MCQs on Networking and Cyber Security
MCQ on “Basics of networking and cyber security: networking devices and protocols, network and information security threats (like hacking, virus, worms, Trojan etc.) and prevention measures.” with answers || MCQ for Bank PO and IBPS Clerk 2023 Exam || MCQ for SSC CGL Mains Exam || All competitive exam
Q1: Which network security measure involves converting readable data into an unreadable format to prevent unauthorized access?
(a) Packet filtering
(b) Access control
(c) Encryption
(d) Firewall
”Answer”Q2: What is “antivirus software” used for in the context of cybersecurity?
(a) Encrypting data for secure transmission
(b) Protecting against malware and viruses
(c) Filtering unwanted emails
(d) Monitoring network traffic
”Answer”Option (b) Protecting against malware and viruses
Q3: Which network security measure involves encrypting data transmissions to ensure confidentiality?
(a) Firewall
(b) NAT (Network Address Translation)
(c) VPN (Virtual Private Network)
(d) VLAN (Virtual Local Area Network)
”Answer”Option (c) VPN (Virtual Private Network)
Q4: Which networking device operates at the Data Link Layer of the OSI model and forwards data based on MAC addresses?
(a) Router
(b) Hub
(c) Switch
(d) Modem
”Answer”Option (c) Switch
Q5: Which networking protocol is commonly used for sending and receiving emails?
(a) FTP
(b) HTTP
(c) SMTP
(d) DHCP
”Answer”Option (c) SMTP
Q6: Which network security threat involves unauthorized access to computer systems with malicious intent?
(a) Virus
(b) Worm
(c) Trojan
(d) Hacking
”Answer”Option (d) Hacking
Q7: Which protocol is used for assigning IP addresses to devices on a network automatically?
(a) DNS
(b) DHCP
(c) SSL/TLS
(d) FTP
”Answer”Option (b) DHCP
Q8: What is a “worm” in the context of Cyber Security?
(a) A type of computer virus
(b) A hardware component that boosts network performance
(c) A type of denial-of-service attack
(d) A self-replicating malicious program that spreads over networks
”Answer”Option (d) A self-replicating malicious program that spreads over networks
Q9: Which network security threat involves deceptive software that appears to be legitimate but performs malicious actions?
(a) Virus
(b) Worm
(c) Trojan
(d) Hacking
”Answer”Option (c) Trojan
Q10: Which networking protocol is used for translating human-readable domain names into IP addresses?
(a) DNS
(b) DHCP
(c) FTP
(d) SMTP
”Answer”Option (a) DNS
Q11: Which networking device connects multiple computers in a star topology and broadcasts data to all connected devices?
(a) Hub
(b) Switch
(c) Router
(d) Modem
”Answer”Option (a) Hub
Q12: Which network security threat involves overwhelming a system or network with a flood of incoming traffic?
(a) Hacking
(b) Virus
(c) Worm
(d) Denial-of-Service (DoS) attack
”Answer”Option (d) Denial-of-Service (DoS) attack
Q13: What is “encryption” in the context of Cyber Security?
(a) The process of connecting multiple networks
(b) A method of protecting data by converting it into a code
(c) A type of hardware device used in network routing
(d) A form of network attack
”Answer”Option (b) A method of protecting data by converting it into a code
Q14: What is a “packet” in the context of networking?
(a) A hardware device for connecting to the internet
(b) A form of wireless encryption
(c) A small unit of data transmitted over a network
(d) A type of antivirus software
”Answer”Option (c) A small unit of data transmitted over a network
Q15: Which network security threat involves malicious software that locks users out of their own systems or data until a ransom is paid?
(a) Phishing
(b) Ransomware
(c) Spyware
(d) Malware
”Answer”Option (b) Ransomware
Q16: Which networking device operates at the Physical Layer of the OSI model and connects devices within the same network segment?
(a) Hub
(b) Router
(c) Switch
(d) Modem
”Answer”Option (a) Hub
Q17: What does “WPA” stand for in the context of wireless network security?
