MCQs on Networking and Cyber Security : Free MCQ with Answers

Ranvir Kumar

Updated on:

MCQs on Networking and Cyber Security

MCQ on “Basics of networking and cyber security: networking devices and protocols, network and information security threats (like hacking, virus, worms, Trojan etc.) and prevention measures.” with answers || MCQ for Bank PO and IBPS Clerk 2023 Exam || MCQ for SSC CGL Mains Exam || All competitive exam

 

Q1: Which network security measure involves converting readable data into an unreadable format to prevent unauthorized access?

 (a) Packet filtering

(b) Access control

(c) Encryption 

(d) Firewall 

Answer
Option (c) Encryption

Q2: What is “antivirus software” used for in the context of cybersecurity?

(a) Encrypting data for secure transmission

(b) Protecting against malware and viruses

(c) Filtering unwanted emails

(d) Monitoring network traffic

Answer

Option (b) Protecting against malware and viruses

Q3: Which network security measure involves encrypting data transmissions to ensure confidentiality?

(a) Firewall

(b) NAT (Network Address Translation)

(c) VPN (Virtual Private Network)

(d) VLAN (Virtual Local Area Network)

Answer

Option (c) VPN (Virtual Private Network)

Q4: Which networking device operates at the Data Link Layer of the OSI model and forwards data based on MAC addresses?

(a) Router

(b) Hub

(c) Switch

(d) Modem

Answer

Option (c) Switch

Q5: Which networking protocol is commonly used for sending and receiving emails?

(a) FTP

(b) HTTP

(c) SMTP

(d) DHCP

Answer

Option (c) SMTP

Q6: Which network security threat involves unauthorized access to computer systems with malicious intent?

(a) Virus

(b) Worm

(c) Trojan

(d) Hacking

Answer

Option (d) Hacking

Q7: Which protocol is used for assigning IP addresses to devices on a network automatically?

(a) DNS

(b) DHCP

(c) SSL/TLS

(d) FTP

Answer

Option (b) DHCP

Q8: What is a “worm” in the context of Cyber Security?

(a) A type of computer virus

(b) A hardware component that boosts network performance

(c) A type of denial-of-service attack

(d) A self-replicating malicious program that spreads over networks

Answer

Option (d) A self-replicating malicious program that spreads over networks

Q9: Which network security threat involves deceptive software that appears to be legitimate but performs malicious actions?

(a) Virus

(b) Worm

(c) Trojan

(d) Hacking

Answer

Option (c) Trojan

Q10: Which networking protocol is used for translating human-readable domain names into IP addresses?

(a) DNS

(b) DHCP

(c) FTP

(d) SMTP

Answer

Option (a) DNS

Q11: Which networking device connects multiple computers in a star topology and broadcasts data to all connected devices?

(a) Hub

(b) Switch

(c) Router

(d) Modem

Answer

Option (a) Hub

Q12: Which network security threat involves overwhelming a system or network with a flood of incoming traffic?

(a) Hacking

(b) Virus

(c) Worm

(d) Denial-of-Service (DoS) attack

Answer

Option (d) Denial-of-Service (DoS) attack

Q13: What is “encryption” in the context of Cyber Security?

(a) The process of connecting multiple networks

(b) A method of protecting data by converting it into a code

(c) A type of hardware device used in network routing

(d) A form of network attack

Answer

Option (b) A method of protecting data by converting it into a code

Q14: What is a “packet” in the context of networking?

(a) A hardware device for connecting to the internet

(b) A form of wireless encryption

(c) A small unit of data transmitted over a network

(d) A type of antivirus software

Answer

Option (c) A small unit of data transmitted over a network

 

Q15: Which network security threat involves malicious software that locks users out of their own systems or data until a ransom is paid?

(a) Phishing

(b) Ransomware

(c) Spyware

(d) Malware

Answer

Option (b) Ransomware

Q16: Which networking device operates at the Physical Layer of the OSI model and connects devices within the same network segment?

(a) Hub

(b) Router

(c) Switch

(d) Modem

Answer

Option (a) Hub

Q17: What does “WPA” stand for in the context of wireless network security?

