Cyber Security Multiple Choice Questions and Answers in Tanzania

Cyber Security Multiple Choice Questions and Answers


Are you preparing for a cyber security interview, aptitude test, or practical examination in Tanzania? These Cyber Security Multiple Choice Questions and Answers will help you improve your knowledge and prepare effectively for exams and job interviews.

The questions below cover cyber attacks, phishing, malware, encryption, ethical hacking, network security, and other important cyber security concepts.

Cyber Security Multiple Choice Questions and Answers

1. What is Cyber Security?

a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned

Answer: d

Explanation: Cyber Security protects systems and networks from cyber attacks using technologies and processes.


2. What does cyber security protect?

a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned

Answer: b

Explanation: Cyber security protects hardware, software, and data connected to the internet from attacks and unauthorized access.


3. Who is the father of computer security?

a) August Kerckhoffs
b) Bob Thomas
c) Robert
d) Charles

Answer: a

Explanation: August Kerckhoffs is considered the father of computer security because of his contributions to cryptography.


4. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?

a) Cyber attack
b) Computer security
c) Cryptography
d) Digital hacking

Answer: a

Explanation: A cyber attack attempts to damage, steal, or gain unauthorized access to systems and information.


5. Which of the following is a type of cyber security?

a) Cloud Security
b) Network Security
c) Application Security
d) All of the above

Answer: d

Explanation: Cloud, network, and application security are all major types of cyber security.


6. What are the features of cyber security?

a) Compliance
b) Defense against internal threats
c) Threat Prevention
d) All of the above

Answer: d

Explanation: Cyber security focuses on compliance, internal defense, and preventing cyber threats.


7. Which of the following is an objective of network security?

a) Confidentiality
b) Integrity
c) Availability
d) All of the above

Answer: d

Explanation: Confidentiality, integrity, and availability form the CIA triad of network security.


8. Which of the following is not a cybercrime?

a) Denial of Service
b) Man in the Middle
c) Malware
d) AES

Answer: d

Explanation: AES is an encryption standard used to secure information, not a cybercrime.


9. Which of the following is a component of cyber security?

a) Internet Of Things
b) AI
c) Database
d) Attacks

Answer: a

Explanation: IoT devices are part of cyber security because they require protection from cyber threats.


10. Which of the following is a type of cyber attack?

a) Phishing
b) SQL Injections
c) Password Attack
d) All of the above

Answer: d

Explanation: Phishing, SQL injection, and password attacks are common cyber attack methods.


11. Which of the following is not an advantage of cyber security?

a) Makes the system slower
b) Minimizes computer freezing and crashes
c) Gives privacy to users
d) Protects system against viruses

Answer: a

Explanation: Security tools can sometimes slow down systems, making it a disadvantage.


12. “Cyberspace” was coined by _________

a) Richard Stallman
b) William Gibson
c) Andrew Tannenbaum
d) Scott Fahlman

Answer: b

Explanation: William Gibson introduced the term cyberspace in his science fiction works.


13. In which year did hacking become a practical crime and a matter of concern in cyber technology?

a) 1991
b) 1983
c) 1970
d) 1964

Answer: c

Explanation: Hacking became a growing issue during the 1970s as technology advanced.


14. Governments hired highly skilled hackers for cyber security purposes. These hackers are called _______

a) Nation / State sponsored hackers
b) CIA triad
c) Special Hackers
d) Government Hackers

Answer: a

Explanation: State-sponsored hackers work for governments to protect national cyber infrastructure.


15. Which of the following act violates cyber security?

a) Exploit
b) Attack
c) Threat
d) Vulnerability

Answer: b

Explanation: Cyber attacks violate cyber security by targeting systems and networks.


16. Which of the following actions compromise cyber security?

a) Vulnerability
b) Attack
c) Threat
d) Exploit

Answer: c

Explanation: Threats are potential dangers that can compromise cyber security.


17. Which hacking approach involves fake websites designed to trick users?

a) Pharming
b) Website-Duplication
c) Mimicking
d) Spamming

Answer: a

Explanation: Pharming redirects users to fake websites to steal sensitive information.


18. Which of the following is not a type of peer-to-peer cyber-crime?

a) MiTM
b) Injecting Trojans to a target victim
c) Credit card details leak in the deep web
d) Phishing

Answer: c

Explanation: Credit card leaks on the deep web are categorized differently from peer-to-peer crimes.