(a) Wireless Protocol Association
(b) Wi-Fi Protected Access
(c) Web Page Authentication
(d) Wireless Privacy Algorithm
”Answer”Option (b) Wi-Fi Protected Access
Q18: Which network security threat involves intercepting and capturing data as it travels between two parties?
(a) Spoofing
(b) Eavesdropping
(c) Hacking
(d) Phishing
”Answer”Option (b) Eavesdropping
Q19: Which network protocol is used for secure remote access to a network, often used for accessing work networks from home?
(a) SMTP
(b) FTP
(c) SSL/TLS
(d) VPN (Virtual Private Network)
”Answer”Option (d) VPN (Virtual Private Network)
Q20: What is “spyware” in the context of Cyber Security?
(a) A type of computer virus
(b) Malicious software that tracks user activities without consent
(c) A hardware device used for network monitoring
(d) A type of network protocol
”Answer”Option (b) Malicious software that tracks user activities without consent
Q21: Which network security threat involves creating a fake copy of a legitimate website to deceive users?
(a) Hacking
(b) Spoofing
(c) Phishing
(d) Worm
”Answer”Option (c) Phishing
Q22: What is the purpose of a “proxy server” in the context of networking?
(a) Blocking all network traffic
(b) Encrypting data packets
(c) Speeding up internet connections
(d) Acting as an intermediary between a user and the internet
”Answer”Option (d) Acting as an intermediary between a user and the internet
Q23: Which network protocol is used for transferring files between a local computer and a remote server?
(a) DNS
(b) DHCP
(c) FTP
(d) SMTP
”Answer”Option (c) FTP
Q24: What is “social engineering” in the context of Cyber Security?
(a) A type of encryption technique
(b) The practice of securing social media accounts
(c) Manipulating people into revealing confidential information or performing actions
(d) Developing secure networks
”Answer”Option (c) Manipulating people into revealing confidential information or performing actions
Q25: Which network security threat involves sending a large volume of email traffic to overwhelm a recipient’s inbox?
(a) Malware
(b) Phishing
(c) Spam
(d) Eavesdropping
”Answer”Option (c) Spam
Q26: Which network protocol is used for converting IP addresses to MAC addresses on a local network?
(a) DNS
(b) ARP
(c) HTTP
(d) SMTP
”Answer”Option (b) ARP
Q27: What is a “pharming” attack in the context of network security?
(a) Intercepting wireless signals
(b) Redirecting users to a fake website without their knowledge
(c) Sending malicious emails
(d) Cracking encrypted passwords
”Answer”Option (b) Redirecting users to a fake website without their knowledge
Q28: Which network security threat involves capturing and analyzing network traffic to obtain sensitive information?
(a) Sniffing
(b) Spoofing
(c) Ransomware
(d) Eavesdropping
”Answer”Option (a) Sniffing
Q29: What is “data encryption” used for in the context of network security?
(a) Blocking network traffic
(b) Monitoring network activities
(c) Protecting data by converting it into a secure code
(d) Sending bulk emails
”Answer”Option (c) Protecting data by converting it into a secure code
Q30: Which network protocol is used for secure remote login to a server over an encrypted channel?
(a) HTTP
(b) SSH (Secure Shell)
(c) FTP
(d) SNMP (Simple Network Management Protocol)
”Answer”Option (b) SSH (Secure Shell)
Q31: Which network security threat involves making a network or website unavailable by overwhelming it with traffic from multiple sources?
(a) Phishing
(b) Spam
(c) Denial-of-Service (DoS) attack
(d) Worm
”Answer”Option (c) Denial-of-Service (DoS) attack
Q32: Which network security measure involves hiding internal IP addresses from external networks?
(a) Encryption
(b) NAT (Network Address Translation)
(c) VLAN (Virtual Local Area Network)
(d) VPN (Virtual Private Network)
”Answer”Option (b) NAT (Network Address Translation)
Q33: Which network security threat involves unauthorized access to sensitive information by intercepting wireless signals?
(a) Hacking
(b) Eavesdropping
(c) Ransomware
(d) Phishing
”Answer”Option (b) Eavesdropping
Q34: What does “SSID” stand for in the context of wireless networks?
