B
84. A
85. D
86. A
87. A
88. A
89. B
90. D
91. A
92. B
93. B
94. C
95. A
96. B
97. B
98. B
99. B
100. B
This quiz covers a wide range of topics relevant to CEH Certification and CompTIA Security+,
providing a comprehensive review for anyone studying for these exams.