(a) Wireless Protocol Association

(b) Wi-Fi Protected Access

(c) Web Page Authentication

(d) Wireless Privacy Algorithm

Answer

Option (b) Wi-Fi Protected Access

Q18: Which network security threat involves intercepting and capturing data as it travels between two parties?

(a) Spoofing

(b) Eavesdropping

(c) Hacking

(d) Phishing

Answer

Option (b) Eavesdropping

Q19: Which network protocol is used for secure remote access to a network, often used for accessing work networks from home?

(a) SMTP

(b) FTP

(c) SSL/TLS

(d) VPN (Virtual Private Network)

Answer

Option (d) VPN (Virtual Private Network)

Q20: What is “spyware” in the context of Cyber Security?

(a) A type of computer virus

(b) Malicious software that tracks user activities without consent

(c) A hardware device used for network monitoring

(d) A type of network protocol

Answer

Option (b) Malicious software that tracks user activities without consent

Q21: Which network security threat involves creating a fake copy of a legitimate website to deceive users?

(a) Hacking

(b) Spoofing

(c) Phishing

(d) Worm

Answer

Option (c) Phishing

Q22: What is the purpose of a “proxy server” in the context of networking?

(a) Blocking all network traffic

(b) Encrypting data packets

(c) Speeding up internet connections

(d) Acting as an intermediary between a user and the internet

Answer

Option (d) Acting as an intermediary between a user and the internet

Q23: Which network protocol is used for transferring files between a local computer and a remote server?

(a) DNS

(b) DHCP

(c) FTP

(d) SMTP

Answer

Option (c) FTP

Q24: What is “social engineering” in the context of Cyber Security?

(a) A type of encryption technique

(b) The practice of securing social media accounts

(c) Manipulating people into revealing confidential information or performing actions

(d) Developing secure networks

Answer

Option (c) Manipulating people into revealing confidential information or performing actions

Q25: Which network security threat involves sending a large volume of email traffic to overwhelm a recipient’s inbox?

(a) Malware

(b) Phishing

(c) Spam

(d) Eavesdropping

Answer

Option (c) Spam

Q26: Which network protocol is used for converting IP addresses to MAC addresses on a local network?

(a) DNS

(b) ARP

(c) HTTP

(d) SMTP

Answer

Option (b) ARP

Q27: What is a “pharming” attack in the context of network security?

(a) Intercepting wireless signals

(b) Redirecting users to a fake website without their knowledge

(c) Sending malicious emails

(d) Cracking encrypted passwords

Answer

Option (b) Redirecting users to a fake website without their knowledge

Q28: Which network security threat involves capturing and analyzing network traffic to obtain sensitive information?

(a) Sniffing

(b) Spoofing

(c) Ransomware

(d) Eavesdropping

Answer

Option (a) Sniffing

Q29: What is “data encryption” used for in the context of network security?

(a) Blocking network traffic

(b) Monitoring network activities

(c) Protecting data by converting it into a secure code

(d) Sending bulk emails

Answer

Option (c) Protecting data by converting it into a secure code

Q30: Which network protocol is used for secure remote login to a server over an encrypted channel?

(a) HTTP

(b) SSH (Secure Shell)

(c) FTP

(d) SNMP (Simple Network Management Protocol)

Answer

Option (b) SSH (Secure Shell)

Q31: Which network security threat involves making a network or website unavailable by overwhelming it with traffic from multiple sources?

(a) Phishing

(b) Spam

(c) Denial-of-Service (DoS) attack

(d) Worm

Answer

Option (c) Denial-of-Service (DoS) attack

Q32: Which network security measure involves hiding internal IP addresses from external networks?

(a) Encryption

(b) NAT (Network Address Translation)

(c) VLAN (Virtual Local Area Network)

(d) VPN (Virtual Private Network)

Answer

Option (b) NAT (Network Address Translation)

Q33: Which network security threat involves unauthorized access to sensitive information by intercepting wireless signals?

(a) Hacking

(b) Eavesdropping

(c) Ransomware

(d) Phishing

Answer

Option (b) Eavesdropping

Q34: What does “SSID” stand for in the context of wireless networks?