(a) Secure Server Identification
(b) Service Set Identifier
(c) System Security Identification
(d) Shared Server Indicator
”Answer”Option (b) Service Set Identifier
Q35: Which network protocol is used for secure transfer of files over a network, often used for downloading software updates?
(a) HTTP
(b) FTP
(c) SSH
(d) SMTP
”Answer”Option (b) FTP
Q36: What is a “data breach” in the context of network security?
(a) A sudden loss of network connectivity
(b) Unauthorized access to confidential information
(c) A type of denial-of-service attack
(d) A method of encrypting data
”Answer”Option (b) Unauthorized access to confidential information
Q37: Which network security threat involves disguising malicious software as a legitimate application?
(a) Virus
(b) Worm
(c) Trojan
(d) Hacking
”Answer”Option (c) Trojan
Q38: Which network protocol is used for converting domain names into IP addresses and vice versa?
(a) DHCP
(b) DNS
(c) ARP
(d) SMTP
”Answer”Option (b) DNS
Q39: What is “data backup” used for in the context of network security?
(a) Intercepting network traffic
(b) Storing copies of important data to prevent loss
(c) Preventing unauthorized access
(d) Blocking spam emails
”Answer”Q40: Which network security measure involves creating a secure connection between a user’s device and a network?
(a) Firewall
(b) Encryption
(c) Antivirus software
(d) Router
”Answer”Option (b) Encryption
Q41: What is a “bot” in the context of Cyber Security?
(a) A type of hardware device
(b) A type of email attachment
(c) A self-replicating malicious program
(d) A compromised computer controlled by a cybercriminal
”Answer”Option (d) A compromised computer controlled by a cybercriminal
Q42: Which network security threat involves impersonating a legitimate entity to gain unauthorized access or deceive users?
(a) Spoofing
(b) Phishing
(c) Ransomware
(d) Spamming
”Answer”Option (a) Spoofing
Q43: Which network protocol is used for remotely managing and monitoring network devices?
(a) DNS
(b) FTP
(c) SNMP
(d) SMTP
”Answer”Option (c) SNMP
Q44: Which network security threat involves a malicious program that self-replicates and spreads across networks without human intervention?
(a) Virus
(b) Worm
(c) Trojan
(d) Spyware
”Answer”Option (b) Worm
Q45: Which network protocol is used for remotely accessing and managing servers and network devices using a command-line interface?
(a) HTTP
(b) SSH
(c) FTP
(d) SMTP
”Answer”Option (b) SSH
Q46: Which networking device operates at the Session Layer of the OSI model and provides network services like authentication and authorization?
(a) Hub
(b) Router
(c) Switch
(d) Proxy server
”Answer”Option (d) Proxy server
Q47: Which network security measure involves monitoring network traffic for suspicious or unauthorized activity?
(a) Encryption
(b) Firewall
(c) Router
(d) Hub
”Answer”Option (b) Firewall
Q48: Which network protocol is used for securely transferring files over the internet, often used for downloading software updates?
(a) HTTP
(b) FTPS (FTP Secure)
(c) Telnet
(d) SNMP
”Answer”Option (b) FTPS (FTP Secure)
Q49: Which network security threat involves redirecting network traffic to a malicious server without the user’s knowledge?
(a) Hacking
(b) Spoofing
(c) Eavesdropping
(d) Phishing
”Answer”Option (b) Spoofing
Q50: What is “patch management” in the context of network security?
(a) Securing physical access to network devices
(b) Encrypting data transmissions
(c) Updating software and systems to fix security vulnerabilities
(d) Monitoring network traffic
”Answer”Option (c) Updating software and systems to fix security vulnerabilities
Q51: Which network security threat involves malicious software that captures sensitive data such as login credentials?
(a) Ransomware
(b) Spyware
(c) Trojan
(d) Worm
”Answer”Option (b) Spyware
Q52: Which network protocol is used for remotely managing and configuring network devices, often used for routers and switches?
(a) DNS
(b) FTP
(c) SNMP (Simple Network Management Protocol)
(d) SMTP
”Answer”Option (c) SNMP (Simple Network Management Protocol)
Q53: Which network security threat involves a targeted attack where an attacker gains access to a system by exploiting a known vulnerability?
