Cyber Security Questions and Answers PDF
Cyber Security Questions and Answers PDF
History
This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Ethical
Hacking – History”.
1. Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system
are termed as ________
a) Black Hat hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers
View Answer
Answer: b
Explanation: White Hat Hackers are cyber security analysts and consultants who have the intent to
help firms and Governments in the identification of loopholes as well as help to perform penetration
tests for securing a system.
2. Which is the legal form of hacking based on which jobs are provided in IT industries and firms?
a) Cracking
b) Non ethical Hacking
c) Ethical hacking
d) Hactivism
View Answer
Answer: c
Explanation: Ethical Hacking is an ethical form of hacking done by white-hat hackers for performing
penetration tests and identifying potential threats in any organizations and firms.
3. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes.
Who are “they” referred to here?
a) Gray Hat Hackers
b) White Hat Hackers
c) Hactivists
d) Black Hat Hackers
View Answer
Answer: d
Explanation: Black Hat hackers also termed as ‘crackers’ and are a major type of cyber criminals
who take unauthorized access in user’s account or system and steal sensitive data or inject malware
into the system for their profit or to harm the organization.
4. ________ are the combination of both white as well as black hat hackers.
a) Grey Hat hackers
b) Green Hat hackers
c) Blue Hat Hackers
d) Red Hat Hackers
View Answer
Answer: a
Explanation: Grey Hat Hackers have a blending character of both ethical as well as un-ethical hacker.
They hack other’s systems for fun but do not harm the system, exploits bugs and vulnerabilities in
network without the knowledge of the admin or the owner.
5. The amateur or newbie in the field of hacking who don’t have many skills about coding and in-
depth working of security and hacking tools are called ________
a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers
View Answer
Answer: c
Explanation: Script Kiddies are new to hacking and at the same time do not have many interests in
developing coding skills or find bugs of their own in systems; rather they prefer downloading of
available tools (developed by elite hackers) and use them to break any system or network. They just
try to gain attention of their friend circles.
6. Suicide Hackers are those _________
a) who break a system for some specific purpose with or without keeping in mind that they may
suffer long term imprisonment due to their malicious activity
b) individuals with no knowledge of codes but an expert in using hacking tools
c) who know the consequences of their hacking activities and hence try to prevent them by erasing
their digital footprints
d) who are employed in an organization to do malicious activities on other firms
View Answer
Answer: a
Explanation: Suicide hackers are those who break into any network or system with or without
knowing the consequences of the cyber crime and its penalty. There are some suicide hackers who
intentionally do crimes and get caught to bring their names in the headlines.
7. Criminal minded individuals who work for terrorist organizations and steal information of nations
and other secret intelligence are _________
a) State sponsored hackers
b) Blue Hat Hackers
c) Cyber Terrorists
d) Red Hat Hackers
View Answer
Answer: c
Explanation: Cyber Terrorists are very expert programmers and cyber criminals who hide themselves
while doing malicious activities over the internet and they are smart enough to hide themselves or
their tracks of action. They are hired for gaining unauthorised access to nation’s data centres or break
into the network of intelligence agencies.
8. One who disclose information to public of a company, organization, firm, government and private
agency and he/she is the member or employee of that organization; such individuals are termed as
___________
a) Sponsored hackers
b) Crackers
c) Hactivist
d) Whistleblowers
View Answer
Answer: d
Explanation: Whistleblowers are those individuals who is a member or an employee of any specific
organization and is responsible for disclosing private information of those organizations, firms, either
government or private.
9. These types of hackers are the most skilled hackers in the hackers’ community. Who are “they”
referred to?
a) White hat Hackers
b) Elite Hackers
c) Licensed Penetration Testers
d) Red Hat Hackers
View Answer
Answer: b
Explanation: The tag “Elite hackers” are considered amongst the most reputed hackers who possess
most of the hacking and security skills. They are treated with utmost respect in the hackers’
community. Zero day vulnerabilities, serious hacking tools and newly introduced bugs are found and
developed by them.
10. _________ are those individuals who maintain and handles IT security in any firm or
organization.
a) IT Security Engineer
b) Cyber Security Interns
c) Software Security Specialist
d) Security Auditor
View Answer
Answer: a
Explanation: This is an intermediary level of position of an individual in an organization or firm who
builds and preserves different systems and its associated security tools of the firm of organization to
which he/she belongs.
11. Role of security auditor is to ____________
a) secure the network
b) probe for safety and security of organization’s security components and systems
c) detects and prevents cyber attacks and threats to organization
d) does penetration testing on different web applications
View Answer
Answer: b
Explanation: Security auditors are those who conduct auditing of various computer and network
systems on an organization or company and reports the safety and security issues as well as helps in
suggesting improvements or enhancements in any particular system that is threat prone.
12. ________ are senior level corporate employees who have the role and responsibilities of creating
and designing secured network or security structures.
a) Ethical Hackers
b) Chief Technical Officer
c) IT Security Engineers
d) Security Architect
View Answer
Answer: d
Explanation: Security architect are those senior grade employees of an organization who are in
charge of building, designing, implementing and testing of secured network topologies, protocols as
well as secured computers in an organization.
13. __________ security consultants uses database security monitoring & scanning tools to maintain
security to different data residing in the database / servers / cloud.
a) Database
b) Network
c) System
d) Hardware
View Answer
Answer: a
Explanation: Database Security consultants are specific individuals hired in order to monitor and
scan the database systems and keep them secured from unwanted threats and attacks by giving access
to restricted users, blocking unwanted files, multi-factor access control etc.
14. Governments hired some highly skilled hackers. These types of hackers are termed as _______
a) Special Hackers
b) Government Hackers
c) Cyber Intelligence Agents
d) Nation / State sponsored hackers
View Answer
Answer: d
Explanation: Nation / State sponsored hackers are specific individuals who are employed or hired by
the government of that nation or state and protect the nation from cyber terrorists and other groups or
individuals and to reveal their plans, communications and actions.
15. Someone (from outside) who tests security issues for bugs before launching a system or
application, and who is not a part of that organization or company are ______
a) Black Hat hacker
b) External penetration tester
c) Blue Hat hacker
d) White Hat Hacker
View Answer
Answer: c
Explanation: Blue Hat Hackers are outsiders yet security testers who are temporarily hired for
performing outsourced security test for bugs and vulnerabilities in any system before launching it to
the market or making the application live.
1. In general how many key elements constitute the entire security structure?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: d
Explanation: The 4 key elements that constitute the security are: confidentiality, integrity,
authenticity & availability. Authenticity is not considered as one of the key elements in some other
security models, but the popular CIA Triad eliminates this as authenticity at times comes under
confidentiality & availability.
2. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
a) Confidentiality
b) Integrity
c) Authenticity
d) Availability
View Answer
Answer: c
Explanation: According to the CIA triad the three components that a security need is the
Confidentiality, Integrity, Availability (as in short read as CIA).
3. This is the model designed for guiding the policies of Information security within a company, firm
or organization. What is “this” referred to here?
a) Confidentiality
b) Non-repudiation
c) CIA Triad
d) Authenticity
View Answer
Answer: c
Explanation: Various security models were being developed till date. This is by far the most popular
and widely used model which focuses on the information’s confidentiality, integrity as well as
availability and how these key elements can be preserved for a better security in any organization.
4. CIA triad is also known as ________
a) NIC (Non-repudiation, Integrity, Confidentiality)
b) AIC (Availability, Integrity, Confidentiality)
c) AIN (Availability, Integrity, Non-repudiation)
d) AIC (Authenticity, Integrity, Confidentiality)
View Answer
Answer: b
Explanation: This approach of naming it CIA Triad as AIC (Availability, Integrity, Confidentiality)
Triad because people get confused about this acronym with the abbreviation and the secret agency
name Central Intelligence Agency.
5. When you use the word _____ it means you are protecting your data from getting disclosed.
a) Confidentiality
b) Integrity
c) Authentication
d) Availability
View Answer
Answer: a
Explanation: Confidentiality is what every individual prefer in terms of physical privacy as well as
digital privacy. This term means our information needs to be protected from getting disclose to
unauthorised parties, for which we use different security mechanisms like password protection,
biometric security, OTPs (One Time Passwords) etc.
6. ______ means the protection of data from modification by unknown users.
a) Confidentiality
b) Integrity
c) Authentication
d) Non-repudiation
View Answer
Answer: b
Explanation: A information only seems valuable if it is correct and do not get modified during its
journey in the course of arrival. The element integrity makes sure that the data sent or generated from
other end is correct and is not modified by any unauthorised party in between.
7. When integrity is lacking in a security system, _________ occurs.
a) Database hacking
b) Data deletion
c) Data tampering
d) Data leakage
View Answer
Answer: c
Explanation: The term data tampering is used when integrity is compromised in any security model
and checking its integrity later becomes costlier. Example: let suppose you sent $50 to an authorised
person and in between a Man in the Middle (MiTM) attack takes place and the value has tampered to
$500. This is how integrity is compromised.
8. _______ of information means, only authorised users are capable of accessing the information.
a) Confidentiality
b) Integrity
c) Non-repudiation
d) Availability
View Answer
Answer: d
Explanation: Information seems useful only when right people (authorised users) access it after going
through proper authenticity check. The key element availability ensures that only authorised users are
able to access the information.
9. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered
fundamental?
a) They help understanding hacking better
b) They are key elements to a security breach
c) They help understands security and its components better
d) They help to understand the cyber-crime better
View Answer
Answer: c
Explanation: The four elements of security viz. confidentiality, integrity, authenticity & availability
helps in better understanding the pillars of security and its different components.
10. This helps in identifying the origin of information and authentic user. This referred to here as
__________
a) Confidentiality
b) Integrity
c) Authenticity
d) Availability
View Answer
Answer: c
Explanation: The key element, authenticity helps in assuring the fact that the information is from the
original source.
11. Data ___________ is used to ensure confidentiality.
a) Encryption
b) Locking
c) Deleting
d) Backup
View Answer
Answer: a
Explanation: Data encryption is the method of converting plain text to cipher-text and only
authorised users can decrypt the message back to plain text. This preserves the confidentiality of
data.
12. Which of these is not a proper method of maintaining confidentiality?
a) Biometric verification
b) ID and password based verification
c) 2-factor authentication
d) switching off the phone
View Answer
Answer: d
Explanation: Switching off the phone in the fear of preserving the confidentiality of data is not a
proper solution for data confidentiality. Fingerprint detection, face recognition, password-based
authentication, two-step verifications are some of these.
13. Data integrity gets compromised when _____ and _____ are taken control off.
a) Access control, file deletion
b) Network, file permission
c) Access control, file permission
d) Network, system
View Answer
Answer: c
Explanation: The two key ingredients that need to be kept safe are: access control & file permission
in order to preserve data integrity.
14. ______ is the latest technology that faces an extra challenge because of CIA paradigm.
a) Big data
b) Database systems
c) Cloud storages
d) Smart dust
View Answer
Answer: a
Explanation: Big data has additional challenges that it has to face because of the tremendous volume
of data that needs protection as well as other key elements of the CIA triad, which makes the entire
process costly and time-consuming.
15. One common way to maintain data availability is __________
a) Data clustering
b) Data backup
c) Data recovery
d) Data Altering
View Answer
Answer: b
Explanation: For preventing data from data-loss, or damage data backup can be done and stored in a
different geographical location so that it can sustain its data from natural disasters & unpredictable
events.
1. _______ is the practice and precautions taken to protect valuable information from unauthorised
access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
View Answer
Answer: c
Explanation: Information Security (abbreviated as InfoSec) is a process or set of processes used for
protecting valuable information for alteration, destruction, deletion or disclosure by unauthorised
users.
2. From the options below, which of them is not a threat to information security?
a) Disaster
b) Eavesdropping
c) Information leakage
d) Unchanged default password
View Answer
Answer: d
Explanation: Disaster, eavesdropping and information leakage come under information security
threats whereas not changing the default password of any system, hardware or any software comes
under the category of vulnerabilities that the user may pose to its system.
3. From the options below, which of them is not a vulnerability to information security?
a) flood
b) without deleting data, disposal of storage media
c) unchanged default password
d) latest patches and updates not done
View Answer
Answer: a
Explanation: Flood comes under natural disaster which is a threat to any information and not acts as a
vulnerability to any system.
4. _____ platforms are used for safety and protection of information in the cloud.
a) Cloud workload protection platforms
b) Cloud security protocols
c) AWS
d) One Drive
View Answer
Answer: a
Explanation: Nowadays data centres support workloads from different geographic locations across
the globe through physical systems, virtual machines, servers, and clouds. Their security can be
managed using Cloud workload protection platforms which manage policies regarding security of
information irrespective of its location.
5. Which of the following information security technology is used for avoiding browser-based
hacking?
a) Anti-malware in browsers
b) Remote browser access
c) Adware remover in browsers
d) Incognito mode in a browser
View Answer
Answer: b
Explanation: Cyber-criminals target browsers for breaching information security. If a user establishes
a remote browsing by isolating the browsing session of end user, cyber-criminals will not be able to
infect the system along with browser with malware, ultimately reducing the attack surface area.
6. The full form of EDR is _______
a) Endpoint Detection and recovery
b) Early detection and response
c) Endpoint Detection and response
d) Endless Detection and Recovery
View Answer
Answer: c
Explanation: It is a collective name for tools that monitor networks & endpoints of systems and
record all the activities for further reporting, analysis & detection in a central database. Analyzing the
reports generated through such EDR tools, loopholes in a system or any internal, as well as external
breaching attempts can be detected.
7. _______ technology is used for analyzing and monitoring traffic in network and information flow.
a) Cloud access security brokers (CASBs)
b) Managed detection and response (MDR)
c) Network Security Firewall
d) Network traffic analysis (NTA)
View Answer
Answer: d
Explanation: Network traffic analysis (NTA) is an approach of information security for supervising
the traffic in any network, a flow of data over the network as well as malicious threats that are trying
to breach the network. This technological solution also helps in triage the events detected by
Network Traffic Analysing tools.
8. Compromising confidential information comes under _________
a) Bug
b) Threat
c) Vulnerability
d) Attack
View Answer
Answer: b
Explanation: Threats are anything that may cause damage or harm to a computer system, individual
or any information. Compromising of confidential information means extracting out sensitive data
from a system by illegal manner.
9. Lack of access control policy is a _____________
a) Bug
b) Threat
c) Vulnerability
d) Attack
View Answer
Answer: c
Explanation: Access control policies are incorporated to a security system for restricting of
unauthorised access to any logical or physical system. Every security compliance program must need
this as a fundamental component. Those systems which lack this feature is vulnerable.
10. Possible threat to any information cannot be ________________
a) reduced
b) transferred
c) protected
d) ignored
View Answer
Answer: d
Explanation: When there lies a threat to any system, safeguards can be implemented, outsourced,
distributed or transferred to some other system, protected using security tools and techniques but
cannot be ignored.
1. A _________ can gain access illegally to a system if the system is not properly tested in scanning
and gaining access phase.
a) security officer
b) malicious hacker
c) security auditor
d) network analyst
View Answer
Answer: b
Explanation: Malicious hackers can gain illegal access at OS level, application level or network level
if the penetration testers or ethical hackers lack in testing and reporting the vulnerabilities in a
system.
2. In which phase, the hackers install backdoors so that his/her ownership with the victim’s system
can be retained later?
a) Scanning
b) Maintaining access
c) Maintaining Access
d) Gaining access
View Answer
Answer: c
Explanation: After gaining access to a system, the hacker needs to keep a path open so that he/she in
future can access the system. Therefore, backdoors are set which will later allow the attacker to gain
access through it easily.
3. _______ is the tool used for this purpose.
a) Powersploit
b) Aircrack – ng
c) Snort
d) Nmap
View Answer
Answer: a
Explanation: The Powersploit is an access maintaining tool used for Windows systems. This tool is
used for gaining re-access to the victim’s system using PowerShell.
4. Which of the following hacking tools and techniques hackers’ do not use for maintaining access in
a system?
a) Rootkits
b) Backdoors
c) Trojans
d) Wireshark
View Answer
Answer: d
Explanation: Wireshark is not a tool for maintaining access because it is used for analysing network
protocols at a microscopic level (very minutely). It is an interactive tool for data traffic analysing on
any computer.
5. In _______ phase, the hackers try to hide their footprints.
a) Scanning
b) Tracks clearing
c) Reconnaissance
d) Gaining access
View Answer
Answer: b
Explanation: Tracks clearing or covering tracks is the name of the phase where the hackers delete
logs of their existence & other activity records they do during the hacking process. This step is
actually an unethical one.
6. Which of them is not a track clearing technique?
a) Altering log files
b) Tunnelling
c) Port Scanning
d) Footprint removing
View Answer
Answer: c
Explanation: Port scanning is a method used in the scanning phase. Altering or changing log files,
tunnelling for hiding your identity and removing footprints from different sites are examples of
clearing tracks.
7. __________ is the last phase of ethical hacking process.
a) Scanning
b) Tracks clearing
c) Reconnaissance
d) Reporting
View Answer
Answer: d
Explanation: In the reporting phase, the penetration tester or ethical hacker has to assemble all the
flaws along with the tools and processes used for detecting then and report it to the firm or
organization.
8. Which of the following is not a footprint-scanning tool?
a) SuperScan
b) TcpView
c) Maltego
d) OWASP Zed
View Answer
Answer: c
Explanation: SuperScan, TcpView and OWASP Zed are tools used for scanning footprints. Maltego
is not a footprint-scanning tool. It is used for reconnaissance purpose only.
1. ___________ is a special form of attack using which hackers’ exploit – human psychology.
a) Cross Site Scripting
b) Insecure network
c) Social Engineering
d) Reverse Engineering
View Answer
Answer: c
Explanation: Using social engineering techniques, hackers try to exploit the victim’s mind to gain
valuable information about that person such as his/her phone number, date of birth, pet name etc.
2. Which of the following do not comes under Social Engineering?
a) Tailgating
b) Phishing
c) Pretexting
d) Spamming
View Answer
Answer: d
Explanation: Spamming is the attack technique where the same message is sent indiscriminately
repeatedly in order to overload the inbox or harm the user.
3. _________ involves scams where an individual (usually an attacker) lie to a person (the target
victim) to acquire privilege data.
a) Phishing
b) Pretexting
c) Spamming
d) Vishing
View Answer
Answer: b
Explanation: In the pretexting technique of social engineering, the attacker pretends in need of
legitimate information from the victim for confirming his/her identity.
4. Which of the following is the technique used to look for information in trash or around dustbin
container?
a) Pretexting
b) Baiting
c) Quid Pro Quo
d) Dumpster diving
View Answer
Answer: d
Explanation: In the technology world, where information about a person seems everywhere;
dumpster diving is the name of the technique where the attacker looks for information in dustbins
and trashes. For example, after withdrawing money from ATM, the user usually throw the receipt in
which the total amount and account details are mentioned. These type of information becomes
helpful to a hacker, for which they use dumpster diving.
5. Which of the following is not an example of social engineering?
a) Dumpster diving
b) Shoulder surfing
c) Carding
d) Spear phishing
View Answer
Answer: c
Explanation: Carding is the method of trafficking of bank details, credit cards or other financial
information over the internet. Hence it’s a fraudulent technique used by hackers and does not comes
under social engineering.
6. In a phishing, attackers target the ________ technology to so social engineering.
a) Emails
b) WI-FI network
c) Operating systems
d) Surveillance camera
View Answer
Answer: a
Explanation: In a phishing attack, the attacker fraudulently attempts to obtain sensitive data (such as
username & passwords) of the target user and use emails to send fake links which redirect them to a
fake webpage which looks legitimate.
7. Tailgating is also termed as ___________
a) Piggybacking
b) Pretexting
c) Phishing
d) Baiting
View Answer
Answer: a
Explanation: Piggybacking is the technique used for social engineering, as the attacker or
unauthorized person/individual follows behind an authorized person/employee & gets into an
authorized area to observe the system, gain confidential data or for a fraudulent purpose.
8. Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit
organizations.
a) True
b) False
View Answer
Answer: b
Explanation: Physical hacking, like other types of hacking, is possible in any institutions,
organizations, clinics, private firms, banks or any other financial institutions. Hence, the above
statement is false.
9. Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.
a) network security
b) physical security
c) database security
d) wireless security
View Answer
Answer: b
Explanation: When cyber-criminal gain access to an authorized area and steal pen drives and DVDs
which contain sensitive information about an employee or about the organization, then it can be said
that the physical security of the organization is weak.
10. ________ is the ability of an individual to gain physical access to an authorized area.
a) Network accessing
b) Database accessing
c) Remote accessing
d) Physical accessing
View Answer
Answer: d
Explanation: Physical accessing without prior security checking is the ability of a person to gain
access to any authorized area. Physical accessing is done using piggybacking or any other suspicious
means.
11. Which of the following is not considering the adequate measure for physical security?
a) Lock the drawers
b) Keep strong passwords for corporate laptops and mobile phones
c) Keep confidential organization’s document file open in the desk
d) Hide your hand against camera while inserting the PIN code
View Answer
Answer: c
Explanation: Keeping confidential files left open in the desk is not an adequate way of maintaining
physical security; as anyone can pick these up and perform physical hacking.
12. Which of the following is not a physical security measure to protect against physical hacking?
a) Add front desk & restrict unknown access to the back room
b) Create a phishing policy
c) Analyze how employees maintain their physical data and data storage peripheral devices
d) Updating the patches in the software you’re working at your office laptop.
View Answer
Answer: d
Explanation: Updating the patches in your working software does not come under security measures
for physical hacking. Updating the patches will help your software get free from bugs and flaws in an
application as they get a fix when patches are updated.
13. IT security department must periodically check for security logs and entries made during office
hours.
a) True
b) False
View Answer
Answer: a
Explanation: Checking for security logs and entries made by employees and other outsiders who
entered the office can help in identifying whether any suspicious person is getting in and out of the
building or not.