 (a) Secure Server Identification

(b) Service Set Identifier

(c) System Security Identification

(d) Shared Server Indicator

Answer

Option (b) Service Set Identifier

Q35: Which network protocol is used for secure transfer of files over a network, often used for downloading software updates?

(a) HTTP

(b) FTP

(c) SSH

(d) SMTP

Answer

Option (b) FTP

Q36: What is a “data breach” in the context of network security?

(a) A sudden loss of network connectivity

(b) Unauthorized access to confidential information

(c) A type of denial-of-service attack

(d) A method of encrypting data

Answer

Option (b) Unauthorized access to confidential information

Q37: Which network security threat involves disguising malicious software as a legitimate application?

(a) Virus

(b) Worm

(c) Trojan

(d) Hacking

Answer

Option (c) Trojan

Q38: Which network protocol is used for converting domain names into IP addresses and vice versa?

(a) DHCP

(b) DNS

(c) ARP

(d) SMTP

Answer

Option (b) DNS

Q39: What is “data backup” used for in the context of network security?

(a) Intercepting network traffic

(b) Storing copies of important data to prevent loss

(c) Preventing unauthorized access

(d) Blocking spam emails

Answer
Option (b) Storing copies of important data to prevent loss

Q40: Which network security measure involves creating a secure connection between a user’s device and a network?

(a) Firewall

(b) Encryption

(c) Antivirus software

(d) Router

Answer

Option (b) Encryption

Q41: What is a “bot” in the context of Cyber Security?

(a) A type of hardware device

(b) A type of email attachment

(c) A self-replicating malicious program

(d) A compromised computer controlled by a cybercriminal

Answer

Option (d) A compromised computer controlled by a cybercriminal

Q42: Which network security threat involves impersonating a legitimate entity to gain unauthorized access or deceive users?

(a) Spoofing

(b) Phishing

(c) Ransomware

(d) Spamming

Answer

Option (a) Spoofing

Q43: Which network protocol is used for remotely managing and monitoring network devices?

(a) DNS

(b) FTP

(c) SNMP

(d) SMTP

Answer

Option (c) SNMP

Q44: Which network security threat involves a malicious program that self-replicates and spreads across networks without human intervention?

(a) Virus

(b) Worm

(c) Trojan

(d) Spyware

Answer

Option (b) Worm

Q45: Which network protocol is used for remotely accessing and managing servers and network devices using a command-line interface?

(a) HTTP

(b) SSH

(c) FTP

(d) SMTP

Answer

Option (b) SSH

Q46: Which networking device operates at the Session Layer of the OSI model and provides network services like authentication and authorization?

(a) Hub

(b) Router

(c) Switch

(d) Proxy server

Answer

Option (d) Proxy server

Q47: Which network security measure involves monitoring network traffic for suspicious or unauthorized activity?

(a) Encryption

(b) Firewall

(c) Router

(d) Hub

Answer

Option (b) Firewall

Q48: Which network protocol is used for securely transferring files over the internet, often used for downloading software updates?

(a) HTTP

(b) FTPS (FTP Secure)

(c) Telnet

(d) SNMP

Answer

Option (b) FTPS (FTP Secure)

Q49: Which network security threat involves redirecting network traffic to a malicious server without the user’s knowledge?

(a) Hacking

(b) Spoofing

(c) Eavesdropping

(d) Phishing

Answer

Option (b) Spoofing

Q50: What is “patch management” in the context of network security?

(a) Securing physical access to network devices

(b) Encrypting data transmissions

(c) Updating software and systems to fix security vulnerabilities

(d) Monitoring network traffic

Answer

Option (c) Updating software and systems to fix security vulnerabilities

Q51: Which network security threat involves malicious software that captures sensitive data such as login credentials?

(a) Ransomware

(b) Spyware

(c) Trojan

(d) Worm

Answer

Option (b) Spyware

Q52: Which network protocol is used for remotely managing and configuring network devices, often used for routers and switches?

(a) DNS

(b) FTP

(c) SNMP (Simple Network Management Protocol)

(d) SMTP

Answer

Option (c) SNMP (Simple Network Management Protocol)

Q53: Which network security threat involves a targeted attack where an attacker gains access to a system by exploiting a known vulnerability?