(a) Virus
(b) Worm
(c) Zero-day exploit
(d) Hacking
”Answer”Option (c) Zero-day exploit
Q54: What is “intrusion detection” used for in the context of network security?
(a) Analyzing network traffic for sensitive data
(b) Monitoring user activities on social media
(c) Detecting and responding to unauthorized access or suspicious activities
(d) Encrypting data transmissions
”Answer”Option (c) Detecting and responding to unauthorized access or suspicious activities
Q55: Which network protocol is used for remote file access and management over a secure connection?
(a) SSH (Secure Shell)
(b) SMTP
(c) SNMP (Simple Network Management Protocol)
(d) DNS
”Answer”Option (a) SSH (Secure Shell)
Q56: What is “incident response” used for in the context of network security?
(a) Blocking network traffic
(b) Preventing unauthorized access to network devices
(c) Developing encryption algorithms
(d) Managing and mitigating the aftermath of a security breach
”Answer”Option (d) Managing and mitigating the aftermath of a security breach
Q57: Which network protocol is used for sending and receiving email messages?
(a) HTTP
(b) SMTP
(c) DNS
(d) FTP
”Answer”Option (b) SMTP
Q58: Which network security threat involves tricking users into downloading and executing malicious software?
(a) Hacking
(b) Phishing
(c) Ransomware
(d) Drive-by download
”Answer”Option (d) Drive-by download
Q59: Which network protocol is used for securely transferring files between a local computer and a remote server using encryption?
(a) FTPS (FTP Secure)
(b) HTTP
(c) SMTP
(d) SNMP
”Answer”Option (a) FTPS (FTP Secure)
Q60: What is a “security token” in the context of network security?
(a) A hardware device used for network routing
(b) A form of wireless encryption
(c) A small electronic device used for two-factor authentication
(d) A type of network protocol
”Answer”Option (c) A small electronic device used for two-factor authentication
Q61: Which network protocol is used for retrieving emails from a mail server to a local client while keeping the emails on the server?
(a) IMAP (Internet Message Access Protocol)
(b) POP3 (Post Office Protocol version 3)
(c) SMTP
(d) FTP
”Answer”Option (a) IMAP (Internet Message Access Protocol)
Q62: Which network security threat involves altering or replacing legitimate website content to deceive users?
(a) Hacking
(b) Phishing
(c) Spoofing
(d) Defacement
”Answer”Option (d) Defacement
Q63: Which network protocol is used for secure login to a remote server over an encrypted connection?
(a) HTTP
(b) HTTPS
(c) FTP
(d) SMTP
”Answer”Option (b) HTTPS
Q64: Which network security measure involves monitoring and controlling the data flow between networks to prevent unauthorized access?
(a) NAT (Network Address Translation)
(b) Packet filtering
(c) Access control
(d) VLAN (Virtual Local Area Network)
”Answer”Option (b) Packet filtering
Q65: Which network protocol is used for resolving domain names to IP addresses?
(a) SMTP
(b) SNMP (Simple Network Management Protocol)
(c) DNS
(d) HTTP
”Answer”Q66: Which network security measure involves monitoring and recording user activities on a network?
(a) VPN (Virtual Private Network)
(b) Firewall
(c) Audit logging
(d) Encryption
”Answer”Q67: Which network protocol is used for transferring files between computers over the internet, often used for uploading website content?
(a) SSH (Secure Shell)
(b) HTTP
(c) FTP
(d) DNS
”Answer”Option (c) FTP
Q68: Which network protocol is used for securely transmitting web content, indicated by “https://” in the URL?
(a) HTTP
(b) HTTPS
(c) FTP
(d) SMTP
”Answer”Option (b) HTTPS
Q69: Which network security measure involves restricting access to certain websites or online services?
(a) Encryption
(b) Firewall
(c) Content filtering
(d) NAT (Network Address Translation)
”Answer”Option (c) Content filtering
Q70: Which network protocol is used for securely transferring files between a local computer and a remote server, often used for backups?