14. Which of them is not an example of physical hacking?
a) Walk-in using piggybacking
b) Sneak-in
c) Break-in and steal
d) Phishing
View Answer
Answer: d
Explanation: Phishing does not come under physical security. Walk-in without proper authorization,
sneaking in through glass windows or other means and breaking in and stealing sensitive documents
are examples of physical hacking.
15. Physical _________ is important to check & test for possible physical breaches.
a) penetration test
b) security check
c) hacking
d) access
View Answer
Answer: a
Explanation: Physical penetration test is important in order to check for the possible physical security
breaches. Usually corporate firms and organizations stay busy in securing the networks and data and
penetration testers are hired for data and network pentesting, but physical security breach can also
equally hamper.
1. ___________ ensures the integrity and security of data that are passing over a network.
a) Firewall
b) Antivirus
c) Pentesting Tools
d) Network-security protocols
View Answer
Answer: d
Explanation: The methods and processes in securing network data from unauthorized content
extraction are controlled by network-security protocols.
2. Which of the following is not a strong security protocol?
a) HTTPS
b) SSL
c) SMTP
d) SFTP
View Answer
Answer: c
Explanation: SMTP (is abbreviated as Simple Mail Transfer Protocol) is a standard protocol to
transmit electronic mail and is a widely used mail transmitting protocol.
3. Which of the following is not a secured mail transferring methodology?
a) POP3
b) SSMTP
c) Mail using PGP
d) S/MIME
View Answer
Answer: a
Explanation: POP (Post Office Protocol) is a simple protocol which fetches the updated mail stored
for you by the server. S/MIME (Secure/Multipurpose Internet Mail Extensions), SSMTP (Secure-
Simple Mail Transfer Protocol), and PGP (Pretty Good Privacy) are examples of protocols and
methods for secure mailing.
4. __________ is a set of conventions & rules set for communicating two or more devices residing in
the same network?
a) Security policies
b) Protocols
c) Wireless network
d) Network algorithms
View Answer
Answer: b
Explanation: Network protocols are designed with mechanisms for identifying devices and make
connections between them. In addition, some proper rules are defined as to how data packets will be
sent and received.
5. TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based
connection.
a) True
b) False
View Answer
Answer: a
Explanation: TLS which has now become SSL (Secure Socket Layer) is one of the popular
cryptographic protocols developed to provide security to computer network while communication.
6. HTTPS is abbreviated as _________
a) Hypertexts Transfer Protocol Secured
b) Secured Hyper Text Transfer Protocol
c) Hyperlinked Text Transfer Protocol Secured
d) Hyper Text Transfer Protocol Secure
View Answer
Answer: d
Explanation: Hyper Text Transfer Protocol Secure (HTTPS) is a security protocol which maintains
security when data is sent from browser to server and vice versa. It denotes that all communication
setup between the browser and the server is encrypted.
7. SSL primarily focuses on _______
a) integrity and authenticity
b) integrity and non-repudiation
c) authenticity and privacy
d) confidentiality and integrity
View Answer
Answer: a
Explanation: SSL primarily focuses on maintaining the integrity of the data. Also, it maintains
authenticity which helps the customers feel secure to communicate over the internet.
8. In SSL, what is used for authenticating a message?
a) MAC (Message Access Code)
b) MAC (Message Authentication Code)
c) MAC (Machine Authentication Code)
d) MAC (Machine Access Code)
View Answer
Answer: b
Explanation: For authenticating in SSL, a short message known as MAC (Message Authentication
Code) is used for authenticating a message; where both the sender & the receiver need to implement
the same key in order to start communicating.
9. __________ is used for encrypting data at network level.
a) IPSec
b) HTTPS
c) SMTP
d) S/MIME
View Answer
Answer: a
Explanation: IPSec (Secure Internet Protocol) is used for securing data at the network level by using
3 different protocols. These are Encapsulating Secure Payload (ESP), Authentication Header, and
Internet Key Exchange (IKE).
10. S/MIME is abbreviated as __________________
a) Secure/Multimedia Internet Mailing Extensions
b) Secure/Multipurpose Internet Mailing Extensions
c) Secure/Multimedia Internet Mail Extensions
d) Secure/Multipurpose Internet Mail Extensions
View Answer
Answer: d
Explanation: Secure/Multipurpose Internet Mail Extensions is the most popular protocol used to send
encrypted messages that are digitally signed. In this protocol, the encryption is done with a digital
sign in them.
11. Users are able to see a pad-lock icon in the address bar of the browser when there is _______
connection.
a) HTTP
b) HTTPS
c) SMTP
d) SFTP
View Answer
Answer: b
Explanation: It is when HTTPS (Hyper Text Transfer Protocol Secure) connection is built an
extended validation certificate is installed in the website for security reasons.
12. Why did SSL certificate require in HTTP?
a) For making security weak
b) For making information move faster
c) For encrypted data sent over HTTP protocol
d) For sending and receiving emails unencrypted
View Answer
Answer: c
Explanation: In the case of HTTP connection, data are sent as plain-text, which is easily readable by
hackers, especially when it is credit card details and personal information. But with the incorporation
of SSL certificate, communication becomes secure and data sent and received are encrypted.
13. SFTP is abbreviated as ________
a) Secure File Transfer Protocol
b) Secured File Transfer Protocol
c) Secure Folder Transfer Protocol
d) Secure File Transferring Protocol
View Answer
Answer: a
Explanation: It is a secured FTP, where communication is made secured using SSH (Secure Shell)
which helps in secure transferring of files in both local as well as remote systems.
14. PCT is abbreviated as ________
a) Private Connecting Technology
b) Personal Communication Technology
c) Private Communication Technique
d) Private Communication Technology
View Answer
Answer: d
Explanation: Private Communication Technology (PCT) is similar to SSL except that the size of the
message is smaller in the case of PCT. It supports different encryption algorithms like DES, RSA,
Diffie-Hellman etc.
Cyber Security Questions and Answers – Security Protocols
–2
« Prev
Next »
This set of Cyber Security Questions and Answers for Freshers focuses on “Security Protocols – 2”.
1. _________ are a specific section of any virus or malware that performs illicit activities in a
system.
a) Malicious programs
b) Worms
c) Spyware
d) Payload
View Answer
Answer: d
Explanation: Payloads are parts of a virus that helps in performing malicious activities such as
destroying information, blocking network traffic, compromising data, steal and spy for sensitive
information.
2. ____________ is a scenario when information is accessed without authorization.
a) Data infiltration
b) Data Hack
c) Information compromise
d) Data Breach
View Answer
Answer: d
Explanation: Data breach is the term used when the cyber-security incident takes place where
sensitive information is accessed without authority.
3. ____________ is an attempt to steal, spy, damage or destroy computer systems, networks or their
associated information.
a) Cyber-security
b) Cyber attack
c) Digital hacking
d) Computer security
View Answer
Answer: b
Explanation: Cyber attack can be defined as an attempt to steal, spy, damage or destroy different
components of cyberspace such as computer systems, associated peripherals, network systems, and
information.
4. ___________ is a device which secretly collects data from credit / debit cards.
a) Card Skimmer
b) Data Stealer
c) Card Copier
d) Card cloner
View Answer
Answer: a
Explanation: Card skimmer is hardware that is installed and setup in ATMs secretly so that when any
user will swipe or insert their card in the ATM, the skimmer will fetch all information from the
magnetic strip.
5. _____________ is a technique used when artificial clicks are made which increases revenue
because of pay-per-click.
a) Clickjacking
b) Clickfraud
c) Keylogging
d) Click-hacking
View Answer
Answer: b
Explanation: Clickfraud is an attack technique used when artificial clicks get generated to increase
the revenue in ad-campaigns online.
6. __________ is the practice implemented to spy someone using technology for gathering sensitive
information.
a) Cyber espionage
b) Cyber-spy
c) Digital Spying
d) Spyware
View Answer
Answer: a
Explanation: Cyber espionage is a practice done by both ethical and non-ethical hackers to spy on
others for gathering confidential information.
7. ____________ is the way or technique through which majority of the malware gets installed in our
system.
a) Drive-by click
b) Drive-by redirection
c) Drive-by download
d) Drive-by injecting USB devices
View Answer
Answer: c
Explanation: An accidental yet dangerous action that takes place in the cyberspace which helps
attackers place their malware into the victim’s system. This technique is called Drive-by download.
8. ______ is the term used for toolkits that are purchased and used for targeting different exploits.
a) Exploit bag
b) Exploit set
c) Exploit Toolkit
d) Exploit pack
View Answer
Answer: d
Explanation: Exploit pack or Exploit kit is the term used for toolkits that are purchased and used for
targeting different exploits.
9. Identity theft is the term used when a cyber-thief uses anybody’s personal information to
impersonate the victim for their benefit.
a) True
b) False
View Answer
Answer: a
Explanation: Identity theft is the term used when a cyber-thief uses anybody’s personal information
to impersonate the victim for their benefit. In this type of cyber-crime, information like social
security number, personal details, and images, hobbies and passion details, driving license number
and address details are compromised.
10. _________ is the hacking approach where cyber-criminals design fake websites or pages for
tricking or gaining additional traffic.
a) Cyber-replication
b) Mimicking
c) Website-Duplication
d) Pharming
View Answer
Answer: a
Explanation: The technique and approach through which cyber-crooks develop fake web pages and
sites to trick people for gaining personal details such as login ID and password as well as personal
information, is known as pharming.
11. RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the hard
drive.
a) True
b) False
View Answer
Answer: a
Explanation: It is a special kind of malware that looks for sensitive data that you’ve stored in your
hard drive. RAM-scraping is one of those kinds.
12. When you book online tickets by swiping your card, the details of the card gets stored in ______
a) database system
b) point-of-sale system
c) servers
d) hard drives
View Answer
Answer: b
Explanation: The point-of-sale system is a system where the retailer or company stores financial
records and card details of the e-commerce system or online business transactions.
13. Point-of-sale intrusion does not deal with financial details and credit card information.
a) True
b) False
View Answer
Answer: b
Explanation: Point-of-sale intrusion is an attack that deals with financial details and credit card
information, where the payment system of the company or retailer is compromised and left with
customer’s financial information at risk.
14. _______ are deadly exploits where the vulnerability is known and found by cyber-criminals but
not known and fixed by the owner of that application or company.
a) Unknown attacks
b) Secret attacks
c) Elite exploits
d) Zero-day exploits
View Answer
Answer: d
Explanation: Zero-day exploits are used to attack a system as soon as cyber-criminals came to know
about the weakness or the day the weaknesses are discovered in a system. Hackers exploit these types
of vulnerabilities before the creator releases the patch or fix the issue.
15. Zero-day exploits are also called __________
a) zero-day attacks
b) hidden attacks
c) un-patched attacks
d) un-fixed exploits
View Answer
Answer: a
Explanation: Zero-day exploits are also called zero-day attacks where the vulnerability is known and
found by cyber-criminals or ethical hackers but not known and fixed by the creator/owner of that
application or company.
1. _________ is one of the most secured Linux OS that provides anonymity and an incognito option
for securing its user data.
a) Fedora
b) Tails
c) Ubuntu
d) OpenSUSE
View Answer
Answer: b
Explanation: If any user is looking for Linux based security solutions, Tails is one of the most
popular Linux-based operating systems that provides anonymity and an incognito option for securing
its user data.
2. Which of the following OS does not comes under a secured Linux OS list?
a) Qubes OS
b) Tails
c) Tin Hat
d) Ubuntu
View Answer
Answer: d
Explanation: Qubes OS, Tails OS, and Tin Hat are amongst the most secured Linux Operating
Systems (OS) that provide fast and secure Linux experience along with maintaining anonymity for
the users.
3. ____________ is a Debian-Linux based OS that has 2 VMs (Virtual Machines) that help in
preserving users’ data private.
a) Fedora
b) Ubuntu
c) Whonix
d) Kubuntu
View Answer
Answer: c
Explanation: Whonix is a Debian-Linux based OS that has 2 VMs (Virtual Machines) that help in
preserving users’ data private. One VM is a Tor Gateway that runs Debian while the other is
Workstation.
4. Subgraph OS is a Debian based Linux distro which provides hardcore anonymity and is approved
by Edward Snowden.
a) True
b) False
View Answer
Answer: a
Explanation: Subgraph OS is a secured Debian-based Linux distro which provides hardcore
anonymity and is approved by Edward Snowden. It helps the users give anonymous digital
experience along with data hardening feature.
5. Which of the following comes under secured Linux based OS?
a) Ubuntu
b) Fedora
c) Kubuntu
d) Tails
View Answer
Answer: d
Explanation: If any user is looking for Linux based security solutions, Tails is one of the most
popular Linux-based operating systems that provide anonymity and incognito option for securing its
user data.
6. Using the ______ account of a UNIX system, one can carry out administrative functions.
a) root
b) administrative
c) user
d) client
View Answer
Answer: a
Explanation: Using the root account of a UNIX system, one can carry out administrative functions in
the system. Rest of the accounts in the system are unprivileged, i.e. other accounts have no rights
beyond accessing of files having proper permission.
7. In your Linux-based system, you have to log-in with your root account for managing any feature
of your system.
a) True
b) False
View Answer
Answer: b
Explanation: Try to avoid logging in as a root user. In your Linux-based system, you don’t have to
log-in with your root account for managing any feature of your system. For the administrative task,
you can use the tool or command ‘sudo’ or ‘su’ that gives root privileges.
8. In a Linux-based system, the accounts may be members of 1 or more than one group.
a) True
b) False
View Answer
Answer: a
Explanation: In a Linux-based system, the accounts may be members of 1 or more groups. If any
group has been assigned to access resources, then from the security perspective, one needs to keep in
mind that every member of that group gets access to it automatically.
9. MAC is abbreviated as _______________
a) Machine Access Control
b) Mandatory Accounts Control
c) Mandatory Access Controlling
d) Mandatory Access Control
View Answer
Answer: d
Explanation: Mandatory Access Control systems provides separation of a computer and its OS into
several small discrete sections. This is because the user of a system can only utilize those pieces of a
system for which they’ve been given permission to.
10. _______________ in a system is given so that users can use dedicated parts of the system for
which they’ve been given access to.
a) Machine Access Control
b) Mandatory Accounts Control
c) Mandatory Access Control
d) Mandatory Access Controlling
View Answer
Answer: c
Explanation: Mandatory Access Control is a technique that provides separation of a computer with
its OS into several small discrete sections so that the user of a system can only utilize those pieces of
a system for which they’ve been given permission to.
11. DTE is abbreviated as ___________________
a) Domain and Type Enforcing
b) Domain and Type Enforcement
c) DNS and Type Enforcement
d) DNS and Type Enforcing
View Answer
Answer: b
Explanation: Domain and Type Enforcement is a technique for access-control in technology and in
OS like Linux which helps in limiting the access of programs that are running, to limited users, or
only to those who have permission to access.
12. RBAC is abbreviated as ______________
a) Rule-Based Accessing Control
b) Role-Based Access Control
c) Rule-Based Access Control
d) Role-Based Accessing Control
View Answer
Answer: b
Explanation: RBAC which is abbreviated as Role-Based Access Control defines a set of functions for
users in a Linux system and is often built on top of DTE systems. Here users can log for certain roles
and run particular programs that are apposite for the role.
1. A __________ is a sequential segment of the memory location that is allocated for containing
some data such as a character string or an array of integers.
a) stack
b) queue
c) external storage
d) buffer
View Answer
Answer: d
Explanation: A buffer is a sequential segment of the memory location that is allocated for containing
some data such as a character string or an array of integers. The buffer can handle data only if limited
data is inserted.
2. In a _____________ attack, the extra data that holds some specific instructions in the memory for
actions is projected by a cyber-criminal or penetration tester to crack the system.
a) Phishing
b) MiTM
c) Buffer-overflow
d) Clickjacking
View Answer
Answer: c
Explanation: In a buffer-overflow attack, the extra data that holds some specific instructions in the
memory for actions is projected by a cyber-criminal or penetration tester to crack the system.
3. How many types of buffer-overflow attack are there?
a) 4
b) 2
c) 5
d) 3
View Answer
Answer: b
Explanation: There are two different types of buffer-overflow attack. These are stack-based and
heap-based buffer overflow. In both the cases, this type of exploit takes advantage of an application
that waits for user’s input.
4. Let suppose a search box of an application can take at most 200 words, and you’ve inserted more
than that and pressed the search button; the system crashes. Usually this is because of limited
__________
a) buffer
b) external storage
c) processing power
d) local storage
View Answer
Answer: a
Explanation: In a scenario, where to suppose a search box of an application can take at most 200
words, and you’ve inserted more than that and pressed the search button; the system crashes.
Usually, this is because of the limited buffer.
5. ______________ is a widespread app’s coding mistake made by developers which could be
exploited by an attacker for gaining access or malfunctioning your system.
a) Memory leakage
b) Buffer-overrun
c) Less processing power
d) Inefficient programming
View Answer
Answer: b
Explanation: Buffer-overflow, also known as buffer-overrun is a widespread application’s coding
mistake made by developers which could be exploited by an attacker for gaining access or
malfunctioning your system.
6. Buffer-overflow is also known as ______________
a) buffer-overrun
b) buffer-leak
c) memory leakage
d) data overflow
View Answer
Answer: a
Explanation: Buffer-overflow, also known as buffer-overrun is a widespread application’s coding
mistake made by app developers which could be exploited by an attacker for gaining access or
malfunctioning your system.
7. Buffer-overflow may remain as a bug in apps if __________ are not done fully.
a) boundary hacks
b) memory checks
c) boundary checks
d) buffer checks
View Answer
Answer: c
Explanation: Buffer-overflow may remain as a bug in apps if boundary checks are not done fully by
developers or are skipped by the QA (Quality Assurance) testers of the software development team.
8. Applications developed by programming languages like ____ and ______ have this common
buffer-overflow error.
a) C, Ruby
b) Python, Ruby
c) C, C++
d) Tcl, C#
View Answer
Answer: c
Explanation: Applications developed by programming languages like C and C++ have this common
buffer-overflow error. The strcat(), strcpy(), sprintf(), gets() etc when called in C and C++ can be
exploited because these functions don’t check whether the stack is large enough for storing the data.
9. Why apps developed in languages like C, C++ is prone to Buffer-overflow?
a) No string boundary checks in predefined functions
b) No storage check in the external memory
c) No processing power check
d) No database check
View Answer
Answer: a
Explanation: The strcat(), strcpy(), sprintf(), gets() etc when called in C and C++ can be exploited
because these functions don’t check whether the stack is large enough for storing the data fetched
from some other variable holding larger data.
10. Old operating systems like _______ and NT-based systems have buffer-overflow attack a
common vulnerability.
a) Windows 7
b) Chrome
c) IOS12
d) UNIX
View Answer
Answer: d
Explanation: Old operating systems like UNIX and NT-based systems have buffer-overflow attack a
common vulnerability. This is because they were developed in old programming languages.
1. Buffer-overflow attack can take place if a machine can execute a code that resides in the data/stack
segment.
a) True
b) False
View Answer
Answer: a
Explanation: Buffer-overflow attack can take place either the programmer lack boundary testing or if
a machine can execute a code that resides in the data/stack segment.
2. Among the two types ____________buffer-overflow is complex to execute and the least common
attack that may take place.
a) memory-based
b) queue-based
c) stack-based
d) heap-based
View Answer
Answer: d
Explanation: Among the two types of buffer-overflow, heap-based buffer-overflow attacks are hard
to execute and the least common of the 2 types. It attacks the application by flooding the space of
memory that is reserved for a program.
3. _____________ buffer overflows, which are more common among attackers.
a) Memory-based
b) Queue-based
c) Stack-based
d) Heap-based
View Answer
Answer: c
Explanation: In the case of stack-based buffer overflows, which is very common among the two
types of buffer-overflow; it exploits applications by flooding the stack: memory-space where users
externally input the data.
4. With the lack of boundary check, the program ends abnormally and leads to ___________ error.
a) logical
b) segmentation
c) compile-time
d) syntax
View Answer
Answer: b
Explanation: In buffer-overflow, with the lack of boundary check, the program ends abnormally and
leads to segmentation error or bus error. Sometimes the application on which the attack was done get
stuck or hang and suddenly the app closes.
5. In an application that uses heap, the memory for data is allocated ____________
a) logical
b) dynamically
c) statically
d) at the beginning of the program
View Answer
Answer: b
Explanation: In an application that uses the heap, memory utilized by the application is allocated
dynamically at runtime. Access to such memories is comparatively slower than memories that use the
stack.
6. In an application that uses stack, the memory for data is allocated ____________
a) logical
b) dynamically
c) statically
d) at the end of the program
View Answer
Answer: c
Explanation: In application that uses heap, memory utilized by the application is allocated at the
beginning of the function call and the memory get released at the end of a program. Accessing of
values in the stack is very fast.
7. Malicious code can be pushed into the _________ during ______________ attack.
a) stack, buffer-overflow
b) queue, buffer-overflow
c) memory-card, buffer-overflow
d) external drive, buffer-overflow
View Answer
Answer: a
Explanation: Malicious code can be pushed into the stack during the buffer-overflow attack. The
overflow can be used to overwrite the return pointer so that the control-flow switches to the
malicious code.
8. Variables that gets created dynamically when a function (such as malloc()) is called is created in
the form of _______ data-structure.
a) array
b) queue
c) stack
d) heap
View Answer
Answer: d
Explanation: Variables that gets created dynamically when a function (such as malloc()) is called is
created in the form of heap data-structure. In heap-based overflow, the buffer is placed on the lower
part of the heap, overwriting all dynamically generated variables.
9. How many primary ways are there for detecting buffer-overflow?
a) 6
b) 3
c) 2
d) 5
View Answer
Answer: c
Explanation: There are two ways to detect buffer-overflow in an application. One way is to look into
the code and check whether the boundary check has been properly incorporated or not. The other
way is to make the executable build of the product, feed the application with a huge amount of data
and check for abnormal behaviour.
