Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Cyber Security Interview Questions and Answers
Home
Questions
Cyber Security
0
votes
Q: Which one of the following systems cannot be considered as an example of the operating systems?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
operating-system
0
votes
Q: In the CIA Triad, which one of the following is not involved?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
cia
0
votes
Q: DNS translates a Domain name into _________.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
dns
tanslation
0
votes
Q: Which of the following usually considered as the default port number of apache and several other web servers?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
port-number
0
votes
Q: Which of the following is a type of independent malicious program that never required any host program?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
malicious-program
0
votes
Q: Which of the following is just opposite to the Open Design principle?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
open-design
0
votes
Q: Which of the following statements is true about the Trojans?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
trojan
0
votes
Q: Which of the following malware’s type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
rat
malware
security
0
votes
Q: “CHAP” stands for __________.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
chap
malware
security
0
votes
Q: Which type of the following malware does not replicate or clone them self’s through infection?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
malware
+1
vote
Q: Which of the following type of text is transformed with the help of a cipher algorithm?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cipher-algorithm
0
votes
Q: Which of the following statements is true about the VPN in Network security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
vpn-security
0
votes
Q: Which of the following can diminish the chance of data leakage?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
data-leakage
0
votes
Q: Which one of the following statements is correct about Email security in the network security methods?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
email-security
+1
vote
Q: Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
ethical-hacking
0
votes
Q: The web application like banking websites should ask its users to log-in again after some specific period of time, let say 30 min. It can be considered as an example of which cybersecurity principle?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
Q: Which of the following is a Stuxnet?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
stuxnet
+1
vote
Q: Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
Q: Which of the following is the least strong security encryption standard?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
encryption
0
votes
Q: Which of the following can also consider as the instances of Open Design?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
Q: Which of the following actions compromise cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security-actions
0
votes
Q: Code Red is a type of ________.
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
red-code
0
votes
Q: Which of the following act violates cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
+1
vote
Q: To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
computer-system-protection
0
votes
Q: Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______.
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-crime
0
votes
Q: Which one of the following is actually considered as the first computer virus?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
computer-virus
0
votes
Q: In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-technology
0
votes
Q: “Cyberspace” was coined by _________.
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyberspace
0
votes
Q: Which of the following are the types of scanning?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
scanning-types
0
votes
Q: Which of the following is not an advantage of cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
Page:
« prev
1
2
3
4
5
6
7
8
next »
...