(a) HTTPS
(b) SMTP
(c) FTPS (FTP Secure)
(d) SNMP
”Answer”Option (c) FTPS (FTP Secure)
Q71: Which network protocol is used for remote management of network devices and monitoring their status?
(a) DNS
(b) SNMP (Simple Network Management Protocol)
(c) FTP
(d) SSH (Secure Shell)
”Answer”Option (b) SNMP (Simple Network Management Protocol)
Q72: Which network security measure involves using hardware and software to inspect and filter network traffic for potential threats?
(a) Encryption
(b) Firewall
(c) NAT (Network Address Translation)
(d) Access control
”Answer”Option (b) Firewall
Q73: Which network protocol is used for remotely accessing and managing network devices, often used for command-line interface management?
(a) HTTPS
(b) FTP
(c) SSH (Secure Shell)
(d) DNS
”Answer”Option (c) SSH (Secure Shell)
Q74: Which network security threat involves malicious software that blocks access to a system or data until a ransom is paid?
(a) Virus
(b) Worm
(c) Ransomware
(d) Trojan
”Answer”Option (c) Ransomware
Q75: Which network protocol is used for securely transferring hypertext documents over the internet?
(a) FTP
(b) HTTP
(c) SNMP (Simple Network Management Protocol)
(d) SMTP
”Answer”Option (b) HTTP
Q76: Which network protocol is used for securely transferring files between a local computer and a remote server using encryption, often used for automated backups?
(a) SSH (Secure Shell)
(b) HTTPS
(c) FTPS (FTP Secure)
(d) SNMP (Simple Network Management Protocol)
”Answer”Option (c) FTPS (FTP Secure)
Q77: Which network security threat involves sending unsolicited emails with malicious intent, often containing links to malware or phishing sites?
(a) Eavesdropping
(b) Phishing
(c) Spam
(d) Hacking
”Answer”Option (c) Spam
Q78: Which network security measure involves using hardware and software to detect and prevent unauthorized access and attacks on a network?
(a) Firewall
(b) VPN (Virtual Private Network)
(c) Packet filtering
(d) VLAN (Virtual Local Area Network)
”Answer”Option (a) Firewall
Q79: What is “phishing” in the context of network security?
(a) Intercepting wireless signals
(b) A type of firewall
(c) Spreading malicious software through emails
(d) Creating secure passwords
”Answer”Option (c) Spreading malicious software through emails
Q80: Which network protocol is used for securely transmitting data between a web browser and a web server?
(a) HTTP
(b) HTTPS
(c) FTP
(d) SMTP
”Answer”Option (b) HTTPS
Q81: Which network security measure involves hiding internal IP addresses from external networks?
(a) Encryption
(b) NAT (Network Address Translation)
(c) VLAN (Virtual Local Area Network)
(d) VPN (Virtual Private Network)
”Answer”Option (b) NAT (Network Address Translation)
Q82: Which network protocol is used for transferring files between a local computer and a remote server?
(a) HTTPS
(b) FTP
(c) SMTP
(d) SNMP (Simple Network Management Protocol)
”Answer”Option (b) FTP
Q83: Which network protocol is used for translating domain names into IP addresses and vice versa?
(a) DHCP (Dynamic Host Configuration Protocol)
(b) DNS (Domain Name System)
(c) FTP (File Transfer Protocol)
(d) HTTP (Hypertext Transfer Protocol)
”Answer”Option (b) DNS (Domain Name System)
Q84: Which network protocol is used for remotely managing and monitoring network devices, often used for routers and switches?
(a) DNS (Domain Name System)
(b) FTP (File Transfer Protocol)
(c) SNMP (Simple Network Management Protocol)
(d) SMTP (Simple Mail Transfer Protocol)
”Answer”Option (c) SNMP (Simple Network Management Protocol)
Q85: Which network security threat involves malicious software that replicates and spreads over a network, often using vulnerabilities?
(a) Virus
(b) Worm
(c) Trojan
(d) Phishing
”Answer”Option (b) Worm
Q86: Which network protocol is used for securely transferring files between computers, often used for uploading website content?