10. Testing for buffer-overflow in a system can be done manually and has two possible ways.
a) True
b) False
View Answer
Answer: a
Explanation: Testing for buffer-overflow in a system can be done manually, and has two possible
ways. One way is to look into the code and check whether the boundary check has been properly
incorporated or not. The other way is to make the executable build of the product, feed the
application with a huge amount of data and check for abnormal behaviour
1. Attackers commonly target ____________ for fetching IP address of a target or victim user.
a) websites
b) web pages
c) ip tracker
d) emails
View Answer
Answer: a
Explanation: Enumeration by cyber-attackers is possible through websites also, as the attackers target
websites for fetching the IP address of the victim or the target user.
2. Developing a fake or less useful website and is meant to just fetch the IP address is very easily
done by attackers.
a) True
b) False
View Answer
Answer: a
Explanation: Developing a fake or less useful website and is meant to just fetch the IP address is very
easily done by attackers. Enumeration by cyber-attackers is possible through websites also, as the
attackers target websites for fetching the IP address of the victim or the target user.
3. What common web scripting languages are used by attackers to fetch various details from its
surfing users?
a) Tcl and C#
b) C++ and HTML
c) HTML and Python
d) Perl and JavaScript
View Answer
Answer: d
Explanation: Various scripting languages are used by attackers, such as Perl and JavaScript, that are
programmed to fetch not only the IP address from the site but also other user’s personal information.
4. ______________ is the first phase of ethical hacking.
a) DNS poisoning
b) Footprinting
c) ARP-poisoning
d) Enumeration
View Answer
Answer: d
Explanation: Enumeration is the first phase of Ethical Hacking where a gathering of information is
done for the process of hacking or attacking any victim or system. Here that attacker tries to discover
as much attack vectors as possible.
5. Enumeration is done to gain information. Which of the following cannot be achieved using
enumeration?
a) IP Tables
b) SNMP data, if not secured appropriately
c) Private chats
d) List of username and password policies
View Answer
Answer: c
Explanation: Enumeration is an information gaining technique used in ethical hacking to achieve data
regarding victim’s IP table, SNMP data, lists of username and passwords of different systems etc but
not private chats.
6. Enumeration does not depend on which of the following services?
a) DNS enumeration
b) SNMP enumeration
c) NTP enumeration
d) HTTPS enumeration
View Answer
Answer: d
Explanation: Enumerations depend on the different services that the system offers. These services are
– SMB enumeration, DNS enumeration, SNMP numeration, NTP enumeration, and Linux/Windows
enumeration.
7. __________ suite is used for NTP enumeration.
a) DNS
b) NTP
c) HTTP
d) SNMP
View Answer
Answer: b
Explanation: NTP Suite is employed for NTP enumeration. This is significant for a network
environment; where anyone can discover other primary servers which assist the hosts to update their
time, and the entire process can be done without authenticating.
8. enum4linux is used to enumerate _______________
a) Linux systems
b) Windows systems
c) Chrome systems
d) Mac systems
View Answer
Answer: a
Explanation: ‘enum4linux’ is implemented for enumerating the Linux systems. Using this, the
attacker can examine and establish the usernames that are present in a target host.
9. ___________ is used that tries for guessing the usernames by using SMTP service.
a) smtp-user-enum
b) smtp-enum
c) snmp-enum
d) snmp-user-enum
View Answer
Answer: a
Explanation: SNMP-user-enum is used that tries to guess the usernames by using SMTP service.
Using this, an attacker can examine and establish the usernames that are present in a target host.
10. To stop your system from getting enumerated, you have to disable all services.
a) True
b) False
View Answer
Answer: a
Explanation: To stop your system from getting enumerated, it is recommended to disable all services
that are not in use. It lessens the potential of OS enumeration of your system.
11. Even our emails contain the IP address of the sender which helps in the enumeration. We can get
this IP from ___________ from within the email.
a) ‘forward’ option
b) ‘show original’ option
c) ‘Show full email’
d) ‘View Original’ option
View Answer
Answer: b
Explanation: It is possible to know the IP address of the sender of your email by opening the email
and going to the ‘more’ button and then selecting the ‘show original’ option. In this way, one can
find the IP address and do enumeration.
12. __________________is a computing action used in which usernames & info about user-groups,
shares as well as services of networked computers can be regained.
a) Hardware enumeration
b) System enumeration
c) Network enumeration
d) Cloud enumeration
View Answer
Answer: c
Explanation: Network enumeration is a computing action used in which usernames & info about
user-groups, shares as well as services of networked computers can be regained.
13. Network enumeration is the finding of __________ or devices on a network.
a) hosts
b) servers
c) network connection
d) cloud storage
View Answer
Answer: a
Explanation: Network enumeration is the detection of hosts or devices on a particular network.
Network enumeration is a computing action used in which usernames & info about user-groups,
shares as well as services of networked computers can be regained.
14. A _______________ is a computer program implemented for recovering usernames & info on
groups, shares as well as services of networked computers.
a) hardware enumerator
b) software enumerator
c) network enumerator
d) cloud enumerator
View Answer
Answer: c
Explanation: A network enumerator is a computer program implemented for recovering usernames &
info on groups, shares as well as services of networked computers. These type of programs are used
for network enumeration in order to detect hosts or devices on a particular network.
15. Network enumerator is also known as ________________
a) hardware scanner
b) software enumerator
c) program enumerator
d) network scanner
View Answer
Answer: d
Explanation: Network enumerator is also known as Network scanner which is a computer program
implemented for recovering usernames & info on groups, shares as well as services of networked
computers.
1. An ethical hacker must need to have the skills of understanding the problem, networking
knowledge and to know how the technology works.
a) True
b) False
View Answer
Answer: a
Explanation: An ethical hacker must need to have the skills of understanding the problem,
networking knowledge and to know how the technology works. Password guessing and securing,
network traffic sniffing, exploring for vulnerabilities are some other skills.
2. _________ persistence and up-to-date with the latest technological updates and their flaws are
some of the major qualities; an ethical hacker must need to have.
a) Lack of understanding
b) Weak programming skills
c) High patience
d) Low perseverance
View Answer
Answer: c
Explanation: High patience, persistence, perseverance, and up-to-date with the latest technological
updates and their flaws are some of the major qualities, an ethical hacker must need to have.
3. ________________ enables a hacker to open a piece of program or application and re-build it with
further features & capabilities.
a) Social engineering
b) Reverse engineering
c) Planting malware
d) Injecting code
View Answer
Answer: b
Explanation: Reverse engineering is the technique used to enable a hacker to open a piece of program
or application (usually in a low-level language such as Assembly language) and re-build it with
further features & capabilities.
4. Which of the following do not comes under the intangible skills of hackers?
a) Creative thinking
b) Problem-solving capability
c) Persistence
d) Smart attacking potential
View Answer
Answer: d
Explanation: Every hacker must possess some intangible skill-set such as creative thinking to process
out a new way of penetrating a system, problem-solving skills as to cease down any active attack and
persistence, try in different ways without losing hope.
5. Why programming language is important for ethical hackers and security professionals?
a) Only to write malware
b) For solving problems and building tool and programs
c) To teach programming
d) To develop programs to harm others
View Answer
Answer: b
Explanation: A programming language is important for hackers and security professionals to
understand so that they can understand the working behaviour of any virus, ransomware, or other
malware, or write their own defense code to solve a problem. Nowadays, security tools and malware
are developed by security professionals with high skills and knowledge.
6. Understanding of ___________ is also important for gaining access to a system through networks.
a) os
b) email-servers
c) networking
d) hardware
View Answer
Answer: c
Explanation: A proper understanding of networking is very important for hackers who are trying to
gain access to a system through networks. How TCP/IP works, how topologies are formed and what
protocols are used for what purposes are some mandatory stuff a hacker or security professional must
understand.
7. For hacking a database or accessing and manipulating data which of the following language the
hacker must know?
a) SQL
b) HTML
c) Tcl
d) F#
View Answer
Answer: a
Explanation: For hacking a database or accessing and manipulating data, a hacker must need to have
the knowledge of SQL (Structured Query Language). From a hacker’s perspective, if you’ve
accessed any database for short period of time and want to change some specific data, you must need
to write a proper SQL query to search for or implement your hack faster.
8. Information Gathering about the system or the person or about organization or network is not
important.
a) True
b) False
View Answer
Answer: b
Explanation: Information Gathering about the system or the person or about organization or network
is not important so that as a hacker one can get to know well about the target system or victim.
1. ________________ is an ethical hacking technique used for determining what operating system
(OS) is running on a remote computer.
a) Footprinting
b) Cyber-printing
c) OS fingerprinting
d) OS penetration testing
View Answer
Answer: c
Explanation: OS fingerprinting is an ethical hacking technique used for determining what operating
system (OS) is running on a remote computer.
2. How many types of fingerprinting are there in ethical hacking?
a) 5
b) 4
c) 3
d) 2
View Answer
Answer: d
Explanation: There are two types of fingerprinting in ethical hacking. These are active fingerprinting
and passive fingerprinting. Active fingerprinting is gained if you send especially skilled packets to a
target machine whereas passive fingerprinting is dependent on sniffer traces from the remote
computer.
3. _______________________ is gained if you send especially skilled packets to a target machine.
a) Active fingerprinting
b) Passive fingerprinting
c) OS fingerprinting
d) Network fingerprinting
View Answer
Answer: a
Explanation: Active fingerprinting is gained if you send especially skilled packets to a target machine
and then listing down its replies and analyzing the information gathered for determining the target
OS.
4. _______________________ is based on sniffer traces from the remote system.
a) Active fingerprinting
b) Passive fingerprinting
c) OS fingerprinting
d) Network fingerprinting
View Answer
Answer: b
Explanation: Passive fingerprinting is dependent on the sniffing traces from any remote system.
Depending on the sniffing traces done by tools like Wireshark, attackers can establish and verify the
OS of the remote host.
5. How many basic elements are there for OS fingerprinting?
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: c
Explanation: There are four basic elements that an ethical hacker should look at to determine the
operating system. These are TTL, Don’t fragment bit, Window Size, and Type of Service (TOS).
6. Which of the following do not comes under the important element of OS fingerprinting?
a) TTL
b) TOS
c) DF bits
d) Firewall
View Answer
Answer: d
Explanation: There are four basic elements that an ethical hacker should look at to determine the
operating system. These are TTL (time to Live), Don’t fragment bit, Window Size, and Type of
Service (TOS).
7. By analyzing the factors like TTL, DF bits, Window Size and TOS of a packet, an ethical hacker
may verify the operating system remotely.
a) True
b) False
View Answer
Answer: a
Explanation: There are four basic elements that an ethical hacker should look at to determine the
operating system. By analyzing these elements TTL, DF bits, Window Size and TOS of a packet, an
ethical hacker may verify the operating system remotely.
8. ______________ is a common tool used for doing OS fingerprinting.
a) Hping
b) Wireshark
c) Nmap
d) Nessus
View Answer
Answer: c
Explanation: Nmap is a common tool that is used for performing OS fingerprinting. Before targeting
any system for the attack, it is necessary to know what OS the website is hosting, which can be found
out using some simple command of this tool.
9. To secure your system from such type of attack, you have to hide your system behind any VPN or
proxy server.
a) True
b) False
View Answer
Answer: a
Explanation: It is recommended to hide your system from such fingerprinting attack, performed by
hackers, with a secure proxy server by using VPN tools. This technique will completely preserve
your identity and hence your system.
10. A _____________ is a network scanning practice through which hackers can use to conclude to a
point which IP address from a list of IP addresses is mapping to live hosts.
a) ping-based hacking
b) ping sweep
c) ping-range
d) pinging
View Answer
Answer: b
Explanation: A ping sweep is a network scanning practice through which hackers can use to conclude
to a point which IP address from a list of IP addresses is mapping to live hosts.
11. Ping sweep is also known as ________________
a) ICMP sweep
b) SNMP sweep
c) SGNP sweep
d) SICMP sweep
View Answer
Answer: a
Explanation: A ping sweep which is also known as ICMP sweep is a network scanning practice
through which hackers can use to conclude to a point which IP address from a list of IP addresses is
mapping to live hosts.
12. The _____________ command is used on Linux for getting the DNS and host-related
information.
a) dnslookup
b) lookup
c) nslookup
d) infolookup
View Answer
Answer: c
Explanation: The ‘nslookup’ command is used on Linux for getting the DNS and host-related
information. DNS enumeration is the method used to locate all the DNS-servers and their associated
records.
13. ___________________ is the method used to locate all the DNS-servers and their associated
records for an organization.
a) DNS enumeration
b) DNS hacking
c) DNS cracking
d) DNS server hacking
View Answer
Answer: a
Explanation: DNS enumeration is the method used to locate all the DNS-servers and their associated
records for an organization. ‘nslookup’ command can be used on Linux for getting the DNS and
host-related information.
14. Which of the following operations DNSenum cannot perform?
a) Perform reverse lookups
b) Get the host’s addresses
c) Get extra names and sub-domains through Google scraping
d) Get the admin password
View Answer
Answer: d
Explanation: DNSenum is a popular Perl script that can fetch information such as – fetching host
address, perform a reverse lookup, get additional name and sub-domain through Google scraping etc.
15. The configuration of DNS needs to be done in a secure way.
a) True
b) False
View Answer
Answer: a
Explanation: Configuration of DNS needs to be done in a secure way, otherwise it is possible that
cyber-criminals and hackers may take away lots of sensitive information from the organization
1. ________________ are piece of programs or scripts that allow hackers to take control over any
system.
a) Exploits
b) Antivirus
c) Firewall by-passers
d) Worms
View Answer
Answer: a
Explanation: Exploits are the piece of programs or scripts that allow hackers to take control over any
system. Vulnerability scanners such as Nexpose and Nessus are used for finding such vulnerabilities.
2. The process of finding vulnerabilities and exploiting them using exploitable scripts or programs
are known as _____________
a) infiltrating
b) exploitation
c) cracking
d) hacking
View Answer
Answer: b
Explanation: The process of finding vulnerabilities and exploiting them using exploitable scripts or
programs are known as exploitation. Vulnerability scanners such as Nexpose and Nessus are used for
finding such vulnerabilities and then they are exploited using such programs and scripts.
3. Which of them is not a powerful vulnerability detecting tool?
a) Nessus
b) Nexpose
c) Metasploit
d) Nmap
View Answer
Answer: d
Explanation: Some of the most widely used tools for detecting vulnerabilities in a system are Nessus,
Nexpose, Metasploit and OpenVAS. Hackers use these tools for detecting vulnerabilities and then
write exploits to exploit the systems.
4. __________ is the specific search engine for exploits where anyone can find all the exploits
associated to vulnerability.
a) Google
b) Bing
c) Exploit-db
d) Exploit-engine
View Answer
Answer: c
Explanation: Since based on vulnerabilities, we can find exploits, Exploit-db is the specific search
engine for exploits where anyone can find all the exploits associated with vulnerability. You can find
this from https://www.exploit-db.com.
5. Which of the following are not a vulnerability-listed site/database?
a) Exploit-db
b) Common Vulnerabilities and Exposures (CVE)
c) National Vulnerability Database (NVD)
d) Bing Vulnerability database (BVD)
View Answer
Answer: d
Explanation: Exploit-db (https://www.exploit-db.com/), Common Vulnerabilities and Exposures
(CVE) (https://cve.mitre.org/), and National Vulnerability Database (NVD) (https://nvd.nist.gov/) are
three vulnerability listing site.
6. There are __________ types of exploits based on their working.
a) two
b) three
c) four
d) five
View Answer
Answer: a
Explanation: There are two different types of exploits. These are remote exploits – where hackers can
gain access to the system or network remotely, and local exploits – where the hacker need to access
the system physically and overpass the rights.
7. How many types of exploits are there based on their nature from hacking’s perspective?
a) 4
b) 3
c) 2
d) 5
View Answer
Answer: c
Explanation: There are basically 2 types of exploits based on the nature of their existence and
knowledge. These are known and unknown (i.e. Zero Day). Known exploits are those that are
released publicly and people know about them. Unknown exploits are such type of exploits that are
not known or the bugs are not fixed by vendors or owners.
8. Known exploits have a confirmation of and measures can be taken against it to resolve them.
a) True
b) False
View Answer
Answer: a
Explanation: Known exploits have a confirmation of and measures can be taken against it to resolve
them. These types of vulnerabilities and exploit details are available online in blogs and sites.
9. Unknown exploits are those exploits that have not yet been reported openly and hence present a
straightforward attack at firms and the government agencies.
a) True
b) False
View Answer
Answer: a
Explanation: Unknown exploits are those exploits that have not yet been reported openly and hence
present a straightforward attack at firms and the government agencies. They’re also called Zero-day
exploits.
10. A ____________ is a set of changes done to any program or its associated data designed for
updating, fixing, or improving it.
a) scratch
b) patch
c) fixer
d) resolver
View Answer
Answer: b
Explanation: The term ‘patch’ in the applied computer science is a set of changes done to any
program or its associated data designed for updating, fixing, or improving it. Patch releases are done
by vendors to solve any bug in a system.
11. Fixing of security vulnerabilities in a system by additional programs is known as __________
patches.
a) hacking
b) database
c) server
d) security
View Answer
Answer: d
Explanation: Fixing of security vulnerabilities in a system by additional programs is known as
security patches. These type of patches helps in fixing security bugs and improving the overall
security of the system.
12. Known bugs can be solved or removed by __________________ develop by the vendors of the
application.
a) removing the application
b) changing the software
c) installing security patches
d) installing database patches
View Answer
Answer: c
Explanation: Known bugs and vulnerabilities of a system can be solved or installing or updating the
security patches developed by the vendor or owner of that particular application.
13. ___________________ are some very frequent updates that come for every anti-virus.
a) Patch update
b) Data update
c) Code update
d) Definition update
View Answer
Answer: d
Explanation: Definition updates are some very frequent updates that come for every anti-virus. These
updates are frequently rolled out in order to update your antivirus software with the latest releases of
attack vectors and bugs.
14. National Vulnerability Database (NVD) is _________________ repository of data regarding
vulnerability standards.
a) U.S. government
b) India government
c) Russian government
d) China Government
View Answer
Answer: a
Explanation: National Vulnerability Database (NVD) is the US government repository of data
regarding vulnerability standards. It is available from the link https://nvd.nist.gov.
15. CVE is a directory of lists of publicly recognized information security vulnerabilities as well as
exposures.
a) True
b) False
View Answer
Answer: a
Explanation: CVE is a directory of lists of publicly recognized information security vulnerabilities as
well as exposures. It is available from the link https://cve.mitre.org.
1. Accessing computer without prior authorization is a cyber-crimes that come under _______
a) Section 65
b) Section 66
c) Section 68
d) Section 70
View Answer
Answer: b
Explanation: Under section 66 of IT Act, 2000 which later came up with a much broader and precise
law says that without prior authorization or permission, if any individual access any computer
system, it is a cyber-crime.
2. Cracking digital identity of any individual or doing identity theft, comes under __________ of IT
Act.
a) Section 65
b) Section 66
c) Section 68
d) Section 70
View Answer
Answer: b
Explanation: Under section 66 of IT Act, 2000 which later came up with a much broader and precise
law (as IT Act, 2008) says that if any individual steals the identity or misuse any victim’s identity for
his/her own profit, it is a cyber-crime.
3. Accessing Wi-Fi dishonestly is a cyber-crime.
a) True
b) False
View Answer
Answer: a
Explanation: Under section 66 of IT Act, 2000 which later came up with a much broader and precise
law (as IT Act, 2008) says that if any individual access anyone’s Wi-Fi network without the
permission of the owner or for doing a malicious activity, it is a cyber-crime.
4. Download copy, extract data from an open system done fraudulently is treated as _________
a) cyber-warfare
b) cyber-security act
c) data-backup
d) cyber-crime
View Answer
Answer: d
Explanation: Download copy, extract data from an open system done fraudulently is treated as
according to section 66 of the Indian IT Act.
5. Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around
Rs ________
a) 2 lacs
b) 3 lacs
c) 4 lacs
d) 5 lacs
View Answer
Answer: d
Explanation: Any cyber-crime that comes under section 66 of the Indian IT Act, the person accused
of such cyber-crime gets fined of around five lacs rupees.
6. How many years of imprisonment can an accused person face, if he/she comes under any cyber-
crime listed in section 66 of the Indian IT Act, 2000?
a) 1 year
b) 2 years
c) 3 years
d) 4 years
View Answer
Answer: c
Explanation: Any cyber-crime that comes under section 66 of the Indian IT Act, the person accused
of such cyber-crime gets fined of around five lacs rupees and 3 years of imprisonment.
7. Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-
crime that comes under _________ of IT Act.
a) Section 66
b) Section 67
c) Section 68
d) Section 69
View Answer
Answer: b
Explanation: Any digital content which is either lascivious is not acceptable by the society or viewers
or that digital item corrupts the minds of the audience, then the creator of such contents falls under
the cyber-crime of section 67 of the Indian IT Act.
8. IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes
sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a
legitimate amount of fine.
a) section 67-A
b) section 67-B
c) section 67-C
d) section 67-D
View Answer
Answer: a
Explanation: IT Act 2008 makes cyber-crime details more precise where it mentioned if anyone
publishes sexually explicit digital content then under section 67 – A he/she has to pay a legitimate
amount of fine.
9. If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of
_________ years.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: d
Explanation: IT Act 2008 make cyber-crime details more precise where it mentioned if anyone
publishes sexually explicit digital content then under section 67 – A he/she has to pay a legitimate
amount of fine and imprisonment of five years.
10. Using spy cameras in malls and shops to capture private parts of any person comes under
_______ of IT Act, 2008.
a) Section 66
b) Section 67
c) Section 68
d) Section 69
View Answer
Answer: b
Explanation: Using of spy cameras in malls and shops to capture private parts of any person, without
the concern of that victim, then it comes under section 67 of IT Act, 2008 as a punishable offense.