19. Which attack uses excess data in memory to break systems?

a) Clickjacking
b) Buffer-overflow
c) Phishing
d) MiTM

Answer: b

Explanation: Buffer overflow attacks exploit memory vulnerabilities to execute malicious code.


20. Which of the following do attackers target to fetch a victim’s IP address?

a) IP tracker
b) Emails
c) Websites
d) Web pages

Answer: c

Explanation: Attackers often target websites to gather user IP addresses.


21. Which of the following is defined as an attempt to harm or damage a system or network?

a) Digital crime
b) Threats
c) System hijacking
d) Cyber Attack

Answer: d

Explanation: A cyber attack aims to damage systems or gain unauthorized access.


22. Which hackers mainly aim to gain financial profit through cybercrime?

a) White Hat Hackers
b) Black Hat Hackers
c) Hacktivists
d) Gray Hat Hackers

Answer: b

Explanation: Black Hat hackers perform illegal activities for financial gain or malicious purposes.


23. IT security in organizations is mainly maintained by ____________________

a) Software Security Specialist
b) CEO of the organization
c) Security Auditor
d) IT Security Engineer

Answer: d

Explanation: IT Security Engineers are responsible for securing systems and maintaining cyber security tools.


24. Where did the term “hacker” originate?

a) MIT
b) New York University
c) Harvard University
d) Bell’s Lab

Answer: a

Explanation: The term hacker originated at the Massachusetts Institute of Technology (MIT).


25. What is the existence of weakness in a system or network known as?

a) Attack
b) Exploit
c) Vulnerability
d) Threat

Answer: c

Explanation: A vulnerability is a weakness that attackers can exploit.


26. Which internet scam tricks users into providing confidential information?

a) MiTM attack
b) Phishing attack
c) Website attack
d) DoS attack

Answer: b

Explanation: Phishing attacks use fake messages or websites to steal private information.


27. Which of the following is not a step in data breaching?

a) Exfiltration
b) Research and info-gathering
c) Attack the system
d) Fixing the bugs

Answer: d

Explanation: Cyber criminals focus on exploiting systems, not fixing vulnerabilities.


28. Which online service’s privacy cannot be protected using Tor?

a) Browsing data
b) Instant messaging
c) Login using ID
d) Relay chats

Answer: c

Explanation: Logging in with an ID reveals user identity regardless of Tor usage.


29. Which term refers to hackers who combine white hat and black hat behavior?

a) Yellow Hat hackers
b) Grey Hat hackers
c) Red Hat Hackers
d) White-Black Hat Hackers

Answer: b

Explanation: Grey Hat hackers may break rules without malicious intent.


30. Which of the following is not an email-related hacking tool?

a) Mail Password
b) Email Finder Pro
c) Mail PassView
d) Sendinc

Answer: d

Explanation: Sendinc is a secure email service, not a hacking tool.


31. Which mobile DDoS attack waits for commands from the owner?

a) Botnets
b) Programs
c) Virus
d) Worms

Answer: a

Explanation: Botnets remain inactive until instructed to launch attacks.


32. Which is the least secure wireless encryption standard?

a) WPA3
b) WPA2
c) WPA
d) WEP

Answer: d

Explanation: WEP is outdated and considered insecure.


33. What type of malware is Stuxnet?

a) Trojan
b) Antivirus
c) Worm
d) Virus

Answer: c

Explanation: Stuxnet is a worm that targeted industrial control systems.


34. Which ethical hacking technique identifies the operating system of a remote computer?

a) Operating System fingerprinting
b) Operating System penetration testing
c) Digital-printing
d) Machine printing

Answer: a

Explanation: OS fingerprinting helps identify operating systems remotely.


35. Which technique can reduce the chance of data leakage?

a) Steganography
b) Chorography
c) Cryptography
d) Authentication

Answer: a

Explanation: Steganography hides information inside other files to improve security.


Conclusion

These Cyber Security MCQs and answers are useful for students, graduates, and professionals preparing for interviews, aptitude tests, and examinations in Tanzania. Continue practicing to strengthen your cyber security knowledge and improve your exam performance.

Runtime Fitz

Welcome to my blog! I'm Romann, and I launched this platform in March 2025. Here, you'll find the latest updates on job vacancies and employment opportunities in Tanzania. Whether you're seeking new employment or looking to advance your career, visit frequently to stay informed about the latest openings and industry trends.

Post a Comment

Previous Post Next Post