This is a set of Cyber security MCQs: Secure—Cybersecurity Awareness Curriculum–22264 Part 2. Please note that all questions and answers are based on our research and self-study.
01.) Which AWS service is primarily used for managing access control?
A.) Amazon S3
B.) AWS Lambda
C.) Amazon EC2
D.) AWS AM (Identity and Access Management)
02.) Which of the following is a secure way to store passwords in a web application?
A.) Storing passwords in plaintext
B.) Encrypting passwords using a symmetric encryption algorithm
C.) Hashing passwords with a strong hashing algorithm and using a salt
D.) Storing passwords in a cookie
03.) Which security measure is crucial for protecting user data in SaaS applications?
A.) User training
B.) Data encryption at rest and in transit
C.) Regular software updates
D.) Network segmentation
04.) Which cloud deployment model offers the highest level of control and security customization?
A.) Public Cloud
B.) Hybrid cloud
C.) Community cloud
D.) Private cloud
05.) Which of the following is a recommended practice to avoid malware on mobile devices?
A.) Installing apps from unknown sources
B.) Downloading apps only from official app stores
C.) Disabling antivirus software
D.) Jailbreaking or rooting the device
06.) In the context of security testing, what is a “zero-day” vulnerability?
A.) A vulnerability that was fixed on the same day it was discovered
B.) A vulnerability that is widely known and has a patch available
C.) A vulnerability that is unknown to the software vendor and has no available patch
D.) A vulnerability that is reported on the day of the software’s release
07.) Why is logging and monitoring important in a cloud environment?
A.) To reduce data storage costs
B.) To enhance user experience
C.) To detect and respond to security incidents
D.) To speed up application performance
08.) What is the main advantage of implementing Multi-Factor Authentication (MFA)?
A.) Speeds up user login times
B.) Simplifies network management
C.) Reduces the need for strong passwords
D.) Increases security by requiring multiple forms of verification
09.) A company uses MFA to secure access to its applications. Which of the following combinations is an example of MFA?
A.) Password and security question
B.) Password and CAPTCHA
C.) Password and one-time code sent via SMS
D.) Username and password
10.) Which of the following is a common technique used to protect against brute-force attacks on passwords?
A.) Using CAPTCHA
B.) Implementing multi-factor authentication (MFA)
C.) Disabling user accounts after a number of failed login attempts
D.) All of the above
Question Number | Question Answer |
---|---|
01.> | D.) AWS AM (Identity and Access Management) |
02.> | C.) Hashing passwords with a strong hashing algorithm and using a salt |
03.> | B.) Data encryption at rest and in transit |
04.> | D.) Private cloud |
05.> | B.) Downloading apps only from official app stores |
06.> | C.) A vulnerability that is unknown to the software vendor and has no available patch |
07.> | C.) To detect and respond to security incidents |
08.> | D.) Increases security by requiring multiple forms of verification |
09.> | C.) Password and one-time code sent via SMS |
10.> | D.) All of the above |
cyber security mcqs cyber security mcqs cyber security mcqs cyber security mcqs
Must Read:
- Cyber Security: Secure – Cybersecurity Awareness Curriculum MCQ–22264 Set1
- Generative AI for Software Engineer MCQs
- Azure Fundamentals Question And Answers