11. Using spy cameras in malls and shops to capture private parts of any person comes under section
67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.
a) True
b) False
View Answer
Answer: a
Explanation: Using of spy cameras in malls and shops to capture private parts of any person, without
the concern of that victim, then it comes under section 67 of IT Act, 2008 where the person doing
such crime is punished with a fine of Rs. 5 Lacs.
12. Using of spy cameras in malls and shops to capture private parts of any person comes under
section 67 of IT Act, 2008 and is punished with imprisonment of ___________
a) 2 years
b) 3 years
c) 4 years
d) 5 years
View Answer
Answer: b
Explanation: Using of spy cameras in malls and shops to capture private parts of any person, without
the concern of that victim, then it comes under section 67 of IT Act, 2008 where the person doing
such crime is punished with imprisonment of 3 years.
13. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
a) section 65
b) section 66
c) section 71
d) section 72
View Answer
Answer: d
Explanation: Cyber-criminals and black hat hackers do one common form of cyber-crime that is a
misuse of digital signatures. The law for this fraudulent act comes under section 72 of the Indian IT
Act.
14. Sending offensive message to someone comes under _____________ of the Indian IT Act
______
a) section 66-A, 2000
b) section 66-B, 2008
c) section 67, 2000
d) section 66-A, 2008
View Answer
Answer: d
Explanation: Sending an offensive message, emails o any digital content through an electronic
medium to your recipient is a punishable offense that comes under section 66 – A of the Indian IT
Act, 2008.
15. Stealing of digital files comes under __________ of the Indian IT Act.
a) section 66-A
b) section 66-B
c) section 66-C
d) section 66-D
View Answer
Answer: c
Explanation: Stealing of digital files, e-documents from any system or cloud or electronic device is a
punishable offense that comes under section 66 – C of the Indian IT Act.
16. Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in
corporate firms or organizations will be a punishable offense.
a) True
b) False
View Answer
Answer: a
Explanation: Section 79 of the Indian IT Act covers some of the corporate and business laws
circulating technologies and cyberspace; declares that any 3rd party information or personal data
leakage in corporate firms or organizations will be a punishable offense.
1. Which of the following attach is not used by LC4 to recover Windows password?
a) Brute-force attack
b) Dictionary attack
c) MiTM attack
d) Hybrid attacks
View Answer
Answer: c
Explanation: LC4 is a password auditing and recovery tool; used for testing strength of a password
and also helps in recovering lost Microsoft Windows passwords using a hybrid attack, brute-force
attack as well as using a dictionary attack.
2. ____________ is the world’s most popular vulnerability scanner used in companies for checking
vulnerabilities in the network.
a) Wireshark
b) Nessus
c) Snort
d) WebInspect
View Answer
Answer: b
Explanation: Nessus is a popular and proprietary network vulnerability scanning tool developed by
Tenable Network Security. It helps in easily identifying vulnerabilities and fix them, which includes
missing patches and software flaws.
3. _____________ is a tool which can detect registry issues in an operating system.
a) Network Stumbler
b) Ettercap
c) Maltego
d) LANguard Network Security Scanner
View Answer
Answer: d
Explanation: LANguard Network Security Scanner helps in monitoring networks by scanning
connected machines to provide information for every node. It can also be used for identifying
registry issues.
4. Network Stumbler is a Windows Wi-Fi monitoring tool.
a) True
b) False
View Answer
Answer: a
Explanation: Network Stumbler is a popular tool that helps in detecting WLANs and helps hackers in
finding non-broadcasting wireless networks. It is popularly used as Wi-Fi scanning and monitoring
tool for Windows.
5. ToneLoc is abbreviated as __________
a) Tone Locking
b) Tone Locator
c) Tone Locker
d) Tune Locator
View Answer
Answer: c
Explanation: ToneLoc is a popular and primitive tool written for MS-DOS users. It is basically used
by malicious attackers to guess user accounts, finding entry points in modems and locating modems
connected in the network.
6. __________ is a debugger and exploration tool.
a) Netdog
b) Netcat
c) Tcpdump
d) BackTrack
View Answer
Answer: b
Explanation: Netcat is an easy Unix utility that helps in reading and writing data across network
connections, using TCP or UDP protocol. It is popularly used as a debugger and exploration tool that
is found free for Windows and Mac OS also.
7. __________ is a popular command-line packet analyser.
a) Wireshark
b) Snort
c) Metasploit
d) Tcpdump
View Answer
Answer: d
Explanation: Tcpdump is a popular command-line network packet analyzer. It allows its user in
displaying TCP / IP as well as other data packets being transmitted or received over the computer
network.
8. ________________ is a platform that essentially keeps the log of data from networks, devices as
well as applications in a single location.
a) EventLog Analyser
b) NordVPN
c) Wireshark
d) PacketFilter Analyzer
View Answer
Answer: a
Explanation: EventLog Analyser is a tool that basically keeps the log of data from networks, devices
as well as applications in a single location. Latest encryption techniques are used for securing its
stored data.
9. ______________ is competent to restore corrupted Exchange Server Database files as well as
recovering unapproachable mails in mailboxes.
a) Outlook
b) Nessus
c) Mailbox Exchange Recovery
d) Mail Exchange Recovery toolkit
View Answer
Answer: c
Explanation: Mailbox Exchange Recovery is competent to restore corrupted Exchange Server
Database files as well as recovering unapproachable mails in mailboxes. This tool is popularly used
by ethical hackers and cyber-forensics investigators in recovering emails, calendars, attachments,
contacts from inaccessible mail-servers.
10. ________________ helps in protecting businesses against data breaches that may make threats to
cloud.
a) Centrify
b) Mailbox Exchange Recovery
c) Nessus
d) Dashline
View Answer
Answer: a
Explanation: Centrify helps in protecting businesses against data breaches that may make threats to
the cloud. This is done by securing Centrify users by providing internal, external and privileged
users.
11. __________ is a popular corporate security tool that is used to detect the attack on email with
cloud only services.
a) Cain and Abel
b) Proofpoint
c) Angry IP Scanner
d) Ettercap
View Answer
Answer: b
Explanation: Proofpoint is a popular corporate security tool that is used to detect an attack on email
with cloud-only services. It helps firms detect attack vectors and loopholes in different security
systems through which attackers may gain access.
12. _____________ helps in protecting corporate data, communications and other assets.
a) Snort
b) CipherCloud
c) Burp Suit
d) Wireshark
View Answer
Answer: b
Explanation: CipherCloud helps in protecting corporate data, different communications as well as
other assets. This includes anti-virus scanning facility, encryption & traffic monitoring. In addition, it
provides mobile security support also
1. _________ framework made cracking of vulnerabilities easy like point and click.
a) .Net
b) Metasploit
c) Zeus
d) Ettercap
View Answer
Answer: b
Explanation: In the year 2003, the Metasploit framework was released which made finding and
cracking of vulnerabilities easy and is used by both white as well as black hat hackers.
2. Nmap is abbreviated as Network Mapper.
a) True
b) False
View Answer
Answer: a
Explanation: Network Mapper (Nmap) is a popular open-source tool used for discovering network as
well as security auditing. It can be used for either a single host network or large networks.
3. __________ is a popular tool used for discovering networks as well as in security auditing.
a) Ettercap
b) Metasploit
c) Nmap
d) Burp Suit
View Answer
Answer: c
Explanation: Network Mapper (Nmap) is a popular open-source tool used for discovering network as
well as security auditing. It can be used for either a single host network or large networks.
4. Which of this Nmap do not check?
a) services different hosts are offering
b) on what OS they are running
c) what kind of firewall is in use
d) what type of antivirus is in use
View Answer
Answer: d
Explanation: Network Mapper (Nmap) is a popular open-source tool used for discovering network as
well as security auditing. It usually checks for different services used by the host, what operating
system it is running and the type of firewall it is using.
5. Which of the following deals with network intrusion detection and real-time traffic analysis?
a) John the Ripper
b) L0phtCrack
c) Snort
d) Nessus
View Answer
Answer: c
Explanation: Snort is a network intrusion detecting application that deals with real-time traffic
analysis. As the rules are set and kept updated, they help in matching patterns against known patterns
and protect your network.
6. Wireshark is a ____________ tool.
a) network protocol analysis
b) network connection security
c) connection analysis
d) defending malicious packet-filtering
View Answer
Answer: a
Explanation: Wireshark is popular standardized network protocol analysis tools that allow in-depth
check and analysis of packets from different protocols used by the system.
7. Which of the below-mentioned tool is used for Wi-Fi hacking?
a) Wireshark
b) Nessus
c) Aircrack-ng
d) Snort
View Answer
Answer: c
Explanation: Weak wireless encryption protocols get easily cracked using Aircrack WPA and
Aircrack WEP attacks that comes with Aircrack-ng tool. Its packet sniffing feature keeps track of all
its traffic without making any attack.
8. Aircrack-ng is used for ____________
a) Firewall bypassing
b) Wi-Fi attacks
c) Packet filtering
d) System password cracking
View Answer
Answer: b
Explanation: Weak wireless encryption protocols get easily cracked using Aircrack WPA and
Aircrack WEP. Its packet sniffing feature keeps track of all its traffic without making any attack.
9. _____________ is a popular IP address and port scanner.
a) Cain and Abel
b) Snort
c) Angry IP Scanner
d) Ettercap
View Answer
Answer: c
Explanation: Angry IP scanner is a light-weight, cross-platform IP and port scanning tool that scans a
range of IP. It uses the concept of multithreading for making fast efficient scanning.
10. _______________ is a popular tool used for network analysis in multiprotocol diverse network.
a) Snort
b) SuperScan
c) Burp Suit
d) EtterPeak
View Answer
Answer: d
Explanation: EtterPeak is a network analysis tool that can be used for multiprotocol heterogeneous
networking architecture. It can help in sniffing packets of network traffic.
11. ____________ scans TCP ports and resolves different hostnames.
a) SuperScan
b) Snort
c) Ettercap
d) QualysGuard
View Answer
Answer: a
Explanation: SuperScan has a very nice user-friendly interface and it is used for scanning TCP ports
as well as resolve hostnames. It is popularly used for scanning ports from a given range of IP.
12. ___________ is a web application assessment security tool.
a) LC4
b) WebInspect
c) Ettercap
d) QualysGuard
View Answer
Answer: b
Explanation: WebInspect is a popular web application security tool used for identifying known
vulnerabilities residing in web-application layer. It also helps in penetration testing of web servers.
13. Which of the following attack-based checks WebInspect cannot do?
a) cross-site scripting
b) directory traversal
c) parameter injection
d) injecting shell code
View Answer
Answer: d
Explanation: WebInspect can check whether a web server is properly configured or not by attempting
for common attacks such as Cross-site scripting, directory traversal, and parameter injection. But it
cannot inject malicious shell code in the server.
14. ________ is a password recovery and auditing tool.
a) LC3
b) LC4
c) Network Stumbler
d) Maltego
View Answer
Answer: b
Explanation: LC4 which was previously known as L0phtCrack is a password auditing and recovery
tool; used for testing strength of a password and also helps in recovering lost Microsoft Windows
passwords.
15. L0phtCrack is formerly known as LC3.
a) True
b) False
View Answer
Answer: b
Explanation: L0phtCrack is now commonly known as LC4 is a password auditing and recovery tool;
used for testing strength of a password and also helps in recovering lost Microsoft Windows
passwords.
1. ___________ is an activity that takes place when cyber-criminals infiltrates any data source and
takes away or alters sensitive information.
a) Data-hack
b) Data-stealing
c) Database altering
d) Data breach
View Answer
Answer: d
Explanation: Data breach an activity that takes place when cyber-criminals infiltrates any data source
and takes away or alters sensitive information. This is either done using a network to steal all local
files or get access physically to a system.
2. Which of these is not a step followed by cyber-criminals in data breaching?
a) Research and info-gathering
b) Attack the system
c) Fixing the bugs
d) Exfiltration
View Answer
Answer: c
Explanation: During a hack, the cyber-criminals first do a research on the victim gathers information
on the victim’s system as well as network. Then perform the attack. Once the attacker gains access it
steals away confidential data.
3. What types of data are stolen by cyber-criminals in most of the cases?
a) Data that will pay once sold
b) Data that has no value
c) Data like username and passwords only
d) Data that is old
View Answer
Answer: a
Explanation: Usually, cyber-criminals steal those data that are confidential and adds value once they
are sold to the dark-market or in different deep web sites. Even these days, different companies buy
customer data at large for analyzing data and gain profit out of it.
4. Which of the companies and organizations do not become the major targets of attackers for data
stealing?
a) Business firms
b) Medical and Healthcare
c) Government and secret agencies
d) NGOs
View Answer
Answer: d
Explanation: Attackers target large organizations and firms that consists of business firms, financial
corporations, medical and healthcare firms, government and secret agencies, banking sectors.
They’ve valuable information which can cost them huge so major targets for hackers focuses such
firms only.
5. ___________ will give you an USB which will contain ___________ that will take control of your
system in the background.
a) Attackers, Trojans
b) White hat hackers, antivirus
c) White hat hackers, Trojans
d) Attackers, antivirus
View Answer
Answer: a
Explanation: To do a security breaching in your system, your friend or anyone whom you deal with
may come up with a USB drive and will give you to take from you some data. But that USB drive
may contain Trojan that will get to your computer once triggered. So try using updated antivirus in
your system.
6. An attacker, who is an employee of your firm may ___________ to know your system password.
a) do peeping
b) perform network jamming
c) do shoulder surfing
d) steal your laptop
View Answer
Answer: c
Explanation: An attacker, who is an employee of your firm may do shoulder surfing to know your
system password. Shoulder surfing is a social engineering technique used to secretly peep to gain
knowledge of your confidential information.
7. You may throw some confidential file in a dustbin which contains some of your personal data.
Hackers can take your data from that thrown-away file also, using the technique _________
a) Dumpster diving
b) Shoulder surfing
c) Phishing
d) Spamming
View Answer
Answer: a
Explanation: Dumpster diving is a social engineering technique used by hackers to grab your
personal and confidential data from that thrown-away file also. Using these data attackers may use
password guessing or fraud calls (if they find your personal phone number).
8. ATM Skimmers are used to take your confidential data from your ATM cards.
a) True
b) False
View Answer
Answer: a
Explanation: ATM card skimmers are set up by attackers in ATM machines which look exactly same
but that secretly inserted machine will take information from the magnetic strip of your card and
store it in its memory card or storage chip.
9. _____________ will encrypt all your system files and will ask you to pay a ransom in order to
decrypt all the files and unlock the system.
a) Scareware
b) Ransomware
c) Adware
d) Spyware
View Answer
Answer: b
Explanation: Ransomware is special types of malware that will infect your system, compromise all
data by encrypting them and will pop up asking you for a ransom which will be in the form of
Bitcoins (so that the attacker do not get tracked) and once the ransom is paid, it will release all files.
10. ______________ are special malware programs written by elite hackers and black hat hackers to
spy your mobile phones and systems.
a) Scareware
b) Ransomware
c) Adware
d) Spyware
View Answer
Answer: d
Explanation: Spywares are special malware programs written by elite hackers and black hat hackers
to spies your mobile phones and systems. This program secretly spy on the target system or user and
takes their browsing activities, app details and keeps track of their physical locations.
11. The antivirus or PC defender software in a system helps in detecting virus and Trojans.
a) True
b) False
View Answer
Answer: a
Explanation: The antivirus or PC defender software in a system helps in detecting virus and Trojans
provided the antivirus or the defender application needs to be up-to-date.
12. Clicking a link which is there in your email which came from an unknown source can redirect
you to ____________ that automatically installs malware in your system.
a) that vendor’s site
b) security solution site
c) malicious site
d) software downloading site
View Answer
Answer: c
Explanation: Clicking a link which is there in your email which came from an unknown source can
redirect you to a malicious site that will automatically install malware in your system. The mail will
be sent by the attacker.
13. An attacker may use automatic brute forcing tool to compromise your ____________
a) username
b) employee ID
c) system / PC name
d) password
View Answer
Answer: d
Explanation: In most of the cases, the attacker uses automated brute force tools for compromising
your PIN or password. This makes fetching of your password easier by a combination of different
letters as a trial-and-error approach.
14. The attacker will use different bots (zombie PCs) to ping your system and the name of the attack
is _________________
a) Distributed Denial-of-Service (DDoS)
b) Permanent Denial-of-Service (PDoS)
c) Denial-of-Service (DoS)
d) Controlled Denial-of-Service (CDoS)
View Answer
Answer: a
Explanation: Here the attacker uses multiple PCs and floods the bandwidth/resources of the victim’s
system, (usually 1 or many web-servers). The attack uses zombie PCs and each of the PC’s are
remotely controlled by the attacker.
15. Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive,
documents or other components to make their hands dirty on your confidential information.
a) True
b) False
View Answer
Answer: a
Explanation: Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen
drive, documents or other components to make their hands dirty on your confidential information.
This type of hacking comes under physical hacking
1. The ____________ model is 7-layer architecture where each layer is having some specific
functionality to perform.
a) TCP/IP
b) Cloud
c) OSI
d) OIS
View Answer
Answer: c
Explanation: The OSI model is 7-layer architecture where each layer is having some specific
functionality to perform. All these layers work in collaboration for transmitting the data from 1
person to another worldwide.
2. The full form of OSI is OSI model is ______________
a) Open Systems Interconnection
b) Open Software Interconnection
c) Open Systems Internet
d) Open Software Internet
View Answer
Answer: a
Explanation: The OSI model is 7-layer architecture where each layer is having some specific
functionality to perform. All these layers work in collaboration for transmitting the data from 1
person to another worldwide.
3. Which of the following is not physical layer vulnerability?
a) Physical theft of data & hardware
b) Physical damage or destruction of data & hardware
c) Unauthorized network access
d) Keystroke & Other Input Logging
View Answer
Answer: c
Explanation: Unauthorized network access is not an example of physical layer vulnerability. The rest
three – Physical theft of data & hardware, damage or destruction of data & hardware and keystroke
& Other Input Logging are physical layer vulnerabilities.
4. In __________________ layer, vulnerabilities are directly associated with physical access to
networks and hardware.
a) physical
b) data-link
c) network
d) application
View Answer
Answer: a
Explanation: In the physical layer, vulnerabilities are directly associated with physical access to
networks and hardware such as unauthorised network access, damage or destruction of data &
hardware and keystroke & Other Input Logging.
5. Loss of power and unauthorized change in the functional unit of hardware comes under problems
and issues of the physical layer.
a) True
b) False
View Answer
Answer: a
Explanation: Loss of power and unauthorized change in the functional unit of hardware comes under
problems and issues of the physical layer. Other such issues are unauthorised network access,
damage or destruction of data & hardware and keystroke & Other Input Logging.
6. Which of the following is not a vulnerability of the data-link layer?
a) MAC Address Spoofing
b) VLAN circumvention
c) Switches may be forced for flooding traffic to all VLAN ports
d) Overloading of transport-layer mechanisms
View Answer
Answer: d
Explanation: MAC Address Spoofing, VLAN circumvention and switches may be forced for
flooding traffic to all VLAN ports are examples of data-link layer vulnerability.
7. ____________ is data-link layer vulnerability where stations are forced to make direct
communication with another station by evading logical controls.
a) VLAN attack
b) VLAN Circumvention
c) VLAN compromisation method
d) Data-link evading
View Answer
Answer: b
Explanation: VLAN Circumvention is data-link layer vulnerability where stations are forced to make
direct communication with another station by evading logical controls implemented using subnets
and firewalls.
8. ________________may be forced for flooding traffic to all VLAN ports allowing interception of
data through any device that is connected to a VLAN.
a) Switches
b) Routers
c) Hubs
d) Repeaters
View Answer
Answer: a
Explanation: Switches may be forced for flooding traffic to all VLAN ports allowing interception of
data through any device that are connected to a VLAN. It is a vulnerability of data link layer.
9. Which of the following is not a vulnerability of the network layer?
a) Route spoofing
b) Identity & Resource ID Vulnerability
c) IP Address Spoofing
d) Weak or non-existent authentication
View Answer
Answer: d
Explanation: Weak or non-existent authentication is a vulnerability of the session layer. Route
spoofing, identity & resource ID vulnerability & IP Address Spoofing are examples of network layer
vulnerability.
10. Which of the following is an example of physical layer vulnerability?
a) MAC Address Spoofing
b) Physical Theft of Data
c) Route spoofing
d) Weak or non-existent authentication
View Answer
Answer: b
Explanation: Physical theft of data is an example of physical layer vulnerability. Other such issues
are unauthorized network access, damage or destruction of data & hardware and keystroke & Other
Input Logging.
11. Which of the following is an example of data-link layer vulnerability?
a) MAC Address Spoofing
b) Physical Theft of Data
c) Route spoofing
d) Weak or non-existent authentication
View Answer
Answer: a
Explanation: MAC Address spoofing is an example of data-link layer vulnerability. VLAN
circumvention, as well as switches, may be forced for flooding traffic to all VLAN ports are some
other examples of data-link layer vulnerability.
12. Which of the following is an example of network layer vulnerability?
a) MAC Address Spoofing
b) Physical Theft of Data
c) Route spoofing
d) Weak or non-existent authentication
View Answer
Answer: c
Explanation: Route spoofing is an example of network layer vulnerability. Other examples of
network layer vulnerabilities are IP Address Spoofing and Identity & Resource ID Vulnerability.
13. Which of the following is an example of physical layer vulnerability?
a) MAC Address Spoofing
b) Route spoofing
c) Weak or non-existent authentication
d) Keystroke & Other Input Logging
View Answer
Answer: d
Explanation: Keystroke & other input logging is an example of physical layer vulnerability. Other
such physical layer vulnerabilities are unauthorized network access, damage or destruction of data &
hardware and keystroke & Other Input Logging.