(a) Virus

(b) Worm

(c) Zero-day exploit

(d) Hacking

Answer

Option (c) Zero-day exploit

 

Q54: What is “intrusion detection” used for in the context of network security?

(a) Analyzing network traffic for sensitive data

(b) Monitoring user activities on social media

(c) Detecting and responding to unauthorized access or suspicious activities

(d) Encrypting data transmissions

Answer

Option (c) Detecting and responding to unauthorized access or suspicious activities

Q55: Which network protocol is used for remote file access and management over a secure connection?

(a) SSH (Secure Shell)

(b) SMTP

(c) SNMP (Simple Network Management Protocol)

(d) DNS

Answer

Option (a) SSH (Secure Shell)

Q56: What is “incident response” used for in the context of network security?

(a) Blocking network traffic

(b) Preventing unauthorized access to network devices

(c) Developing encryption algorithms

(d) Managing and mitigating the aftermath of a security breach

Answer

Option (d) Managing and mitigating the aftermath of a security breach

Q57: Which network protocol is used for sending and receiving email messages?

(a) HTTP

(b) SMTP

(c) DNS

(d) FTP

Answer

Option (b) SMTP

Q58: Which network security threat involves tricking users into downloading and executing malicious software?

(a) Hacking

(b) Phishing

(c) Ransomware

(d) Drive-by download

Answer

Option (d) Drive-by download

Q59: Which network protocol is used for securely transferring files between a local computer and a remote server using encryption?

(a) FTPS (FTP Secure)

(b) HTTP

(c) SMTP

(d) SNMP

Answer

Option (a) FTPS (FTP Secure)

Q60: What is a “security token” in the context of network security?

(a) A hardware device used for network routing

(b) A form of wireless encryption

(c) A small electronic device used for two-factor authentication

(d) A type of network protocol

Answer

Option (c) A small electronic device used for two-factor authentication

Q61: Which network protocol is used for retrieving emails from a mail server to a local client while keeping the emails on the server?

(a) IMAP (Internet Message Access Protocol)

(b) POP3 (Post Office Protocol version 3)

(c) SMTP

(d) FTP

Answer

Option (a) IMAP (Internet Message Access Protocol)

Q62: Which network security threat involves altering or replacing legitimate website content to deceive users?

(a) Hacking

(b) Phishing

(c) Spoofing

(d) Defacement

Answer

Option (d) Defacement

Q63: Which network protocol is used for secure login to a remote server over an encrypted connection?

(a) HTTP

(b) HTTPS

(c) FTP

(d) SMTP

Answer

Option (b) HTTPS

Q64: Which network security measure involves monitoring and controlling the data flow between networks to prevent unauthorized access?

(a) NAT (Network Address Translation)

(b) Packet filtering

(c) Access control

(d) VLAN (Virtual Local Area Network)

Answer

Option (b) Packet filtering

Q65: Which network protocol is used for resolving domain names to IP addresses?

(a) SMTP

(b) SNMP (Simple Network Management Protocol)

(c) DNS

(d) HTTP

Answer
”Answer”Text
[/expand]

Q66: Which network security measure involves monitoring and recording user activities on a network?

(a) VPN (Virtual Private Network)

(b) Firewall

(c) Audit logging

(d) Encryption

Answer
Option (c) Audit logging

Q67: Which network protocol is used for transferring files between computers over the internet, often used for uploading website content?

(a) SSH (Secure Shell)

(b) HTTP

(c) FTP

(d) DNS

Answer

Option (c) FTP

Q68: Which network protocol is used for securely transmitting web content, indicated by “https://” in the URL?

(a) HTTP

(b) HTTPS

(c) FTP

(d) SMTP

Answer

Option (b) HTTPS

Q69: Which network security measure involves restricting access to certain websites or online services?

(a) Encryption

(b) Firewall

(c) Content filtering

(d) NAT (Network Address Translation)

Answer

Option (c) Content filtering

Q70: Which network protocol is used for securely transferring files between a local computer and a remote server, often used for backups?

