Cyber Security MCQ – 35 Questions with Answers

The following multiple-choice questions are just a Warm-up Questions for you which are as follows:

1. What is the default port number for Apache and most web servers?

A) 20
B) 27
C) 80
D) 87

2. What is the maximum character Linux supports in its filenames?

A) 8
B) 128
C) 256
D) Unlimited

3. A DNS translates a domain name into what?

A) Binary
B) Hex
C) IP
D) URL

4. Which of the following is not an example of Operating system?

A) Windows 98
B) BSD Unix
C) Microsoft Office XP
D) Red Hat Linux

5. What do you press to enter the current date in a cell?

A) CTRL + ; (Semicolon)
B) CTRL + Shift + : (Colon)
C) CTRL + F10
D) CTRL + F11

6. An Octal number 237 is equal to the binary number

A) 011 011 111
B) 010 111 011
C) 010 011 111
D) 011 000 001

7. Charles Babbage invented

A) ENIAC
B) Difference Engine
C) Electronic Computer
D) Punched Card

8. Which was the First Web browser?

A) Worldwideweb
B) Netscape Navigator
C) Internet Explorer
D) Safari

9. Which was the first ever web server software?

A) GWS
B) IIS 5.0
C) CERN httpd
D) nginx

10. Who is known as the Father of the Java Programming language?

A) Bill Board
B) James Gosling
C) Jame Smith
D) Sabeer Bhatia

11. Java is a?

A) Compiler
B) Operating System
C) Input Device
D) Programming Language

12. The way of manipulating data into information is called as?

A) Storing
B) Processing
C) Deletion
D) Organizing

13. What is CGI?

A) Computed Gateway Interface
B) Compliant Gateway Interface
C) Case Gateway Interface
D) Common Gateway Interface

14. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:

A) Robotics
B) Computer Forensics
C) Simulation
D) Forecasting

15. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:

A) Eight Bytes
B) Eight Kilobytes
C) Eight Characters
D) Eight Bits

16. What will be the output if you will compile and execute the following code?
#include
int main(){
register int i,x;
scanf(“%d”,&i);
x=++i + ++i + ++i;
printf(“%d”,x);
return 0;
}

A) 17
B) 18
C) 21
D) Compiler Error

17. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called?

A) Robotics
B) Simulation
C) Computer Forensics
D) Animation

18. What is the only function all C++ programs must contain?

A) Start ()
B) system ()
C) main ()
D) program ()

19. Which of the following is the boolean operator for logical-and?

A) &
B) &&
C) |
D) |&

20. What punctuation ends most lines of C++ code?

A) (Dot)
B) (semi-colon)
C) (colon)
D) (single quote)

21. A script is a

A) Program or sequence of instructions that is interpreted or carried out by processor directly
B) Program or sequence of instruction that is interpreted or carried out by another program
C) Program or sequence of instruction that is interpreted or carried out by web server only
D) None of above

22. Examine the following program and determine the output
#include
using namespace std;
int operate (int a, int b)
{
return (a * b);
}
float operate (float a, float b)
{
return (a/b);
}
int main()
{
int x=5, y=2;
float n=5.0, m=2.0;
cout << operate(x,y) <<“\t”;
cout << operate (n,m);
return 0;
}

A) 10.0 5.0
B) 5.0 2.5
C) 10.0 5
D) 10 2.5

23. The following piece of script will output:
<? $email=’admin@yeahhub.com’; $new=strstr($email, ‘@’ ; print $new; ?>

A) admin
B) admin@yeahhub
C) @yeahhub.com
D) Yeahhub.com

24. The memory address of the first element of an array is called

A) floor address
B) foundation address
C) first address
D) base address

25. Two dimensional arrays are also called

A) tables arrays
B) matrix arrays
C) both of above
D) none of above

26. How many steps are in the systems development life cycle (SDLC)?

A) 4
B) 5
C) 6
D) 10

27. A protocol is a set of rules governing a time sequence of events that must take place

A) between peers
B) between an interface
C) between modems
D) across an interface

28. In OSI network architecture, the dialogue control and token management are responsibility of

A) session layer
B) network layer
C) transport layer
D) data link layer
E) none of above

29. Which of the following signal is not standard RS-232-C signal?

A) VDR
B) RTS
C) CTS
D) DSR

30. Microprocessor 8085 can address location upto

A) 32K
B) 128K
C) 64K
D) 1M

31. The main purpose of data protection act is to

A) Protect personal privacy
B) Prevent Viruses
C) Increase the security of computer systems
D) Reduce Project Failures

32. Which of the following is false for switch statement in C++?

A) It uses labels instead of blocks
B) We need to put break statement at the end of the group of statement of a condition
C) We can put range for case such as case 1..3
D) None of above

33. To increase the value of c by one which of the following statement is wrong?

A) c++;
B) c = c + 1;
C) c + 1 => c;
D) c += 1

34. When following piece of code is executed, what happens?
b = 3;
a = b++;

A) a contains 3 and b contains 4
B) a contains 4 and b contains 4
C) a contains 4 and b contains 3
D) a contains 3 and b contains 3

35. Consider the following two pieces of codes and choose the best answer
Code 1:
switch (x) {
case 1:
cout <<”x is 1”;
break;
case 2:
cout <<”x is 2”;
break;
default:
cout <<”value of x unknown”;
}
Code 2:
If (x==1){
Cout <<”x is 1”;
}
Else if (x==2){
Cout << “x is 2”;
}
Else{
Cout <<”value of x unknown”;
}

A) Both of the above code fragments have the same behaviour
B) Both of the above code fragments produce different effects
C) The first code produces more results than second
D) The second code produces more results than first.

Read More: 40 Cyber Security MCQ with Answers and Explanations | 50 questions you need to know about Professional Penetration Testing | FAQ

You may also like:

Sarcastic Writer

Step by step hacking tutorials about wireless cracking, kali linux, metasploit, ethical hacking, seo tips and tricks, malware analysis and scanning.

Related Posts

This Post Has One Comment

Comments are closed.