14. Which of the following is an example of data-link layer vulnerability?
a) Physical Theft of Data
b) VLAN circumvention
c) Route spoofing
d) Weak or non-existent authentication
View Answer
Answer: b
Explanation: VLAN circumvention is an example of data-link layer vulnerability. MAC Address
Spoofing, as well as switches, may be forced for flooding traffic to all VLAN ports are some other
examples of data-link layer vulnerability.
1. TCP/IP is extensively used model for the World Wide Web for providing network
communications which are composed of 4 layers that work together.
a) True
b) False
View Answer
Answer: a
Explanation: TCP/IP is extensively used model for the World Wide Web for providing network
communications which are composed of 4 layers that work together. Each layer is composed of
header and payload.
2. TCP/IP is composed of _______ number of layers.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: c
Explanation: TCP/IP is extensively used model for the World Wide Web for providing network
communications which are composed of 4 layers that work together. Each layer is composed of
header and payload.
3. Trusted TCP/IP commands have the same needs & go through the identical verification process.
Which of them is not a TCP/IP command?
a) ftp
b) rexec
c) tcpexec
d) telnet
View Answer
Answer: c
Explanation: Trusted TCP/IP commands such as ftp, rexec and telnet have the same needs & go
through the identical verification process. Internet & TCP/IP are often implemented synonymously.
4. Connection authentication is offered for ensuring that the remote host has the likely Internet
Protocol (IP) ___________ & _________
a) address, name
b) address, location
c) network, name
d) network, location
View Answer
Answer: a
Explanation: Connection authentication is offered for ensuring that the remote host has the likely
Internet Protocol (IP)’s address & name. This avoids a remote host to masquerade as an added
remote host.
5. Application layer sends & receives data for particular applications using Hyper Text Transfer
Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).
a) True
b) False
View Answer
Answer: a
Explanation: Application layer sends & receives data for particular applications using HyperText
Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP). Hence, data encryption for
HTTP and SMTP is important.
6. TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat.
a) True
b) False
View Answer
Answer: a
Explanation: Return of Bleichenbacher’s Oracle Threat is a transport layer vulnerability that allows
an attacker to get hold of the RSA key essential to decrypt TLS traffic below certain conditions.
7. RoBOT is abbreviated as ___________
a) Return of Bleichenbacher’s Oracle Team
b) Rise of Bleichenbacher’s Oracle Threat
c) Return of Bleichenbacher’s Operational Threat
d) Return of Bleichenbacher’s Oracle Threat
View Answer
Answer: d
Explanation: Return of Bleichenbacher’s Oracle Threat is a transport layer vulnerability that allows
an attacker to get hold of the RSA key essential to decrypt TLS traffic below certain conditions.
8. There are __________ different versions of IP popularly used.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: a
Explanation: There are two different versions of IPs used popularly over the internet. These are IPv4
and IPv6. IPv4 is a 32-bits numeric address written in decimal with 4 numbers separated by dots
whereas IPv6 addresses are 128-bits written in hexadecimal & separated by colons.
9. ____________ is an attack where the attacker is able to guess together with the sequence number
of an in progress communication session & the port number.
a) TCP Spoofing
b) TCP Blind Spoofing
c) IP Spoofing
d) IP Blind Spoofing
View Answer
Answer: b
Explanation: TCP Blind Spoofing is an attack where the attacker is able to guess together with the
sequence number of an in progress communication session & the port number.
10. ___________ is an attack technique where numerous SYN packets are spoofed with a bogus
source address which is then sent to an inundated server.
a) SYN flooding attack
b) ACK flooding attack
c) SYN & ACK flooding attack
d) Packet flooding attack
View Answer
Answer: a
Explanation: SYN flooding attack is an attack technique where numerous SYN packets are spoofed
with a bogus source address which is then sent to an inundated server. The SYN & ACK segments
need to begin in a TCP connection.
11. Which of them is not an attack done in the network layer of the TCP/IP model?
a) MITM attack
b) DoS attack
c) Spoofing attack
d) Shoulder surfing
View Answer
Answer: d
Explanation: MITM, Denial of Service (DoS), and spoofing attacks are possible in the network layer
of the TCP/IP model. It is important to secure the network layer as it is the only means to make
certain that your application is not getting flooded with attacks.
12. Which of them is not an appropriate method of router security?
a) Unused ports should be blocked
b) Unused interfaces and services should be disabled
c) Routing protocol needs to be programmed by security experts
d) Packet filtering needs to be enabled
View Answer
Answer: c
Explanation: Unused ports should be blocked, Unused interfaces and services should be disabled, and
Packet filtering needs to be enabled are some of the security measures that need to be taken for the
routers.
13. Which 2 protocols are used in the Transport layer of the TCP/IP model?
a) UDP and HTTP
b) TCP and UDP
c) HTTP and TCP
d) ICMP and HTTP
View Answer
Answer: b
Explanation: The transport layer can voluntarily declare the consistency of communications.
Transmission Control Protocol (TCP) & User Datagram Protocol (UDP) are the most common
transport layer protocols.
14. Which of the protocol is not used in the network layer of the TCP/IP model?
a) ICMP
b) IP
c) IGMP
d) HTTP
View Answer
Answer: d
Explanation: Internet Control Message Protocol (ICMP), Internet Protocol (IP) and Internet Group
Management Protocol (IGMP) are used in the network layer. HTTP is used in application layer of
TCP/IP model.
15. ____________ protocol attack is done in the data-link layer.
a) HTTP
b) DNS
c) TCP/IP
d) POP
View Answer
Answer: b
Explanation: DNS protocol attack is done in the application layer of the TCP/IP model which allows
attackers to modify DNS records in order to misdirect user traffic and land them in some malicious or
spoofed address
1. _____________ is the illicit transmission of data from inside an organization or personal system to
an external location or recipient.
a) Database hacking
b) Data leakage
c) Data cracking
d) Data revealing
View Answer
Answer: b
Explanation: Data leakage is the illicit transmission of data from inside an organization or personal
system to an external location or recipient. The phrase is used for describing data that is transferred
electronically or even physically.
2. Data leakage threats do not usually occur from which of the following?
a) Web and email
b) Mobile data storage
c) USB drives and laptops
d) Television
View Answer
Answer: d
Explanation: Data leakage threats are common from web and emails, mobile data storage devices
such as internal or external storage and memory cards, from USB drives and laptops.
3. Data leakage is popularly known as ___________
a) data theft
b) data crack
c) low and slow data theft
d) slow data theft
View Answer
Answer: c
Explanation: Data leakage is also known as ‘low and slow data theft’, which is a massive issue for
data security & the damage caused to any firm is enormous. Every day there is at least one report of
data theft that occurs worldwide.
4. There are __________ major types of data leakage.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: b
Explanation: There are three major types of data leakage. These are – data breach by accident, data
leak done by ill-intentioned employees and electronic communication with malicious intent.
5. “Unauthorized” data leakage doesn’t essentially mean intended or malicious.
a) True
b) False
View Answer
Answer: a
Explanation: “Unauthorized” data leakage doesn’t essentially mean intended or malicious. It has
been found that the majority of data leakage incidents are accidental but the loss occurred are severe.
6. Unintentional data leakage can still result in the same penalties and reputational damage.
a) True
b) False
View Answer
Answer: a
Explanation: “Unintentional” data leakage doesn’t essentially mean intended or malicious. It has
been found that the majority of data leakage incidents are accidental but it can still result in the same
penalties and reputational damage.
7. When leakage of data is done purposely or because of the lack of employee’s concern toward
confidential data is called ___________ done by employees of an organization.
a) Ill-intentional data leakage
b) Malfunctioned in database
c) A malfunction in online data
d) ill-intension of an outsider
View Answer
Answer: a
Explanation: When leakage of data is done purposely or because of the lack of employee’s concern
toward confidential data is called Ill-intentional data leakage done by employees of an organization.
8. Which of them is not an example of physical data leakage?
a) dumpster diving
b) shoulder surfing
c) printers and photocopiers
d) phishing
View Answer
Answer: d
Explanation: Physical data leakage can be done intentionally by criminal-minded people who can
fetch data from dumpster diving, shoulder surfing, data mentioned in printed papers or taken out of
photocopiers.
Cyber Security Questions and Answers – Security Phases –
Data Leakage and Prevention – 2
« Prev
Next »
This set of Cyber Security online test focuses on “Security Phases – Data Leakage and Prevention –
2”.
1. ____________ is the term used for gathering information about your competitors from online
resources, researches, and newsgroups.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering
View Answer
Answer: a
Explanation: Competitive Intelligence gathering is the term used for gathering information about
your competitors from online resources, researches, and newsgroups. The competitive intelligence
gathering is non-interfering & subtle in nature.
2. The ______________ intelligence gathering is non-interfering & subtle in nature.
a) cognitive
b) competitive
c) cyber
d) concrete
View Answer
Answer: b
Explanation: Competitive Intelligence gathering is the term used for gathering information about
your competitors from online resources, researches, and newsgroups. The competitive intelligence
gathering is non-interfering & subtle in nature.
3. In the world of data, where data is considered the oil and fuel of modern technology
_____________ is both a product and a process.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering
View Answer
Answer: a
Explanation: In the world of data, where data is considered the oil and fuel of modern technology,
Competitive Intelligence gathering is both a product and a process.
4. Which of them is not a proper step in competitive intelligence data processing?
a) Data gathering
b) Data analysis
c) Information security
d) Network analysis
View Answer
Answer: d
Explanation: In the world of data, where data is considered the oil and fuel of modern technology,
Competitive Intelligence gathering is both a product and a process which comprises of some
predefined steps to handle data. These are data gathering, analysis, verification, and security.
5. Which one of the following is a proper step in competitive intelligence data processing?
a) Competitors’ data compromising
b) Data hacking
c) Data analysis
d) Competitors’ data stealing
View Answer
Answer: c
Explanation: In the world of data, where data is considered the oil and fuel of modern technology,
Competitive Intelligence gathering is both a product and a process which comprises of some specific
steps to handle data. These are data gathering, analysis, verification, and security.
6. There are __________ types of cognitive hacking and information gathering which is based on the
source type, from where data is fetched.
a) 6
b) 5
c) 4
d) 3
View Answer
Answer: d
Explanation: There are two types of cognitive hacking and information gathering which are based on
the source type, from where data is fetched. These are single source & multiple sources.
7. ______________ is important to grab a quick understanding and analyzing about your competitors
or target user’s need.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering
View Answer
Answer: a
Explanation: In the world of data, where data is considered the oil and fuel of modern technology,
Competitive Intelligence gathering is both a product and a process. Hackers are hired with skills for
gathering competitive knowledge so that data analysts can analyze those for further understanding of
products.
8. Which of them is not a reason for competitive information gathering?
a) Compare your product with competitors
b) Analyze the market position of yours with competitors
c) Fetching confidential plans about your competitors
d) Pull out a list of your competitive firms in the market
View Answer
Answer: c
Explanation: Fetching confidential plans about your competitors’ is not the work of ethical hackers
hired for competitive information gathering. Also fetching such type of confidential information is a
crime.
9. Competitive information gathering if done in the form of active attack using malware or by other
illicit means can put your hired hacker or your company at stake.
a) True
b) False
View Answer
Answer: a
Explanation: By the name of competitive information gathering if done in the form of active attack
using malware or by other illicit means can put your hired hacker or your company at stake. It’s a
cyber-crime also.
10. Predict and analyze the tactics of competitors from data taken out from online data sources is a
crime.
a) True
b) False
View Answer
Answer: b
Explanation: Predict and analyze the tactics of competitors from data taken out from online data
sources is a crime. In the world of data, where data is considered the oil and fuel of modern
technology. It can be done using competitive intelligence gathering techniques.
11. https://www.bidigital.com/ci/ is a website which is used for _________________
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering
View Answer
Answer: a
Explanation: In the world of data, where data is considered the oil and fuel of modern technology,
Competitive Intelligence gathering is both a product and a process. https://www.bidigital.com/ci/ is a
website which is used for such purpose.
12. Which of the following is a site used for Competitive Intelligence gathering?
a) https://www.bidigital.gov/
b) https://www.cig.com/ci/
c) https://www.coginfo.com/ci/
d) https://www.bidigital.com/ci/
View Answer
Answer: d
Explanation: In the world of data, where data is considered the oil and fuel of modern technology,
Competitive Intelligence gathering is both a product and a process. https://www.bidigital.com/ci/ is a
website which is used for such purpose.
13. Which of the following is not an example of a firm that provides info regarding competitive
intelligence gathering?
a) Carratu International
b) CI Center
c) Microsoft CI
d) Marven Consulting Group
View Answer
Answer: c
Explanation: Carratu International, CI Center, Marven Consulting Group, Lubrinco Pvt Ltd. are some
of the names of firms and companies that provide info regarding competitive intelligence gathering.
14. Using _____________ for doing competitive information gathering is a crime.
a) Spyware
b) Antivirus
c) Anti-malware
d) Adware
View Answer
Answer: a
Explanation: By the name of competitive information gathering if done in the form of active attack
using malware or by other illicit means can put your hired hacker or your company at stake. It’s a
cyber-crime.
15. Competitive Intelligence gathering is both a ___________ and a ____________
a) process, product
b) process, item
c) product & data to sell to 3rd party
d) data to sell to a 3rd party and a product
View Answer
Answer: a
Explanation: In the world of data, where data is considered the oil and fuel of modern technology,
Competitive Intelligence gathering is both a product and a process which comprises of some
predefined steps to handle data.
1. In port scanning, a port is always associated with the _____________ (typically of host system) &
the type of ____________ employed for communication.
a) IP address, protocol
b) MAC address, protocol
c) IP address, IMEI number
d) MAC address, network model
View Answer
Answer: a
Explanation: In port scanning, a port is always associated with an IP address (typically of host
system) & the type of protocol (UDP or TCP) employed for communication.
2. ________________ is a tool which uses traceroute-like techniques for analyzing IP packet
responses.
a) Firewalk
b) Firesweep
c) PingSweeper
d) ICMPwalker
View Answer
Answer: a
Explanation: Firewalk is a tool which is used traceroute-like techniques for analysing IP packet
responses. It determines gateway ACL and filters & map networks. Specifically, it determines filter
rules in place on all packet forwarding devices.
3. In port scanning, a _________ is always associated with an IP address (usually of the host system)
& the type of protocol (UDP or TCP) employed for communication.
a) address
b) port
c) system
d) network
View Answer
Answer: b
Explanation: In port scanning, a port is always associated with an IP address (typically of the host
system) & the type of protocol (UDP or TCP) employed for communication.
4. Firewalk tool employs a technique to determine the ___________ rules in place on the
___________ forwarding device.
a) filter, packet
b) filter, port
c) routing, packet
d) routing, port
View Answer
Answer: a
Explanation: Firewalk is a tool which uses traceroute-like techniques for analyzing IP packet
responses. It determines gateway ACL and filters & map networks. Specifically, it determines filter
rules in place on all packet forwarding devices.
5. Firewalk works by sending ________ & ________ packets.
a) UDP, HTTP
b) TCP, HTTP
c) ICMP, TCP
d) UDP, TCP
View Answer
Answer: d
Explanation: Firewalk is a tool which uses traceroute-like techniques for analyzing IP packet
responses. Firewalk works by sending UDP & TCP packets. It determines filter rules in place on all
packet forwarding devices.
6. Using 3-way handshake, it is possible to check for open ports.
a) True
b) False
View Answer
Answer: a
Explanation: Open ports can be checked where a computer initiates a connection to the server with
SYN flag set. The server replies with both SYN & ACK flag set. Finally, the client responds back to
the server with the ACK packet.
7. Which of them is not a standard flag used in TCP communication between client and server?
a) Synchronize
b) Acknowledgment
c) Finish
d) Start
View Answer
Answer: d
Explanation: Start is not a standard and valid flag of TCP communication in a client-server
connection. These standard flags are: Synchronize Acknowledgement, Push, Urgent, Finish and
Reset.
8. How many standard flags are used in TCP communication?
a) 4
b) 5
c) 6
d) 7
View Answer
Answer: d
Explanation: There are 7 standard flags are used in a TCP communication between client and server.
These standard flags are: Synchronize Acknowledgement, Push, Urgent, Finish and Reset.
9. Which of the following is not a valid scanning method?
a) Xmas Tree scan
b) SYN Stealth scan
c) Null Scan
d) Cloud scan
View Answer
Answer: d
Explanation: Some popular scanning methods used for scanning connections and ports are – Xmas
Tree scan, SYN Stealth Scan, Null Scan, Window Scan, ACK scan, UDP scan etc.
10. ___________ is a command-line TCP/IP packet assembler and analyzer tool.
a) IGMP Ping
b) Hping2
c) Nmap
d) Maltego
View Answer
Answer: b
Explanation: Hping2 is a command-line TCP/IP packet assembler and analyzer tool. Also, it has a
trace-route mode. It has the ability to send files between covered channels & also supports ICMP
echo requests.
11. Which of the following is not a feature of Hping2 tool?
a) Firewall testing
b) Port scanning
c) Network testing
d) Server malware scanning
View Answer
Answer: d
Explanation: Hping2 is a command-line TCP/IP packet assembler and analyzer tool. Also, it has a
trace-route mode. It has the ability to send files between covered channels & also supports ICMP
echo requests. Server malware scanning is not a valid feature of Hping2 tool.
12. _________________ is quite an esoteric process for preventing session creation through a
particular port.
a) Port knocking
b) Port cracking
c) Port hacking
d) Port-jacking
View Answer
Answer: a
Explanation: Port knocking is quite an esoteric process for preventing session creation through a
particular port. Port knocking is not presently used by default in any stack, but soon patches will
come to allow the use of knocking protocols.
13. Which one of them is not a network scanner?
a) NMAP
b) Qualys
c) SoftPerfect
d) Netcat
View Answer
Answer: d
Explanation: NMAP, Qualys, and SoftPerfect are all network scanning tools. Network scanning is
used for a computer network to gather information about the computing systems.
14. Which of them is not a port scanning tool?
a) Netcat
b) Unicornscan
c) Maltego
d) Angry IP Scanner
View Answer
Answer: c
Explanation: Netcat, Unicornscan, Angry IP scanners are some of the popular tools used for port
scanning. These types of tools are a special type of application designed for probing a server or host
for open ports.
15. Which of them is not a vulnerability scanning tool?
a) Nexpose
b) Nessus Professional
c) Snort
d) Nikto Web scanner
View Answer
Answer: c
Explanation: Nexpose, Nikto Web scanner, and Nessus Professional are some of the popular
vulnerability scanning tools. Vulnerability scanners are inspection tools used to check for potential
points of exploit on a system or network for identifying security holes.
1. Which of the following is a micro-virus that can bring down the confidentiality of an email
(specifically)?
a) Zeus
b) Stuxnet
c) Reaper Exploit
d) Friday the 13
View Answer
Answer: c
Explanation: Reaper exploit is a micro-virus that can compromise the email security as it works in
the background and sends a copy of reply or forwarded the email to its creator or sender.
2. Email users who use IE as their _________________ are vulnerable to Reaper Exploit.
a) Web engine
b) Rendering engine
c) Game engine
d) HTML engine
View Answer
Answer: d
Explanation: Email users who use Internet Explorer as their HTML engine are vulnerable to Reaper
Exploit. It works in the background and sends a copy of a reply or forwarded the email to its creator
or sender.
3. _______________ needs to be turned off in order to prevent from this attack.
a) Email scripting
b) Email attachments
c) Email services
d) Third party email programs
View Answer
Answer: a
Explanation: Email users who use Internet Explorer as their HTML engine are vulnerable to Reaper
Exploit. It works in the background and sends a copy of a reply or forwarded the email to its creator
or sender. Email scripting needs to be turned off in order to prevent from this attack.
4. Which of the following is a tool to monitor outgoing traffic of target PC’s email and intercept all
the emails sent from it?
a) Wireshark
b) Advanced Stealth Email Redirector
c) MS Outlook
d) Cisco Jabber
View Answer
Answer: b
Explanation: Advanced Stealth Email Redirector is a tool to monitor outgoing traffic of target PC’s
email and intercept all the emails send from it. Intercepted emails are then forwarded to a pre-
specified email ID.
5. Advanced SER is abbreviated as ___________
a) Advanced Stealth Electronic Redirector
b) Advanced Security Email Redirector
c) Advanced Stealth Email Redirector
d) Advanced Stealth Email Recorder
View Answer
Answer: c
Explanation: Advanced Stealth Email Redirector (Advanced SER) is a tool to monitor outgoing
traffic of target PC’s email and intercept all the emails send from it. Intercepted emails are then
forwarded to a pre-specified email ID.
6. Which of the following will not help in preserving email security?
a) Create a strong password
b) Connect your email to a phone number
c) Use two-factor authentication for password verification and login
d) Click on unknown links and sites
View Answer
Answer: d
Explanation: Some of the following measures to preserve your email security is via creating a strong
password, connecting your emails to your personal phone number and set up 2-factor authentication
for login.
7. Once the email is compromised, all other sites and services online associated with this email can
be compromised.
a) True
b) False
View Answer
Answer: a
Explanation: Email security is very much necessary because once the email is compromised, all other
sites and services online associated with this email can be compromised and the hacker will be able
to access all other accounts linked to this email.
8. _____________ is an encryption program or add-ons which provides cryptographic privacy &
authentication for email communication.
a) Powerful Good Privacy
b) Pretty Good Privacy
c) Pretty Good Encryption
d) Pretty Strong Encryption
View Answer
Answer: b
Explanation: Pretty Good Privacy is an encryption program which provides cryptographic privacy &
authentication for email communication. Basically, it is used for securing user’s texts, emails,
attachments etc.
9. PGP is abbreviated as _______________
a) Pretty Good Privacy
b) Powerful Good Privacy
c) Protocol Giving Privacy
d) Pretty Good Protocol
View Answer
Answer: a
Explanation: Pretty Good Privacy (PGP) is an encryption program which provides cryptographic
privacy & authentication for email communication. Basically, it is used for securing user’s texts,
emails, attachments etc.