(a) HTTPS

(b) SMTP

(c) FTPS (FTP Secure)

(d) SNMP

Answer

Option (c) FTPS (FTP Secure)

Q71: Which network protocol is used for remote management of network devices and monitoring their status?

(a) DNS

(b) SNMP (Simple Network Management Protocol)

(c) FTP

(d) SSH (Secure Shell)

Answer

Option (b) SNMP (Simple Network Management Protocol)

Q72: Which network security measure involves using hardware and software to inspect and filter network traffic for potential threats?

(a) Encryption

(b) Firewall

(c) NAT (Network Address Translation)

(d) Access control

Answer

Option (b) Firewall

Q73: Which network protocol is used for remotely accessing and managing network devices, often used for command-line interface management?

(a) HTTPS

(b) FTP

(c) SSH (Secure Shell)

(d) DNS

Answer

Option (c) SSH (Secure Shell)

Q74: Which network security threat involves malicious software that blocks access to a system or data until a ransom is paid?

(a) Virus

(b) Worm

(c) Ransomware

(d) Trojan

Answer

Option (c) Ransomware

Q75: Which network protocol is used for securely transferring hypertext documents over the internet?

(a) FTP

(b) HTTP

(c) SNMP (Simple Network Management Protocol)

(d) SMTP

Answer

Option (b) HTTP

Q76: Which network protocol is used for securely transferring files between a local computer and a remote server using encryption, often used for automated backups?

(a) SSH (Secure Shell)

(b) HTTPS

(c) FTPS (FTP Secure)

(d) SNMP (Simple Network Management Protocol)

Answer

Option (c) FTPS (FTP Secure)

Q77: Which network security threat involves sending unsolicited emails with malicious intent, often containing links to malware or phishing sites?

(a) Eavesdropping

(b) Phishing

(c) Spam

(d) Hacking

Answer

Option (c) Spam

Q78: Which network security measure involves using hardware and software to detect and prevent unauthorized access and attacks on a network?

(a) Firewall

(b) VPN (Virtual Private Network)

(c) Packet filtering

(d) VLAN (Virtual Local Area Network)

Answer

Option (a) Firewall

Q79: What is “phishing” in the context of network security?

(a) Intercepting wireless signals

(b) A type of firewall

(c) Spreading malicious software through emails

(d) Creating secure passwords

Answer

Option (c) Spreading malicious software through emails

Q80: Which network protocol is used for securely transmitting data between a web browser and a web server?

(a) HTTP

(b) HTTPS

(c) FTP

(d) SMTP

Answer

Option (b) HTTPS

Q81: Which network security measure involves hiding internal IP addresses from external networks?

(a) Encryption

(b) NAT (Network Address Translation)

(c) VLAN (Virtual Local Area Network)

(d) VPN (Virtual Private Network)

Answer

Option (b) NAT (Network Address Translation)

Q82: Which network protocol is used for transferring files between a local computer and a remote server?

(a) HTTPS

(b) FTP

(c) SMTP

(d) SNMP (Simple Network Management Protocol)

Answer

Option (b) FTP

Q83: Which network protocol is used for translating domain names into IP addresses and vice versa?

(a) DHCP (Dynamic Host Configuration Protocol)

(b) DNS (Domain Name System)

(c) FTP (File Transfer Protocol)

(d) HTTP (Hypertext Transfer Protocol)

Answer

Option (b) DNS (Domain Name System)

Q84: Which network protocol is used for remotely managing and monitoring network devices, often used for routers and switches?

(a) DNS (Domain Name System)

(b) FTP (File Transfer Protocol)

(c) SNMP (Simple Network Management Protocol)

(d) SMTP (Simple Mail Transfer Protocol)

Answer

Option (c) SNMP (Simple Network Management Protocol)

Q85: Which network security threat involves malicious software that replicates and spreads over a network, often using vulnerabilities?

(a) Virus

(b) Worm

(c) Trojan

(d) Phishing

Answer

Option (b) Worm

Q86: Which network protocol is used for securely transferring files between computers, often used for uploading website content?

