Cyber Security MCQs: Secure – Cybersecurity Awareness Curriculum–22264 Part2

This is a set of Cyber security MCQs: Secure—Cybersecurity Awareness Curriculum–22264 Part 2. Please note that all questions and answers are based on our research and self-study.

01.) Which AWS service is primarily used for managing access control?

A.) Amazon S3
B.) AWS Lambda
C.) Amazon EC2
D.) AWS AM (Identity and Access Management)

02.) Which of the following is a secure way to store passwords in a web application?

A.) Storing passwords in plaintext
B.) Encrypting passwords using a symmetric encryption algorithm
C.) Hashing passwords with a strong hashing algorithm and using a salt
D.) Storing passwords in a cookie

03.) Which security measure is crucial for protecting user data in SaaS applications?

A.) User training
B.) Data encryption at rest and in transit
C.) Regular software updates
D.) Network segmentation

04.) Which cloud deployment model offers the highest level of control and security customization?

A.) Public Cloud
B.) Hybrid cloud
C.) Community cloud
D.) Private cloud

05.) Which of the following is a recommended practice to avoid malware on mobile devices?

A.) Installing apps from unknown sources
B.) Downloading apps only from official app stores
C.) Disabling antivirus software
D.) Jailbreaking or rooting the device

06.) In the context of security testing, what is a “zero-day” vulnerability?

A.) A vulnerability that was fixed on the same day it was discovered
B.) A vulnerability that is widely known and has a patch available
C.) A vulnerability that is unknown to the software vendor and has no available patch
D.) A vulnerability that is reported on the day of the software’s release

07.) Why is logging and monitoring important in a cloud environment?

A.) To reduce data storage costs
B.) To enhance user experience
C.) To detect and respond to security incidents
D.) To speed up application performance

08.) What is the main advantage of implementing Multi-Factor Authentication (MFA)?

A.) Speeds up user login times
B.) Simplifies network management
C.) Reduces the need for strong passwords
D.) Increases security by requiring multiple forms of verification

09.) A company uses MFA to secure access to its applications. Which of the following combinations is an example of MFA?

A.) Password and security question
B.) Password and CAPTCHA
C.) Password and one-time code sent via SMS
D.) Username and password

10.) Which of the following is a common technique used to protect against brute-force attacks on passwords?

A.) Using CAPTCHA
B.) Implementing multi-factor authentication (MFA)
C.) Disabling user accounts after a number of failed login attempts
D.) All of the above

cyber security mcqs cyber security mcqs cyber security mcqs cyber security mcqs
Must Read:

Leave a Reply

Your email address will not be published. Required fields are marked *