10. Which of them is not an example of business email security tool?
a) Microsoft Office Trust Center
b) Sendinc
c) Hushmail Business
d) Cisco Jabber
View Answer
Answer: d
Explanation: Cisco Jabber is a unified communications application that lets users access, send instant
messaging, voice, voice messaging, desktop sharing, & conferencing. The rest three are a business
email security tools.
11. Which of them is not an example of business email security tool?
a) Enlocked
b) RPost Office
c) MS Outlook
d) Sendinc
View Answer
Answer: c
Explanation: MS Outlook is a web-based desktop app as well as an online suite of webmail, tasks,
contacts & calendaring services developed by Microsoft. The rest three are a business email security
tools.
12. ________________ is a free extension of browser that enables you in decrypting as well as
encrypting emails.
a) Enlocked
b) MS Outlook
c) Cisco Jabber
d) Mailvelope
View Answer
Answer: d
Explanation: Mailvelope is a free extension of the browser (which is available for both Google
Chrome as well as Mozilla Firefox) that enables users in decrypting as well as encrypting emails
using an openPGP standard of encryption.
13. Which of the following is not an email related hacking tool?
a) Email Finder Pro
b) Sendinc
c) Mail PassView
d) Mail Password
View Answer
Answer: b
Explanation: Sendinc is not an email data compromising tool. It is used for securing business email
accounts and offers a quick web-based way to jump into offering secure emails for firms. The rest
three are email compromising tools.
14. _______________ is targeted bulk email marketing software.
a) Email Spider Toolkit
b) Email Spider Easy
c) Email Crawler Easy
d) Email Spider Toolkit
View Answer
Answer: b
Explanation: Email Spider Easy is targeted bulk email marketing software. It rapidly & automatically
searches & spider from the search engine for finding email addresses. This tool is integrated with top
search engines.
15. ______________ is a tool that is integrated with top 90 search engines to grab quick search for
email addresses and other details.
a) Email Spider Toolkit
b) Email Spider Easy
c) Email Crawler Easy
d) Email Spider Toolkit
View Answer
Answer: b
Explanation: Email Spider Easy is targeted bulk email marketing software. It rapidly & automatically
searches & spider from the search engine for finding email addresses. This tool is integrated with top
search engines & its speed allows up to 500 email extraction threads simultaneously.
16. MegaHackerZ helps crackers to crack email passwords.
a) True
b) False
View Answer
Answer: a
Explanation: MegaHackerZ helps crackers to crack email passwords. Though it is not used very
much as the versions are deprecated. But it is still useful for weak passwords to crack easily.
Cyber Security Questions and Answers – Password
Cracking and Security Measures – 1
« Prev
Next »
This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Password
Cracking and Security Measures – 1”.
1. System hacking involves password hacking as one of the major hacking methodologies.
a) True
b) False
View Answer
Answer: a
Explanation: System hacking, which is of four types involves password hacking as one of the major
hacking methodologies. It is used to crack the security of a system and gain access for stealing data.
2. Password cracking in system hacking is of ________ types.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: c
Explanation: System hacking involves password hacking as one of the major hacking methodologies.
It is of 4 types. These are passive online attack, active online attack, offline attack, and non-
electronic attack.
3. There are ________ major types of passwords.
a) 4
b) 5
c) 6
d) 7
View Answer
Answer: d
Explanation: There are seven major types of passwords. These are a password containing only letters,
a password containing only number, a password containing only special characters, a password
containing only alpha-numeric characters, a password containing letters, numbers as well as special
symbols or password containing any two combinations of the three.
4. In _______________ attacks an attacker do not contact with authorizing party for stealing
password.
a) passive online
b) active online
c) offline
d) non-electronic
View Answer
Answer: a
Explanation: In passive online attacks, the attacker do not contact with an authorized party to steal
the password, rather the attacker attempts to grab password hacking without communicating with the
victim or his/her victim account.
5. Which of the following is an example of passive online attack?
a) Phishing
b) Social Engineering
c) Spamming
d) Wire sniffing
View Answer
Answer: d
Explanation: Attacker do not contact with an authorized party to steal the password in the passive
online attack, rather the attacker attempts to grab password hacking without communicating with the
victim or his/her victim account. Examples of passive online attacks include wire sniffing, Man in the
middle attack and reply attack.
6. Which of the following is not an example of a passive online attack?
a) MiTM
b) Reply Attack
c) Phishing
d) Wire sniffing
View Answer
Answer: c
Explanation: Phishing is not an example of a passive online attack. In passive online attacks, the
attacker does not contact with an authorized party to steal the password. Types of passive online
attacks include wire sniffing, Man in the middle attack and reply attack.
7. Which of the following do not comes under hurdles of passive online attack for hackers?
a) Hard to perpetrate
b) Computationally complex
c) Time taking, so patience has to be there
d) Tools not available
View Answer
Answer: d
Explanation: Tools for doing a passive offline attack on passwords is widely available so it doesn’t
come under disadvantage or hurdles of passive offline attack. But passive offline attacks are
computationally complex, hard to perpetrate and may take time.
8. Which of the following case comes under victims’ list of an active online attack?
a) Strong password based accounts
b) Unsecured HTTP users
c) Open authentication points
d) Logged in systems and services
View Answer
Answer: c
Explanation: Systems with bad or weak passwords & with open authentication points often becomes
the victim of an active online attack where the attacker directly tries different passwords 1-by-1
against victim’s system/account.
9. In _______________ password grabbing attack the attacker directly tries different passwords 1-
by-1 against victim’s system/account.
a) passive online
b) active online
c) offline attack
d) non-electronic
View Answer
Answer: b
Explanation: Users with open authentication points and bad or weak passwords often becomes the
victim of an active online attack where the attacker directly tries different passwords 1-by-1 against
victim’s system/account.
10. Which of them is not a disadvantage of active online attack?
a) Takes a long time
b) Easily and automatically detected
c) Need high network bandwidth
d) Need the patience to crack
View Answer
Answer: b
Explanation: In an active online attack, the attacker directly tries different passwords 1-by-1 against
victim’s system/account. It has some disadvantages as it takes a long time, hence a lot of patience &
high network bandwidth also.
11. _________________ can be alternatively termed as password guessing attack.
a) passive online
b) active online
c) offline attack
d) non-electronic
View Answer
Answer: b
Explanation: Users with open authentication points and bad or weak passwords often becomes the
victim of the active online attack. It is alternatively termed as password guessing attack where the
attacker directly tries different passwords 1-by-1 against victim’s system/account.
12. ________________ attacks are carried out from a location other than the real computer where the
password reside or was used.
a) passive online
b) active online
c) offline password
d) non-electronic
View Answer
Answer: c
Explanation: For this cyber-criminal needs to have physical access to the system and so offline
password attacks are carried out from a location other than the real computer where the password
reside or was used. They are common examples of physical data breaching & hacking.
13. _______________ attacks always need physical access to the system that is having password file
or the hacker needs to crack the system by other means.
a) online
b) offline
c) password
d) non-electronic
View Answer
Answer: b
Explanation: Offline password attacks are carried out from a location other than the real computer
where the password resides or was used. They need physical access to the system that is having a
password file or the hacker needs to crack the system by other means.
14. Which of the following is not an example of offline password attack?
a) Dictionary attack
b) Rainbow attacks
c) Brute force attack
d) Spamming attack
View Answer
Answer: d
Explanation: The offline attack needs physical access to the system that is having a password file or
the hacker needs to crack the system by other means. A dictionary attack, rainbow, and brute force
come under offline attack.
15. Passwords need to be kept encrypted to protect from such offline attacks.
a) True
b) False
View Answer
Answer: a
Explanation: Physical access is needed in offline attack to the system that is having a password file or
the hacker needs to crack the system by other means. Hence, even if hackers gain physical access to
the system, if the passwords are in the encrypted mode, it will be almost impossible to steal
passwords.
1. Which of the following is not an appropriate way of targeting a mobile phone for hacking?
a) Target mobile hardware vulnerabilities
b) Target apps’ vulnerabilities
c) Setup Keyloggers and spyware in smart-phones
d) Snatch the phone
View Answer
Answer: d
Explanation: Snatching is not a type of hacking any smart-phone. Targeting the hardware and
application level vulnerabilities and setting some keylogger or spyware in the target mobile can help
get valuable info about the victim.
2. Which of the following is not an OS for mobile?
a) Palm
b) Windows
c) Mango
d) Android
View Answer
Answer: c
Explanation: A mobile/smart-phone operating system is software which allows smart-phones, tablets,
phablets & other devices to run apps & programs within it. Palm OS, Windows OS, and Android OS
are some of the examples of Mobile OS.
3. Mobile Phone OS contains open APIs that may be _____________ attack.
a) useful for
b) vulnerable to
c) easy to
d) meant for
View Answer
Answer: b
Explanation: Mobile phone operating systems contain open APIs that or may be vulnerable to
different attacks. OS has a number of connectivity mechanisms through which attackers can spread
malware.
4. ____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless
medium, USBs and infrared to affect mobile phones.
a) Worms
b) Antivirus
c) Malware
d) Multimedia files
View Answer
Answer: c
Explanation: Malware gets propagated through networks and technologies like SMS, Bluetooth,
wireless medium, USBs and infrared to affect mobile phones.
5. ____________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices,
& the networks to which they connect to, from threats & bugs.
a) OS Security
b) Database security
c) Cloud security
d) Mobile security
View Answer
Answer: d
Explanation: Mobile security is the protection of smart-phones, phablets, tablets, and other portable
tech-devices, & the networks to which they connect to, from threats & bugs.
6. Mobile security is also known as ____________
a) OS Security
b) Wireless security
c) Cloud security
d) Database security
View Answer
Answer: b
Explanation: Mobile security also known as wireless security is the protection of smart-phones,
phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from
threats & bugs.
7. DDoS in mobile systems wait for the owner of the _____________ to trigger the attack.
a) worms
b) virus
c) botnets
d) programs
View Answer
Answer: c
Explanation: Botnets on compromised mobile devices wait for instructions from their owner. After
getting the owner’s instruction it launches DDoS flood attack. This result in a failure in connecting
calls or transmitting data.
8. Hackers cannot do which of the following after compromising your phone?
a) Steal your information
b) Rob your e-money
c) Shoulder surfing
d) Spying
View Answer
Answer: c
Explanation: Shoulder surfing is done before compromising the mobile. So, hackers can steal your
information; rob your e-money or do spying after compromising your smart-phone.
9. Hackers cannot do which of the following after compromising your phone?
a) Shoulder surfing
b) Accessing your voice mail
c) Steal your information
d) Use your app credentials
View Answer
Answer: a
Explanation: Shoulder surfing is done before compromising the mobile. So, hackers can steal your
information; accessing your voice mail or use your app credentials after compromising your smart-
phone.
10. App permissions can cause trouble as some apps may secretly access your memory card or
contact data.
a) True
b) False
View Answer
Answer: a
Explanation: App permissions can cause trouble as some apps may secretly access your memory card
or contact data. Almost all applications nowadays ask for such permission, so make sure you do a
proper survey on these apps before allowing such access.
11. Activate _____________ when you’re required it to use, otherwise turn it off for security
purpose.
a) Flash Light
b) App updates
c) Bluetooth
d) Rotation
View Answer
Answer: c
Explanation: Activate Bluetooth when you’re required it to use, otherwise turn it off for security
purpose. This is because; there are various tools and vulnerabilities that may gain access to your
smart-phone using Bluetooth.
12. Try not to keep ________________ passwords, especially fingerprint for your smart-phone,
because it can lead to physical hacking if you’re not aware or asleep.
a) Biometric
b) PIN-based
c) Alphanumeric
d) Short
View Answer
Answer: a
Explanation: Try not to keep biometric passwords, especially fingerprint for your smart-phone
containing very confidential data, because anyone can do physical hacking if you’re not aware or
asleep.
13. Which of the following tool is used for Blackjacking?
a) BBAttacker
b) BBProxy
c) Blackburried
d) BBJacking
View Answer
Answer: b
Explanation: BBProxy (installed on blackberry phones) is the name of the tool used to conduct
blackjacking. What attackers do is they install BBProxy on user’s blackberry and once the tool is
activated it opens a covert channel between the hacker and the compromised host.
14. BBProxy tool is used in which mobile OS?
a) Android
b) Symbian
c) Raspberry
d) Blackberry
View Answer
Answer: d
Explanation: BBProxy (installed on blackberry phones) is the name of the tool used to conduct
blackjacking. What attackers do is they install BBProxy on user’s blackberry and once the tool is
activated it opens a covert channel between the hacker and the compromised host.
15. Which of the following is not a security issue for PDAs?
a) Password theft
b) Data theft
c) Reverse engineering
d) Wireless vulnerability
View Answer
Answer: c
Explanation: Reverse engineering is not an issue of PDA (Personal Digital Assistant). Password
theft, data theft, wireless vulnerability exploitation, data corruption using virus are some of them.
1. A/an ___________ is a program that steals your logins & passwords for instant messaging
applications.
a) IM – Trojans
b) Backdoor Trojans
c) Trojan-Downloader
d) Ransom Trojan
View Answer
Answer: a
Explanation: An IM Trojan is a program that steals your logins & passwords for instant messaging
applications. It popularly attacked apps like AOL, Yahoo Pager, and Skype with vulnerabilities.
2. _____________ can modify data on your system – so that your system doesn’t run correctly or
you can no longer access specific data, or it may even ask for ransom in order to give your access.
a) IM – Trojans
b) Backdoor Trojans
c) Trojan-Downloader
d) Ransom Trojan
View Answer
Answer: d
Explanation: Ransom Trojan can modify data on your system – so that your system doesn’t run
correctly or you can no longer access specific data, or it may even ask for ransom in order to give
your access.
3. The ______________ can cost you money, by sending text messages from your mobile phone
numbers.
a) IM – Trojans
b) Backdoor Trojans
c) SMS Trojan
d) Ransom Trojan
View Answer
Answer: c
Explanation: The SMS Trojans can cost you money, by sending text messages from your mobile
phone numbers. These generally target the smart-phones & some of them are designed to send their
own composed SMS also, to embarrass the receiver as well as the sender of the SMS.
4. Trojan-Spy programs can keep an eye on how you are using your system.
a) True
b) False
View Answer
Answer: a
Explanation: Trojan-Spy programs can keep an eye on how you are using your system. These are one
of the most notorious silent observers which even track your browsing data and record your
behaviour. Also, it keeps track of all the programs you use.
5. A ___________ is a method in which a computer security mechanism is bypassed untraceable for
accessing the computer or its information.
a) front-door
b) backdoor
c) clickjacking
d) key-logging
View Answer
Answer: b
Explanation: Using backdoors hackers can breach computer security mechanism for accessing the
computer or its information. This type of code usually comes attached with Trojans.
6. A _________________ may be a hidden part of a program, a separate infected program a Trojan
in disguise of an executable or code in the firmware of any system’s hardware.
a) crypter
b) virus
c) backdoor
d) key-logger
View Answer
Answer: c
Explanation: A backdoor may be a hidden part of a program, a separate infected program a Trojan in
disguise of an executable or code in the firmware of any system’s hardware.
7. Backdoors cannot be designed as ______________
a) the hidden part of a program
b) as a part of Trojans
c) embedded code of the firmware
d) embedded with anti-malware
View Answer
Answer: d
Explanation: Cyber-criminals use backdoors as a means through which they can bypassed security
postures untraceable. They may be a hidden part of a program, a separate infected program a Trojan
in disguise of an executable or code in the firmware of any system’s hardware.
8. Trojans having backdoors are harmless.
a) True
b) False
View Answer
Answer: b
Explanation: Backdoor trojans can cause huge damage as this is a method used by hackers to breach
computer security mechanism. These types of code usually come attached with Trojans programs and
can steal your personal data.
9. The threat of backdoors started when ____________ & ____________ OSs became widely
accepted.
a) single-user, Windows
b) multiuser, networked
c) single-user, UNIX
d) multiuser, UNIX
View Answer
Answer: b
Explanation: Hackers take the help of backdoor to breach security mechanism & bypassed for
stealing different types of information from the target system. The threat of backdoors started when
multiuser & networked OS became widely accepted.
10. Backdoors are also known as ______________
a) Malware-doors
b) Trojan-backups
c) Front-doors
d) Trapdoors
View Answer
Answer: d
Explanation: Trapdoors popularly known as backdoors are used my cyber-criminals as a method in
which a system’s security methods can be bypassed untraceable.
11. __________ is a powerful RAT build using the language Delphi 7.
a) Stuxnet
b) T-Bomb
c) Beast
d) Zeus
View Answer
Answer: c
Explanation: Beast is a powerful RAT build using the language Delphi 7. One special feature of
Beast is that it can help attackers to create all types of Trojans & it has capabilities of multiple Trojan
types.
12. Which of the following is a remote Trojan?
a) Troya
b) DaCryptic
c) BankerA
d) Game-Troj
View Answer
Answer: a
Explanation: Trojan is a small malicious program that runs hidden on the infected system. They are
created with the intent and they infected the system by misleading the user. Troya is a remote Trojan
that works remotely for its creator.
1. A ___________ consists of at least one bot server or controller and one or more client-bots.
a) Virus
b) Trojan
c) Botnet
d) Adware
View Answer
Answer: c
Explanation: The botnet comprises one bot server or controller and one or more client-bots. Botnets
are managed by bot-herders. They have become major threats to security as they are getting popular
in the cyber-crime world.
2. Botnets are managed by ______________
a) Bot-holders
b) Bot-herders
c) Bot-trainers
d) Bot-creators
View Answer
Answer: b
Explanation: A botnet consists of at least one bot server or controller and one or more client-bots.
Botnets are managed by bot-herders. The exact term is bot herders.
3. A _____________ is a number of Internet-connected systems, where each of them is running one
or more bots.
a) Trojan
b) Virus
c) Worms
d) Botnet
View Answer
Answer: d
Explanation: A botnet is a number of Internet-connected devices, each of which is running one or
more bots. Botnets are managed by bot-herders. These botnets have become foremost threats to
cyber-security.
4. _____________ are implemented to carry out distributed DDoS attacks, steal data, send spam
messages & permits the hacker to access various devices & its connection.
a) Trojan
b) Virus
c) Botnet
d) Worms
View Answer
Answer: c
Explanation: Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam
messages & permits the hacker to access various devices & its connection.
5. Botnets are not used for ______________
a) Perform DDoS
b) Steal bulk amount of sensitive data
c) Spamming
d) Encrypting for ransom
View Answer
Answer: d
Explanation: Botnets usually are not used for encrypting files for ransom. Botnets are implemented to
carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access
various devices & its connection.
6. The owner of botnets can control the botnet using ___________________ software.
a) trojans
b) command and control
c) servers
d) infected servers
View Answer
Answer: b
Explanation: A botnet owner can govern and manage the botnet through command & programs.
Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam messages &
permits the hacker to access various devices & its connection.
7. The full form of C&C is ____________
a) command and control
b) copy and cut
c) command and capture
d) copy and control
View Answer
Answer: a
Explanation: The owner of botnets can control the botnet using command & control (C&C) software.
Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam messages &
permits the hacker to access various devices & its connection.
8. The word “botnet” is a blend of the words _____________ & ___________
a) robot, network
b) rocket, network
c) bot, network
d) bot, internet
View Answer
Answer: a
Explanation: The word “botnet” is a blend of the words robot & network. Botnets usually are not
used for encrypting files for ransom. They are implemented to carry out distributed DDoS attacks,
steal data, send spam messages and compromise various services & its connection.
9. Botnets are not the logical connection of which of the following?
a) Smart-phones
b) IoT devices
c) Computer systems
d) Modems
View Answer
Answer: d
Explanation: Botnets are logical connections of smart-phones, IoT devices, computer systems etc.
They are strong enough to carry out distributed denial of service attacks & permit hackers to access
various devices & its connection.
10. Infected computers and other systems within the botnet are called __________
a) killers
b) vampires
c) zombies
d) gargoyles
View Answer
Answer: c
Explanation: Attackers use the botnet for connecting of smart-phones, IoT devices, computer systems
etc. These infected computers and other systems within the botnet connection are called zombies or
zombie computers.
11. The bot program allows the bot-herders to perform all operations from a ___________ location.
a) local
b) open
c) corporate
d) remote
View Answer
Answer: d
Explanation: Infected computers and other systems within the botnet are called zombies systems
which are controlled by bot programs that allow the bot-herders to perform all operations from a
remote location.
12. Nowadays, most botnets rely on existing _______________ networks for communication.
a) server-to-server
b) peer-to-peer
c) client-to-server
d) host-to-server
View Answer
Answer: b
Explanation: Botnets are compromised connectivity of systems like smart-phones, IoT devices,
computer systems etc. Now-a-days, most botnets rely on existing peer-to-peer networks for
communication.
13. Which of the following is not an example of a botnet program?
a) Zeus
b) GameOver
c) ZeroAccess
d) MyDoom
View Answer
Answer: d
Explanation: Examples of some popular botnets are gameover, ZeroAccess, and Zeus. The infect
computers & other systems and turned them into zombies which are also called zombies systems.
14. Which of the following is an example of Botnet?
a) Zeus
b) ILOVEYOU
c) Storm Worm
d) MyDoom
View Answer
Answer: a
Explanation: Botnets are can compromise any system and turn them into zombie computers.
GameOver, Zeus etc. are examples of some popular botnets programs.
15. Which of the following is an example of a Botnet program?
a) Slammer
b) GameOver
c) Stuxnet
d) Anna Kournikova
View Answer
Answer: b
Explanation: Botnets create logical connections with internet connected devices like smart-phones,
IoT devices, computer systems etc. Examples of some popular botnets are GameOver, ZeroAccess,
& Zeus.
1. A ______________ tries to formulate a web resource occupied or busy its users by flooding the
URL of the victim with unlimited requests than the server can handle.
a) Phishing attack
b) DoS attack
c) Website attack
d) MiTM attack
View Answer
Answer: b
Explanation: A DoS attack tries to formulate a web resource occupied or busy to its users by flooding
the URL of the victim with unlimited requests than the server can handle.