(a) HTTP (Hypertext Transfer Protocol)

(b) FTP (File Transfer Protocol)

(c) SMTP (Simple Mail Transfer Protocol)

(d) SNMP (Simple Network Management Protocol)

Answer

Option (b) FTP (File Transfer Protocol)

Q87: What does “LAN” stand for in the context of networking?

(a) Local Area Network

(b) Long Area Network

(c) Large Area Network

(d) Linked Area Network

Answer

Option (a) Local Area Network

Q88: Which networking device connects multiple networks together and routes data between them?

(a) Hub

(b) Modem

(c) Router

(d) Switch

Answer

Option (c) Router

Q89: What is “phishing” in the context of network and information security?

(a) A type of malware that self-replicates

(b) A method of stealing sensitive information by posing as a legitimate entity

(c) A hardware device used to amplify network signals

(d) A type of computer worm

Answer

Option (b) A method of stealing sensitive information by posing as a legitimate entity

Q90: What is a “DMZ” (Demilitarized Zone) in the context of network security?

(a) A type of firewall

(b) A secure area where critical network resources are located

(c) A public wireless hotspot

(d) An area with no network connectivity

Answer

Option (b) A secure area where critical network resources are located

Q91: Which networking protocol ensures secure and encrypted data transmission over the internet?

(a) HTTP

(b) FTP

(c) SSL/TLS

(d) SMTP

Answer

Option (c) SSL/TLS

Q92: Which network security measure involves using a list of authorized users to control access to resources?

(a) Encryption

(b) VLAN (Virtual Local Area Network)

(c) Access control list (ACL)

(d) Firewall

Answer

Option (c) Access control list (ACL)

Q93: Which network protocol is used for secure web browsing and is indicated by “https://” in the URL?

(a) HTTP

(b) FTP

(c) SMTP

(d) SSL/TLS

Answer

Option (d) SSL/TLS

Q94: Which networking device operates at the Presentation Layer of the OSI model and translates data between different formats or encodings?

(a) Hub

(b) Switch

(c) Router

(d) Gateway

Answer

Option (d) Gateway

Q95: Which network security threat involves exploiting a software vulnerability to gain unauthorized access to a system or network?

(a) Virus

(b) Phishing

(c) Hacking

(d) Eavesdropping

Answer

Option (c) Hacking

Q96: Which network protocol is used for sending and receiving emails, often used for retrieving messages from a mail server to a local client?

(a) SMTP

(b) IMAP (Internet Message Access Protocol)

(c) FTP

(d) SNMP (Simple Network Management Protocol)

Answer

Option (b) IMAP (Internet Message Access Protocol)

Q97: Which networking device operates at the Network Layer of the OSI model and makes decisions about routing data between different networks?

(a) Hub

(b) Switch

(c) Router

(d) Modem

Answer

Option (c) Router

Q98: Which network security measure involves separating a network into smaller segments to reduce broadcast traffic and enhance security?

(a) VLAN (Virtual Local Area Network)

(b) Encryption

(c) Firewall

(d) Hub

Answer

Option (a) VLAN (Virtual Local Area Network)

Q99: Which network security threat involves exploiting vulnerabilities in software or hardware to gain unauthorized access or control of a system?

(a) Virus

(b) Exploit

(c) Phishing

(d) Worm

Answer

Option (b) Exploit

Q100: Which network security measure involves changing the original form of data to a non-readable format using a specific algorithm?

(a) Firewall

(b) NAT (Network Address Translation)

(c) Encryption

(d) VLAN (Virtual Local Area Network)

Answer

Option (c) Encryption

Download Free MCQ
Test Series
TopicMCQ
Computer Basic MCQ Set 1Computer BasicsClick Here
Computer Basic MCQ Set 2SoftwareClick Here
Computer Basic MCQ Set 3Working with Internet and e-mailsClick Here
Computer Basic MCQ Set 4Basics of networking and cyber securityClick Here
Computer Basic MCQ Set 5Keyboard shortcutsClick Here

Top 50 Networking and Cyber Security MCQ : Free MCQ and Answers || MCQ for Bank PO and IBPS Clerk 2023 Exam || MCQ for SSC CGL Mains Exam || All competitive exam

Leave a Comment