(a) HTTP (Hypertext Transfer Protocol)
(b) FTP (File Transfer Protocol)
(c) SMTP (Simple Mail Transfer Protocol)
(d) SNMP (Simple Network Management Protocol)
”Answer”Option (b) FTP (File Transfer Protocol)
Q87: What does “LAN” stand for in the context of networking?
(a) Local Area Network
(b) Long Area Network
(c) Large Area Network
(d) Linked Area Network
”Answer”Option (a) Local Area Network
Q88: Which networking device connects multiple networks together and routes data between them?
(a) Hub
(b) Modem
(c) Router
(d) Switch
”Answer”Option (c) Router
Q89: What is “phishing” in the context of network and information security?
(a) A type of malware that self-replicates
(b) A method of stealing sensitive information by posing as a legitimate entity
(c) A hardware device used to amplify network signals
(d) A type of computer worm
”Answer”Option (b) A method of stealing sensitive information by posing as a legitimate entity
Q90: What is a “DMZ” (Demilitarized Zone) in the context of network security?
(a) A type of firewall
(b) A secure area where critical network resources are located
(c) A public wireless hotspot
(d) An area with no network connectivity
”Answer”Option (b) A secure area where critical network resources are located
Q91: Which networking protocol ensures secure and encrypted data transmission over the internet?
(a) HTTP
(b) FTP
(c) SSL/TLS
(d) SMTP
”Answer”Option (c) SSL/TLS
Q92: Which network security measure involves using a list of authorized users to control access to resources?
(a) Encryption
(b) VLAN (Virtual Local Area Network)
(c) Access control list (ACL)
(d) Firewall
”Answer”Option (c) Access control list (ACL)
Q93: Which network protocol is used for secure web browsing and is indicated by “https://” in the URL?
(a) HTTP
(b) FTP
(c) SMTP
(d) SSL/TLS
”Answer”Option (d) SSL/TLS
Q94: Which networking device operates at the Presentation Layer of the OSI model and translates data between different formats or encodings?
(a) Hub
(b) Switch
(c) Router
(d) Gateway
”Answer”Option (d) Gateway
Q95: Which network security threat involves exploiting a software vulnerability to gain unauthorized access to a system or network?
(a) Virus
(b) Phishing
(c) Hacking
(d) Eavesdropping
”Answer”Option (c) Hacking
Q96: Which network protocol is used for sending and receiving emails, often used for retrieving messages from a mail server to a local client?
(a) SMTP
(b) IMAP (Internet Message Access Protocol)
(c) FTP
(d) SNMP (Simple Network Management Protocol)
”Answer”Option (b) IMAP (Internet Message Access Protocol)
Q97: Which networking device operates at the Network Layer of the OSI model and makes decisions about routing data between different networks?
(a) Hub
(b) Switch
(c) Router
(d) Modem
”Answer”Option (c) Router
Q98: Which network security measure involves separating a network into smaller segments to reduce broadcast traffic and enhance security?
(a) VLAN (Virtual Local Area Network)
(b) Encryption
(c) Firewall
(d) Hub
”Answer”Option (a) VLAN (Virtual Local Area Network)
Q99: Which network security threat involves exploiting vulnerabilities in software or hardware to gain unauthorized access or control of a system?
(a) Virus
(b) Exploit
(c) Phishing
(d) Worm
”Answer”Option (b) Exploit
Q100: Which network security measure involves changing the original form of data to a non-readable format using a specific algorithm?
(a) Firewall
(b) NAT (Network Address Translation)
(c) Encryption
(d) VLAN (Virtual Local Area Network)
”Answer”Option (c) Encryption
Download Free MCQ Test Series | Topic | MCQ |
Computer Basic MCQ Set 1 | Computer Basics | Click Here |
Computer Basic MCQ Set 2 | Software | Click Here |
Computer Basic MCQ Set 3 | Working with Internet and e-mails | Click Here |
Computer Basic MCQ Set 4 | Basics of networking and cyber security | Click Here |
Computer Basic MCQ Set 5 | Keyboard shortcuts | Click Here |
Top 50 Networking and Cyber Security MCQ : Free MCQ and Answers || MCQ for Bank PO and IBPS Clerk 2023 Exam || MCQ for SSC CGL Mains Exam || All competitive exam