2. During a DoS attack, the regular traffic on the target _____________ will be either dawdling down
or entirely interrupted.
a) network
b) system
c) website
d) router
View Answer
Answer: c
Explanation: Using of DoS attack put together web resource by flooding its users with unlimited
requests. During a DoS attack, the regular traffic on the target website will be either dawdling down
or entirely interrupted.
3. The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources
of the target website.
a) Phishing attack
b) DoS attack
c) Website attack
d) MiTM attack
View Answer
Answer: b
Explanation: Web resource gets occupied or busy as it floods its users performing DoS attack. The
intent of this attack is to overkill the targeted server’s bandwidth and other resources of the target
website.
4. DoS is abbreviated as _____________________
a) Denial of Service
b) Distribution of Server
c) Distribution of Service
d) Denial of Server
View Answer
Answer: a
Explanation: A Denial of Service attack targets its victim by flooding the URL of the victim with
unlimited requests. The intent of this attack is to overkill the targeted server’s bandwidth and other
resources of the target website.
5. A DoS attack coming from a large number of IP addresses, making it hard to manually filter or
crash the traffic from such sources is known as a _____________
a) GoS attack
b) PDoS attack
c) DoS attack
d) DDoS attack
View Answer
Answer: d
Explanation: A DoS attack coming from a large number of IP addresses, making it hard to manually
filter or crash the traffic from such sources is known as a Distributed Denial of Service (DDoS)
attack.
6. DDoS stands for _________________
a) Direct Distribution of Server
b) Distributed Denial of Service
c) Direct Distribution of Service
d) Distributed Denial of Server
View Answer
Answer: b
Explanation: When a DoS attack comes from a large number of IP addresses, this makes it hard to
manually filter or crash the traffic from such sources and the attack is known as a Distributed Denial
of Service (DDoS) attack.
7. Instead of implementing single computer & its internet bandwidth, a ____________ utilizes
various systems & their connections for flooding the targeted website.
a) GoS attack
b) PoS attack
c) DDoS attack
d) DoS attack
View Answer
Answer: c
Explanation: DDoS is another leading attack type. Instead of implementing single computer & its
internet bandwidth, a DDoS utilizes various systems & their connections for flooding the targeted
website.
8. There are ______ types of DoS attack.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: a
Explanation: With the help of DoS attack attackers try to busy its users by flooding the URL of the
victim with limitless requests. There are two types of DoS attack. These are Application Layer
Attacks and Network Layer DoS attacks.
9. Application layer DoS attack is also known as _______________
a) Layer4 DoS attack
b) Layer5 DoS attack
c) Layer6 DoS attack
d) Layer7 DoS attack
View Answer
Answer: d
Explanation: A DoS attack is a very dangerous threat for users who have their services running via
the internet. The Application Layer DoS is also known as Layer-7 DoS attack.
10. ___________ is a type of DoS threats to overload a server as it sends a large number of requests
requiring resources for handling & processing.
a) Network Layer DoS
b) Physical Layer DoS
c) Transport Layer DoS
d) Application Layer DoS
View Answer
Answer: d
Explanation: DoS attacks are of two types. These are Application Layer Attacks and Network Layer
DoS attacks. Application Layer DoS is a type of DoS threats to overload a server as it sends a large
number of requests requiring resources for handling & processing.
11. Which of the following is not a type of application layer DoS?
a) HTTP flooding
b) Slowloris
c) TCP flooding
d) DNS query flooding
View Answer
Answer: c
Explanation: In application Layer DoS, its threats to overload a server as it sends a large quantity of
requests requiring resources for handling & processing. This category includes HTTP flooding, slow-
flooding attack and DNS query flooding.
12. Network layer attack is also known as ________________
a) Layer3-4 DoS attack
b) Layer5 DoS attack
c) Layer6-7 DoS attack
d) Layer2 DoS attack
View Answer
Answer: a
Explanation: Denial of Service attack becomes dangerous because it floods the target service over the
internet. There are two types of DoS attack. The Network Layer DoS is also known as the Layer 3-4
DoS attack.
13. Which of the following do not comes under network layer DoS flooding?
a) UDP flooding
b) HTTP Flooding
c) SYN flooding
d) NTP Amplification
View Answer
Answer: b
Explanation: Network layer DoS attack is set up to congest the “pipelines” that are connecting user’s
network. This includes attacks such as NTP amplification, SYN flooding, UDP flooding and DNS
amplification.
14. Which of the following do not comes under network layer DoS flooding?
a) DNS amplification
b) UDP flooding
c) DNS query flooding
d) NTP Amplification
View Answer
Answer: c
Explanation: Network layer DoS attack includes attacks such as NTP amplification, SYN flooding,
UDP flooding and DNS amplification. DNS query flooding does not come under the Network layer
DoS attack.
15. DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per
second (PPS).
a) True
b) False
View Answer
Answer: a
Explanation: At the time of DoS attack, it becomes hard to manually filter or crash the traffic from
such sources. DDoS are high traffic events that are measured in Gigabits per second (Gbps) or
packets per second (PPS).
16. A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network
infrastructures.
a) True
b) False
View Answer
Answer: a
Explanation: A DoS attack is very dangerous for any targeted victim because it can seize business
and bring loss to a company running on the website. A DDoS with 20 to 40 Gbps is enough for
totally shutting down the majority network infrastructures.
1. ______________ is an internet scam done by cyber-criminals where the user is convinced digitally
to provide confidential information.
a) Phishing attack
b) DoS attack
c) Website attack
d) MiTM attack
View Answer
Answer: a
Explanation: Phishing is an internet scam done by cyber-criminals where the user is convinced
digitally to provide confidential information. There are different types of phishing. Some of them
redirect the user to different sites via emails & spyware.
2. In _______________ some cyber-criminals redirect the legitimate users to different phishing sites
and web pages via emails, IMs, ads and spyware.
a) URL Redirection
b) DoS
c) Phishing
d) MiTM attack
View Answer
Answer: c
Explanation: Phishing is an internet scam done by hackers to provide classified information. In some
of them, cyber-criminals redirect the users to different sites via emails, IMs, and ads.
3. Phishers often develop ______________ websites for tricking users & filling their personal data.
a) legitimate
b) illegitimate
c) genuine
d) official
View Answer
Answer: b
Explanation: Phishing is a category of social engineering attack that is used to steal user data.
Phishers often develop illegitimate websites for tricking users & filling their personal data.
4. Which of the following type of data, phishers cannot steal from its target victims?
a) bank details
b) phone number
c) passwords
d) apps installed in the mobile
View Answer
Answer: d
Explanation: Phishers often develop illegitimate websites for tricking users & filling their personal
data such as bank account details, phone number, address, username, and passwords etc.
5. Algorithm-Based Phishing was developed in the year __________
a) 1988
b) 1989
c) 1990
d) 1991
View Answer
Answer: c
Explanation: Algorithm-Based Phishing was developed in the year 1990 where the first team of
phishers developed an algorithm for generating random credit card numbers for getting an original
card’s match.
6. ______________ was the first type of phishing where the phishers developed an algorithm for
generating random credit card numbers.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
View Answer
Answer: a
Explanation: Phishing is a category of social engineering attack. In Algorithm-Based Phishing, an
algorithm for generating random credit card numbers for getting an original card’s match.
7. Email Phishing came into origin in the year __________
a) 1990
b) 2000
c) 2005
d) 2015
View Answer
Answer: b
Explanation: Email Phishing came into origin in the year 2000 which is more tech-savvy. Here the
email is created as if it has been sent from a legitimate source with a legitimate link to its official
website.
8. _________________ type of phishing became very popular as if it has been sent from a legitimate
source with a legitimate link to its official website.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
View Answer
Answer: b
Explanation: In email phishing, the email is fashioned as if it has been sent from a legitimate source
with a legitimate link to its official website. It came into origin in the year 2000.
9. _____________ refers to phishing performed over smart-phone by calling.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
View Answer
Answer: d
Explanation: Phishers often develop illegitimate websites for tricking users & filling their personal
data. Vishing refers to phishing performed over smart-phone by calling. As the phishing is done
through voice so it is called vishing = voice + phishing.
10. _____________ = voice + phishing.
a) Algo-based phishing
b) Vishing
c) Domain Phishing
d) Email-based phishing
View Answer
Answer: b
Explanation: Phishing occurs when a cyber-criminal masquerade as a trusted entity. Vishing refers to
phishing performed where the phishing is done through voice hence called vishing = voice +
phishing.
11. Victims of phishing are mostly ___________________
a) Tech enthusiast
b) Professional computer engineers
c) Lack of computer knowledge
d) Lack of management skill
View Answer
Answer: c
Explanation: Phishers often develop illegitimate websites for tricking users & filling their personal
data. Victims of such type of attacks are those users with lack of computer knowledge.
12. ___________________ is usually targeted by nature where the emails are exclusively designed to
target any exact user.
a) Algo-based phishing
b) Vishing
c) Domain Phishing
d) Spear phishing
View Answer
Answer: d
Explanation: In spear phishing, hackers usually targeted specifically where the emails are exclusively
designed to target any particular user. It occurs when an attacker masquerades the victim a trusted
party.
13. ____________ or smishing is one of the simplest types of phishing where the target victims may
get a fake order detail with a cancellation link.
a) Algo-based phishing
b) SMS phishing
c) Domain Phishing
d) Spear phishing
View Answer
Answer: b
Explanation: SMS phishing or Smishing is one of the simplest types of phishing where the target
victims may get a fake order detail with a cancellation link or any other link that leads you to a
malicious link.
14. ________________ phishing is that type of phishing where the construction of a fake webpage is
done for targeting definite keywords & waiting for the searcher to land on the fake webpage.
a) Voice
b) SMS
c) Search engine
d) Email
View Answer
Answer: c
Explanation: Search engine phishing is that type of phishing where the construction of a fake
webpage is done for targeting definite keywords & waiting for the searcher to land on the fake
webpage.
15. Which of the following is not an example or type of phishing?
a) Spear phishing
b) Deceptive phishing
c) Whaling
d) Monkey in the Middle
View Answer
Answer: d
Explanation: Phishing is an internet scam done by cyber-criminals where the user is convinced
digitally to provide confidential information. There are different types of phishing. Some of them are
Spear phishing, deceptive phishing, whaling, pharming, vishing.
16. Which of the following is not an example or type of phishing?
a) Tracking
b) Vishing
c) Smishing
d) Pharming
View Answer
Answer: a
Explanation: A popular internet scam done by black hat hackers and crackers to grab confidential
information by masquerading is the phishing technique. Smishing, email phishing, whaling,
pharming, vishing are some popular types of phishing.
Cyber Security Questions and Answers – Attack Vectors –
Sniffing
« Prev
Next »
This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Attack
Vectors – Sniffing”.
1. _____________ attack is the exploitation of the web-session & its mechanism that is usually
managed with a session token.
a) Session Hacking
b) Session Hijacking
c) Session Cracking
d) Session Compromising
View Answer
Answer: b
Explanation: Session Hijacking attack is the exploitation of the web-session & its mechanism that is
usually managed with a session token. Mostly it is called TCP session hijacking that deals with a
security attack on any target victim’s session over a protected network.
2. The most commonly used session hijacking attack is the _______________
a) IP hacking
b) IP spooling
c) IP spoofing
d) IP tracking
View Answer
Answer: c
Explanation: Session Hijacking is the utilization of a valid system session which is usually managed
with a token. The most commonly used session hijacking attack is IP spoofing.
3. ________________ are required because HTTP uses a lot of diverse TCP connections, so, the web
server needs a means to distinguish every user’s connections.
a) Internet
b) Network
c) Hijacking
d) Sessions
View Answer
Answer: d
Explanation: Sessions are required because HTTP uses a lot of diverse TCP connections, so, the web
server needs the means to distinguish every user’s connections. Session hijacking attack is the
exploitation of the web-session & its mechanism that is usually managed with a session token.
4. Since most _______________________ occur at the very beginning of the TCP session, this
allows hackers to gain access to any system.
a) authentications
b) breaches
c) integrations
d) associations
View Answer
Answer: a
Explanation: TCP session hijacking that deals with a security attack on any target victim’s session
over a protected network. Since most authentications occur at the very beginning of the TCP session,
this allows hackers to gain access to any machine.
5. _______________ is done only after the target user has connected to the server.
a) Server hacking
b) Banner grabbing
c) Cracking
d) Hijacking
View Answer
Answer: d
Explanation: Hijacking is done only after the target user has connected to the server. Session
hijacking attack is the misuse of the web-session that is usually handled with a session token.
6. In _______________ attack, the attacker doesn’t actively take over another user to perform the
attack.
a) phishing
b) spoofing
c) hijacking
d) vishing
View Answer
Answer: b
Explanation: In a spoofing attack, the attacker doesn’t actively take over another user to perform the
attack. The most commonly used session hijacking attack is IP spoofing.
7. There are ___________ types of session hijacking.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: a
Explanation: The session hijacking is a form of web attack usually managed with a session token.
There are two types of session hijacking. These are active and passive session hijacking.
8. With ___________________ attack, an attacker hijacks a session but do not alter anything. They
just sit back and watch or record all the traffic and data being sent forth.
a) network session hijacking
b) passive session hijacking
c) active session hijacking
d) social-networking session hijacking
View Answer
Answer: b
Explanation: There are 2 types of session hijacking viz. active and passive session hijacking. With a
passive session hijacking attack, an attacker hijacks a session but do not alter anything. They just sit
back and watch or record all the traffic and data being sent forth.
9. In an _________________ attack, an attacker finds an active session & takes over that session.
a) network session hijacking
b) passive session hijacking
c) active session hijacking
d) social-networking session hijacking
View Answer
Answer: c
Explanation: There are 2 types of session hijacking. These are active and passive session hijacking.
In an active session hijacking attack, an attacker finds an active session & takes over that session.
10. Session hijacking takes place at ____________ number of levels.
a) five
b) four
c) three
d) two
View Answer
Answer: d
Explanation: Session Hijacking works based on the principle of system’s sessions. Session hijacking
takes place at two levels. These are network level and application level hijacking.
11. The ______________ hijacking is implemented on the data flow of protocol shared by all web
applications.
a) network level
b) physical level
c) application level
d) data level
View Answer
Answer: a
Explanation: TCP session hijacking that deals with a security attack on any target victim’s session
over a protected network. The network hijacking is implemented on the data flow of protocol shared
by all web applications.
12. Which of the following example do not comes under network level session hijacking.
a) TCP/IP Hijacking
b) RST Hijacking
c) Domain Hijacking
d) Blind Hijacking
View Answer
Answer: c
Explanation: The network hijacking is implemented on the data flow of protocol shared by all web
applications. Examples of network level hijacking are TCP/IP hijacking, RST hijacking, blind
hijacking UDP hijacking etc.
13. In ___________________ session hijacking, hackers gain session ID for taking control of
existing session or even create a new unauthorized session.
a) network level
b) physical level
c) application level
d) data level
View Answer
Answer: b
Explanation: These are network level and application level hijacking. In application level session
hijacking, hackers gain session ID for taking control of existing session or even create a new
unauthorized session.
14. Which of them is not a session hijacking tool?
a) Juggernaut
b) IP watcher
c) Wireshark
d) Paros HTTP Hijacker
View Answer
Answer: c
Explanation: The session depicts the time period in which communication of 2 computer systems
takes place. Some of the sessions hijacking tools are Jiggernaut, IP watcher and Paros HTTP
Hijacker.
15. Which of the following is a session hijacking tool?
a) T-Sight
b) Wireshark
c) Maltego
d) Nessus
View Answer
Answer: a
Explanation: The session remains valid up to the ending of any communication. Some of the sessions
hijacking tools are T-Sight, Jiggernaut, IP watcher and Paros HTTP Hijacker.
16. Hjksuite Tool is a collection of programs for hijacking. It contains a library called hjklib which
can help in implementing TCP/IP stack-over hijacking.
a) True
b) False
View Answer
Answer: a
Explanation: Hjksuite tool is a collection of programs used for session hijacking. It contains a library
called hjklib which can help in implementing TCP/IP stack-over hijacking
1. _____________ are unwanted software intended to pitch advertisements upon the user’s screen,
most often within a web browser.
a) Shareware
b) Adware
c) Bloatware
d) Ransomware
View Answer
Answer: b
Explanation: Adwares are unwanted software intended to pitch advertisements upon the user’s
screen, most often within a web browser. Sometimes, hackers embed malware along with it to
compromise systems. So, security professionals treat it as modern-day PUP (potentially unwanted
programs).
2. PUP is abbreviated as ____________
a) Potentially Useless Programs
b) Potentially Unwanted Protocols
c) Potentially Unwanted Programs
d) Partial Unwanted Programs
View Answer
Answer: c
Explanation: Adwares are designed to pitch advertisements upon user’s screen, most often within a
web browser. So, security professionals treat it as modern-day PUP (potentially unwanted programs).
3. Users might invite some bogus virus in his/her system by clicking the ____________
a) Shareware
b) Spyware
c) URL
d) Adware
View Answer
Answer: d
Explanation: The unwanted software used to pitch ads on the user’s screen is the adware, displayed
most often within a web browser. Users might invite some bogus virus in his/her system by clicking
the adware.
4. Which among the following is not an abnormal symptom found once you click any malicious
adware?
a) Automatic opening of new tabs in the browser
b) Automatic updates of antivirus
c) Changes in home page
d) Popping up of new Search engines on your browser
View Answer
Answer: b
Explanation: Some abnormal symptom found once you click any malicious adware are the automatic
opening of new tabs in the browser, changes in a home page, popping up of new Search engines on
your browser etc.
5. Once _____________ hijacks your system, it might perform different sorts of unwanted tasks.
a) Server hacking
b) Banner grabbing
c) Cracking
d) Hijacking
View Answer
Answer: d
Explanation: Once adware hijacks your system, it might perform different kinds of superfluous tasks.
The adware’s functions may be intended to analyze a victim’s location & what different Internet sites
he/she is visiting.
6. Creators of _____________ also sell your browsing behaviour & information to 3rd parties.
a) Shareware
b) Spyware
c) URL
d) Adware
View Answer
Answer: d
Explanation: The adware’s functions may be intended to analyze a victim’s location & what different
Internet sites he/she is visiting. Creators of adware also sell your browsing behaviour & information
to 3rd parties.
7. Modern ____________ can even use it to target users with additional advertisements that are
customized to the browsing habits.
a) smart shareware
b) smart adware
c) smart bloatware
d) smart spyware
View Answer
Answer: b
Explanation: Creators of adware also sell your browsing behaviour & information to 3rd parties.
Modern smart adware can even use it to target users with additional advertisements that are
customized to browsing habits.
8. Creators of adware also sell your browsing behaviour & information to 3rd parties.
a) True
b) False
View Answer
Answer: a
Explanation: The adware’s functions may be intended to analyze the victim’s location & what
different Internet sites he/she is visiting. Creators of adware also sell your browsing behaviour &
information to 3rd parties.
9. Which among the following is not a symptom of your system compromised with adware?
a) Website links redirect to sites unlike from what user is intended
b) Web browser acts slows to a crawl
c) System takes restarts frequently
d) The browser might crash frequently
View Answer
Answer: c
Explanation: When adware hijacks your system, various kinds of unessential tasks keep on
happening. Website links redirect to sites unlike from what user is intended, web browser acts slows
to a crawl, the browser might crash frequently etc are some of the symptoms of adware infected
system.
10. Malicious adware may sneak into your system by __________ different ways.
a) five
b) four
c) three
d) two
View Answer
Answer: d
Explanation: Malicious adware may sneak into your system in 2 different ways. 1 st, if you download
and install a program that is freeware or shareware, it might install some other programs and ads –
popping applications. 2nd, through insidious – websites containing adware.
11. Which of the following term is not a valid terminology and type of adware?
a) Mobile adware
b) Mac Adware
c) Smart-home adware
d) Windows adware
View Answer
Answer: c
Explanation: Website links redirect to sites unlike from what the user is intended, web browser acts
slows to a crawl, the browser might crash frequently etc are some of the symptoms of adware
infected system. These are mobile/android adware, Mac and Windows adware etc.
12. Adware will not come to your system if you are using Chrome.
a) True
b) False
View Answer
Answer: b
Explanation: As adware hijacks your system, various kinds of unessential tasks keep occurring.
Adware may come and junk up your system through any browser, whether it is Firefox, Chrome,
Opera or Edge.
1. ________________ is a type of reverse engineering tool that is used to dissect binary codes into
assembly codes.
a) PE & Resource Viewer
b) Debugger
c) Disassembler
d) Hex Editor
View Answer
Answer: c
Explanation: Disassembler is a type of reverse engineering tool that is used to dissect binary codes
into assembly codes. They are also in use to extract functions, strings, libraries, and other parts of a
program.
2. Which of the following is not a function or use of disassembler?
a) Extracting functions & libraries
b) Extracting strings and values
c) Assemble medium-level codes
d) Dissect binary codes
View Answer
Answer: c
Explanation: Assembling of medium-level codes is not the use of disassembler. The disassembler is a
type of reverse engineering tool that is used to dissect binary codes into assembly codes.
3. Which of the following is not a feature of IDAPro?
a) Instant debugging
b) Connect local and remote systems easily
c) Explore in-depth binary data
d) Convert machine language to high-level code
View Answer
Answer: d
Explanation: IDAPro is used as a disassembler in manual binary code analysis and also used as
debugger which is used for instant debugging, connect local and remote systems easily and explore
in-depth binary data.
4. A _____________ takes executable file as input and tries to generate high level code.
a) Debugger
b) Decompiler
c) Disassembler
d) Hex Editor
View Answer
Answer: b
Explanation: A decompiler takes an executable file as input and tries to generate high-level code.
They can be said as opposite of compiler. It does not attempt to reverse the actions of the compiler;
rather it transforms the input program repeatedly until HLL code is achieved.
