MCQ Screening Questions for a Cybersecurity Analyst

Use these 20 multiple-choice questions to quickly filter cybersecurity analyst applicants, even if you're not a technical expert.

20 Knockout Questions for Cybersecurity Analysts

#QuestionABCDAnswerKnockout Rule
1What is a firewall used for?Speeding up internetMonitoring and controlling incoming/outgoing network trafficStoring passwordsRunning applicationsBWrong = Hard Knockout
2What does phishing mean?A fishing gameA social engineering attack to trick users into revealing sensitive infoA type of malwareA network attackBWrong = Knockout
3What is two-factor authentication (2FA)?A double passwordA second layer of identity verification beyond a passwordAn encryption methodA firewall typeBWrong = Knockout
4What is a zero-day vulnerability?A new software featureAn unknown flaw exploited before developers can patch itA type of encryptionA network protocolBWrong = Knockout
5What does SIEM stand for?Security Incident Error ManagerSecurity Information and Event ManagementSystem Integration Event MonitorNone of the aboveBWrong = Knockout for SOC roles
6What is the purpose of penetration testing?Writing security policiesSimulating attacks to find vulnerabilities before attackers doMonitoring network trafficManaging user accessBWrong = Knockout for pen test roles
7What is encryption?Deleting sensitive dataConverting data into an unreadable format to protect itBacking up dataMonitoring logsBWrong = Knockout
8What does OWASP Top 10 refer to?A list of top developersA list of the most critical web application security risksA compliance frameworkA firewall standardBWrong = Knockout for AppSec roles
9What is a DDoS attack?A phishing attackOverwhelming a server with traffic to make it unavailableA password attackA malware infectionBWrong = Knockout
10What is the principle of least privilege?Giving all users admin accessGiving users only the minimum access they need to do their jobA password policyA firewall ruleBWrong = Knockout
11What is an intrusion detection system (IDS)?A firewallA system that monitors network traffic for suspicious activityA VPN toolAn encryption toolBWrong = Red flag
12What is social engineering in cybersecurity?Building softwareManipulating people into revealing confidential informationA network attackA type of malwareBWrong = Knockout
13What does SOC stand for?Software Operations CenterSecurity Operations CenterSystem Optimization CenterNone of the aboveBWrong = Red flag for SOC roles
14What is ransomware?An antivirus toolMalware that encrypts files and demands payment for decryptionA phishing emailA network scannerBWrong = Knockout
15What is the purpose of a VPN?Speeding up internetEncrypting internet traffic and masking the user's IP addressScanning for malwareManaging user accountsBWrong = Red flag
16What is multi-factor authentication (MFA)?Using multiple passwordsUsing multiple verification methods to confirm a user's identityA firewall settingAn encryption typeBWrong = Knockout
17What does CVE stand for?Common Vulnerability ExposureCommon Vulnerabilities and ExposuresCybersecurity Verified EntryNone of the aboveBWrong = Red flag
18What is the difference between IDS and IPS?No differenceIDS detects threats; IPS detects and actively blocks themIPS only monitorsIDS blocks threatsBWrong = Red flag
19What is a security audit?A software testA systematic review of an organization's security policies and controlsA phishing simulationA network scanBWrong = Knockout for compliance roles
20What is threat intelligence?Writing security codeCollecting and analyzing information about current and emerging threatsA firewall featureA backup strategyBWrong = Red flag

"Being able to ask about the OWASP Top 10 without needing to be an expert myself is a huge advantage. Sift helps me find qualified security candidates fast."

- David L., Senior Recruiter

Automate Your Cybersecurity Screening

Turn these questions into an automated screening filter and start interviewing qualified security analysts today.

‹ Back to all MCQ roles