5. ________________ does not attempt to reverse the actions of compiler; rather it transforms the
input program repeatedly until HLL code is achieved.
a) Debugger
b) Hex Editor
c) Disassembler
d) Decompiler
View Answer
Answer: d
Explanation: Usually, decompiler is feed with executable files and it tries to produce high-level code.
They can be said as opposite of compiler. It does not attempt to reverse the actions of a compiler;
rather it transforms the input program repeatedly until HLL code is achieved.
6. _____________ will not recreate the original source file created by the compiler.
a) Debugger
b) Hex Editor
c) Decompiler
d) Disassembler
View Answer
Answer: c
Explanation: Decompilers does not attempt to reverse the actions of a compiler; rather it transforms
the input program repeatedly until HLL code is achieved. They will not recreate the original source
file created by the compiler.
7. Which of the following is not a decompiler tool?
a) DCC decompiler
b) Borol and C
c) Boomerang Decompiler
d) ExeToC
View Answer
Answer: b
Explanation: Decompilers are part of Reverse Engineering tools that try to generate high-level code.
Some common decompiler tools are DCC decompiler, Boomerang Decompiler, ExeToC, REC
(reverse engineering compiler) etc.
8. REC stands for ________________
a) Reverse Engineering Compiler
b) Reverse Engineering Computer
c) Return-to-Code Engineering Compiler
d) Reversing Engineered Compiler
View Answer
Answer: a
Explanation: Reverse Engineering Compiler (REC) is a decompiler tool that is part of Reverse
Engineering tools which takes an executable file as input and tries to generate high-level code.
9. _______________ is a universal interactive program environment for reverse engineering.
a) TurboC
b) Andromeda Decompiler
c) IDAPro
d) PE Explorer
View Answer
Answer: b
Explanation: Andromeda Decompiler is a universal interactive program environment for reverse
engineering. It is a popular interactive decompiler that tries to generate high-level code.
10. Which one is not an example of .Net application decompiler?
a) Salamander
b) Dis#
c) Decompiler.Net
d) MultiRipper
View Answer
Answer: d
Explanation: Decompilers are part of Reverse Engineering tools that take an executable file as input
and tries to generate high-level code. MultiRipper is a Delphi and C++ decompiler. Salamander,
Dis#, Anakrino & Decompiler.Net are .NET application decompilers.
1. Which of the following data is not appropriate here, if you delete cache, cookies, and browser
history?
a) Address bar predictions
b) Saved passwords
c) Browser plug-ins
d) Shopping cart content
View Answer
Answer: c
Explanation: Clearing the browser’s cookies, cache & history may eradicate data such as address bar
predictions, saved passwords and shopping cart contents. In this way, hackers won’t be able to take
your data through browser hacking or cookie stealing.
2. ____________ are tiny files which get downloaded to your system when you visit a website.
a) Cookies
b) Caches
c) Bots
d) Crawlers
View Answer
Answer: a
Explanation: Cookies are tiny files which get downloaded to your system when you visit a website.
They are a very important part of hacking and so clearing the browser’s cookies, cache & history
may eradicate data such as address bar predictions, saved passwords and shopping cart contents so
that hackers don’t steal them.
3. Browser ___________ are impermanent internet files which helps the browsers download web
images, data & documents for rapid performance & viewing in the future.
a) plug-ins
b) cache
c) ad-on
d) history
View Answer
Answer: b
Explanation: Browser caches are impermanent internet files that helps the browsers download web
images, data & documents for rapid performance & viewing in the future.
4. ___________ is just a group of data downloaded for helping in displaying a web page faster.
a) plug-ins
b) cache
c) ad-ons
d) history
View Answer
Answer: b
Explanation: A cache is just a group of data downloaded for helping in displaying a web page faster.
These files help the browsers download web images, data & documents for rapid performance &
viewing in the future.
5. Attackers could steal ___________ to achieve illegitimate accessing to online accounts & disturbs
the personal information.
a) plug-ins
b) cache
c) cookies
d) history
View Answer
Answer: c
Explanation: Attackers could steal cookies to achieve illegitimate accessing online accounts &
disturbs the personal information. Hence, clearing the browser’s cookies may eradicate data such as
saved passwords and IDs as well as shopping cart contents.
6. Which of the following is not an example of browsing data?
a) Forms and Search-bar data
b) Cache data
c) Downloading history
d) Start bar search data
View Answer
Answer: d
Explanation: Attackers may target data such as forms and Search-bar data, cache & cookies data,
browsing and download history records, active logins and site preferences to steal user’s sensitive
data.
7. There are cookies that are designed to track your browsing habits & aim ads to you.
a) True
b) False
View Answer
Answer: a
Explanation: Cookies are tiny files which get downloaded to your system when you visit a website.
There are cookies that are designed to track your browsing habits & aim ads that are relevant to the
user.
8. Keeping browsing habits & aiming specific ads to you is harmless but it might reduce your online
privacy.
a) True
b) False
View Answer
Answer: a
Explanation: There are cookies that are designed to track your browsing habits & aim ads that are
relevant to the user. Keeping browsing habits & aiming specific ads to users is harmless but it might
reduce your online privacy.
9. There are ____________ that are designed to track your browsing habits & aim ads that are
relevant to the user.
a) plug-ins
b) cache
c) cookies
d) history
View Answer
Answer: c
Explanation: Cookies are tiny files which get downloaded to your system when you visit a website.
There are cookies that are designed to track your browsing habits & aim ads that are relevant to the
user.
1. ______________ is populating the inbox of any target victim with unsolicited or junk emails.
a) Phishing
b) Spamming
c) Hooking
d) DoS
View Answer
Answer: b
Explanation: Spamming is populating the inbox of any target victim with unsolicited or junk emails.
These junk emails may contain malicious computer programs that may harm the recipient.
2. _________________ technique is also used in product advertisement.
a) Phishing
b) Cookies
c) e-Banners
d) Spamming
View Answer
Answer: c
Explanation: Spamming attack over-fills the mail box of the target victim with unwanted
spontaneous emails. The technique is also used in product advertisement through mass mailing.
3. Which of the following is not a technique used by spanners?
a) Spoofing the domain
b) Sending attached virus in spams
c) Junk tags associated with spam-emails
d) Making important deals through such emails
View Answer
Answer: d
Explanation: Spoofing the domain, sending attached virus & junk tags associated with spam-emails
are some of the techniques used by spammers. Spam is one of the popular attack techniques.
4. ___________ are used which crawl web pages looking for email Ids and copies them to the
database.
a) Caches
b) Cookies
c) Bots
d) Spiders
View Answer
Answer: d
Explanation: Spiders also known as crawlers are used which crawl different web pages looking for
email Ids and copies them to the database. These emails are collected together and used for the
purpose of spamming.
5. Which of the following is not a proper way of how spammers get the email Ids?
a) When a user registers to online services, blogs, and sites
b) Databases formed by spiders fetching email Ids from different sources
c) From offline form fill-up documents
d) Online ad-tracking tools
View Answer
Answer: c
Explanation: Spammers can get email IDs from sources such as data when a user registers to online
services, blogs, and sites, databases formed by spiders fetching email Ids from different sources,
online ad-tracking tools, email-ID extraction tools, spyware and cookies etc.
6. There are ___________ major ways of spamming.
a) 4
b) 2
c) 3
d) 5
View Answer
Answer: b
Explanation: There are two major ways of spamming. First, by Usenet spam, where a single message
is sent to more than 50 recipients or more Usenet newsgroup, which has become old form of attack.
The second one is by email-spam which target individual users and tools are used to send spams
directly to them.
7. There are _______ types of spamming.
a) 3
b) 4
c) 5
d) 6
View Answer
Answer: d
Explanation: Spam attack populates the mail-box of any victim with unwanted emails. There are 6
types of spamming attack. These are by hidden text and links, double-tags, cloaking, blog & wiki
spams, image spamming, and page-jacking.
8. Which of the following is not a type of spamming attack?
a) Page-jacking
b) Image spamming
c) Spear phishing
d) Blog & wiki spamming
View Answer
Answer: c
Explanation: Spear phishing is not an example of a spamming attack. Hidden text & links, double-
tags, cloaking, blog & wiki spams, image spamming, and page-jacking are types of spamming attack.
9. Which of the following is not a bulk emailing tool?
a) Fairlogic Worldcast
b) 123 Hidden sender
c) YL Mail Man
d) NetCut
View Answer
Answer: d
Explanation: Bulk emailing tools are used for sending spams and emails in an uncountable number to
flood the recipient’s inbox with junk emails. Fairlogic Worldcast, 123 Hidden sender, YL Mail Man,
Sendblaster are examples of bulk emailing tool.
10. Which of the following is not a bulk emailing tool?
a) Wireshark
b) Sendblaster
c) Direct Sender
d) Hotmailer
View Answer
Answer: a
Explanation: There are tools and applications used for sending spams and emails in a huge number
for flooding the recipient’s inbox with unwanted emails. Sendblaster, direct Sender, hotmailer are
examples of bulk emailing tool.
11. Which of the following is not an anti-spam technique?
a) Signature-based content filtering
b) DNS routing
c) Bayesian Content Filtering
d) Collaborative content filtering
View Answer
Answer: b
Explanation: Anti-spamming techniques help in reducing the spamming of unwanted messages and
emails. Signature-based content filtering, Bayesian Content Filtering, and collaborative content
filtering are examples of anti-spam technique.
12. Which of the following is not an anti-spam technique?
a) Reputation control
b) Sender policy framework
c) DNS-based block-list
d) Domain-based blocking
View Answer
Answer: d
Explanation: The techniques used in dropping the spamming of unwanted messages and emails.
Reputation control, sender policy framework, DNS-based block-list are some of the anti-spamming
techniques.
13. ___________ is a tool used as spam filter in association with email programs and automatically
intercepts spam emails.
a) Nessus
b) SpamExpert Desktop
c) Spam-Rescurer
d) Burp-Suite
View Answer
Answer: b
Explanation: SpamExpert Desktop is a tool used as a spam filter in association with email programs
and automatically intercepts spam emails. It is not keyword dependent for detecting spams; rather it
checks the email content.
14. Which of the following is not an anti-spamming tool or system?
a) Spam-Eater Pro
b) SpyTech Spam Agent
c) SpamExperts Desktop
d) Anti-spyware Tech
View Answer
Answer: d
Explanation: Some anti-spamming tools and systems that can be used for preventing your email from
spamming are Spam-Eater Pro, SpyTech Spam Agent, SpamExperts Desktop etc.
1. _________________ is the process or mechanism used for converting ordinary plain text into
garbled non-human readable text & vice-versa.
a) Malware Analysis
b) Exploit writing
c) Reverse engineering
d) Cryptography
View Answer
Answer: d
Explanation: Cryptography is the process or mechanism used for converting ordinary plain text into
garbled non-human readable text & vice-versa. It is a means of storing & transmitting information in
a specific format so that only those for whom it is planned can understand or process it.
2. ______________ is a means of storing & transmitting information in a specific format so that only
those for whom it is planned can understand or process it.
a) Malware Analysis
b) Cryptography
c) Reverse engineering
d) Exploit writing
View Answer
Answer: b
Explanation: Cryptography is a means of storing & transmitting information in a specific format so
that only those for whom it is planned can understand or process it where “kryptos” means secret,
“graphein” means to-write.
3. When plain text is converted to unreadable format, it is termed as _____________
a) rotten text
b) raw text
c) cipher-text
d) ciphen-text
View Answer
Answer: c
Explanation: Cryptography helps in securing information in a specific format so that only intended
users can understand or process it. When plain text is converted to the unreadable format, that type of
text is termed as cipher-text.
4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use
___________ for a secure transformation of data.
a) secret key
b) external programs
c) add-ons
d) secondary key
View Answer
Answer: a
Explanation: When plain text is converted to unreadable format through some algorithms, that type
of text is termed as cipher text. Cryptographic algorithms are based on mathematical algorithms
where these algorithms use the secret key for a secure transformation of data.
5. Cryptography can be divided into ______ types.
a) 5
b) 4
c) 3
d) 2
View Answer
Answer: d
Explanation: Cryptography can be divided into two types. These are classic cryptography & modern
cryptography. Using these techniques, users can secure their information from illegitimate ones.
6. Data which is easily readable & understandable without any special algorithm or method is called
_________________
a) cipher-text
b) plain text
c) raw text
d) encrypted text
View Answer
Answer: b
Explanation: The means of storing or sending data in a specific format so that only intended users
can process it is called cryptography. Data which is easily readable & understandable without any
special algorithm or method is called plain text.
7. Plain text are also called _____________
a) cipher-text
b) raw text
c) clear-text
d) encrypted text
View Answer
Answer: c
Explanation: Data which is easily readable & understandable without any special algorithm or
method is called plain text or clear-text. This text is not secured and can be readable by anyone who
is not even a legitimate user.
8. There are ________ types of cryptographic techniques used in general.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: b
Explanation: There are three types of cryptographic techniques used in general. These are Symmetric
Key cryptography, public key cryptography, and Hash functions based cryptography.
9. Conventional cryptography is also known as _____________ or symmetric-key encryption.
a) secret-key
b) public key
c) protected key
d) primary key
View Answer
Answer: a
Explanation: The various cryptographic techniques are symmetric Key cryptography, public key
cryptography, and Hash functions based cryptography. Conventional cryptography is also known as
secret-key cryptography or symmetric-key encryption.
10. Data Encryption Standard is an example of a _____________ cryptosystem.
a) conventional
b) public key
c) hash key
d) asymmetric-key
View Answer
Answer: a
Explanation: Conventional cryptography is also known as secret-key cryptography or symmetric-key
encryption. Data Encryption Standard is an example of a conventional cryptosystem.
11. _______________ cryptography deals with traditional characters, i.e., letters & digits directly.
a) Modern
b) Classic
c) Asymmetric
d) Latest
View Answer
Answer: b
Explanation: Cryptography can be divided into two types. These are classic cryptography & modern
cryptography. Classic cryptography deals with traditional characters, i.e., letters & digits directly.
12. ____________ cryptography operates on binary-bit series and strings.
a) Modern
b) Classic
c) Traditional
d) Primitive
View Answer
Answer: a
Explanation: Cryptography can be divided into two types. These are classic cryptography & modern
cryptography. Modern cryptography operates on binary-bit series and strings.
13. __________ cryptography has always been focussing on the concept of ‘security through
obscurity’.
a) Modern
b) Asymmetric
c) Classic
d) Latest
View Answer
Answer: c
Explanation: Cryptography can be divided into two types. These are classic cryptography & modern
cryptography. Classic cryptography deals with traditional characters, i.e., letters & digits directly. It
is based on the concept of ‘security through obscurity’.
14. ________________ cryptography is based on publicly known mathematically designed
algorithms to encrypt the information.
a) Modern
b) Classic
c) Traditional
d) Primitive
View Answer
Answer: a
Explanation: There are 2 types of cryptography – classic cryptography & modern cryptography.
Modern cryptography operates on binary-bit series and strings. It is based on publicly known
mathematically designed algorithms to encrypt the information.
1. _____________________ is the art & science of cracking the cipher-text without knowing the
key.
a) Cracking
b) Cryptanalysis
c) Cryptography
d) Crypto-hacking
View Answer
Answer: b
Explanation: Cryptanalysis is the art & science of cracking the cipher-text without knowing the key.
This technique is also implemented for designing new cryptographic algorithms or to test their
strengths.
2. The process of disguising plaintext in such a way that its substance gets hidden (into what is
known as cipher-text) is called _________________
a) cryptanalysis
b) decryption
c) reverse engineering
d) encryption
View Answer
Answer: d
Explanation: Cryptography is a means of storing & transmitting information in a specific format so
that only those for whom it is planned can understand or process it. The process of disguising
plaintext in such a way that its substance gets hidden (into what is known as cipher-text) is called
encryption.
3. The method of reverting the encrypted text which is known as cipher text to its original form i.e.
plain text is known as ________________
a) cryptanalysis
b) decryption
c) reverse engineering
d) encryption
View Answer
Answer: b
Explanation: Cryptography helps in securing a specific format so that only intended users can
understand or process it. The method of reversing the encrypted text which is known as cipher text to
its original form i.e. plain text is known as decryption.
4. Which of the following is not the primary objective of cryptography?
a) Confidentiality
b) Data Integrity
c) Data Redundancy
d) Authentication
View Answer
Answer: c
Explanation: The key intent of implementing cryptography is to offer the following 4 fundamental
information security features. These are Confidentiality, Data Integrity, Authentication and non-
repudiation.
5. Which of the following is not the primary objective of cryptography?
a) Confidentiality
b) Data Redundancy
c) Non-repudiation
d) Authentication
View Answer
Answer: b
Explanation: Cryptography offers 4 fundamental information security features. These are
Confidentiality, Data Integrity, Authentication and non-repudiation.
6. Cryptography offers a set of required security services. Which of the following is not among that 4
required security services?
a) Encryption
b) Message Authentication codes
c) Hash functions
d) Steganography
View Answer
Answer: d
Explanation: There are 4 desired & necessary security services are encryption, Message
Authentication Codes (MAC), digital signatures and hash functions. These help in securing the
transmission of data.
7. A cryptosystem is also termed as ______________
a) secure system
b) cipher system
c) cipher-text
d) secure algorithm
View Answer
Answer: b
Explanation: Cryptography is a means of storing & transmitting information in a specific format so
that only those for whom it is planned can understand or process it. Cryptosystem which is also
known as a cipher system is execution of cryptographic algorithms & techniques.
8. ______________ is the mathematical procedure or algorithm which produces a cipher-text for any
specified plaintext.
a) Encryption Algorithm
b) Decryption Algorithm
c) Hashing Algorithm
d) Tuning Algorithm
View Answer
Answer: a
Explanation: Encryption Algorithm is the mathematical procedure or algorithm which produces a
cipher-text for any specified plaintext. Inputs it takes are the plain text and the key.
9. _______________ takes the plain text and the key as input for creating cipher-text.
a) Decryption Algorithm
b) Hashing Algorithm
c) Tuning Algorithm
d) Encryption Algorithm
View Answer
Answer: a
Explanation: Encryption Algorithm is the mathematical procedure or algorithm which produces a
cipher-text for any specified plaintext. Inputs it takes are the plain text and the key.
10. ____________________ is a mathematical algorithm that produces a unique plain text for a
given cipher text along with a decryption key.
a) Decryption Algorithm
b) Hashing Algorithm
c) Tuning Algorithm
d) Encryption Algorithm
View Answer
Answer: a
Explanation: Decryption Algorithm is a mathematical algorithm that produces a unique plain text for
a given cipher text along with a decryption key. Inputs it takes are the cipher-text & the decryption
key.
11. A set of all probable decryption keys are collectively termed as ____________
a) key-stack
b) key bunch
c) key space
d) key pack
View Answer
Answer: c
Explanation: A set of all probable decryption keys are collectively termed as key space. A
mathematical algorithm which produces a unique plain text for a given cipher text along with a
decryption key is called a decryption algorithm.
12. Encryption-decryption in cryptosystem is done in ______ ways.
a) 4
b) 3
c) 5
d) 2
View Answer
Answer: d
Explanation: Cryptosystem which is also known as cipher system is the execution of cryptographic
algorithms & techniques. Encryption-decryption in a cryptosystem is done in two ways. These are by
Symmetric Key Encryption and by Asymmetric Key Encryption.
13. In _____________________ same keys are implemented for encrypting as well as decrypting the
information.
a) Symmetric Key Encryption
b) Asymmetric Key Encryption
c) Asymmetric Key Decryption
d) Hash-based Key Encryption
View Answer
Answer: a
Explanation: Encryption-decryption in a cryptosystem is done in two ways. These are by Symmetric
Key Encryption and by Asymmetric Key Encryption. In Symmetric Key Encryption, same keys are
implemented for encrypting as well as decrypting the information.
14. In __________________ 2 different keys are implemented for encrypting as well as decrypting
that particular information.
a) Symmetric Key Encryption
b) Asymmetric Key Encryption
c) Asymmetric Key Decryption
d) Hash-based Key Encryption
View Answer
Answer: b
Explanation: In Asymmetric Key Encryption 2 different keys are implemented for encrypting as well
as decrypting that particular information. Inputs it takes are the plain text and 2 different key.
15. A set of all probable decryption keys are collectively termed as key space.
a) True
b) False
View Answer
Answer: a
Explanation: Decryption Algorithm is a mathematical algorithm that produces a unique plain text for
a given cipher text along with a decryption key. A set of all probable decryption keys are collectively
termed as key space.
1. ____________ is a mono-alphabetic encryption code wherein each & every letter of plain-text is
replaced by another letter in creating the cipher-text.
a) Polyalphabetic Cipher
b) Caesar Cipher
c) Playfair Cipher
d) Monoalphabetic Cipher
View Answer
Answer: b
Explanation: Caesar Cipher is the simplest type of substitution cipher with a mono-alphabetic
encryption code wherein each letter of plain-text is replaced by another letter in creating the cipher-
text.
2. _____________ is the concept that tells us about the replacement of every alphabet by another
alphabet and the entire series gets ‘shifted’ by some fixed quantity.
a) Rolling Cipher
b) Shift Cipher
c) Playfair Cipher
d) Block Cipher
View Answer
Answer: b
Explanation: Shift Cipher is the concept that tells us about the replacement of every alphabet by
another alphabet and the entire series gets ‘shifted’ by some fixed quantity (which is the key)
between 0 and 25.
3. ________________ is a cipher formed out of substitution where for a given key-value the cipher
alphabet for every plain text remains fixed all through the encryption procedure.
a) Polyalphabetic Cipher
b) Caesar Cipher
c) Playfair Cipher
d) Monoalphabetic Cipher
View Answer
Answer: d
Explanation: Monoalphabetic cipher is a cipher formed out of substitution where for a given key-
value the cipher alphabet for every plain text remains fixed all through the encryption procedure.
4. In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets
which operates as the key to encrypt the plaintext.
a) Rolling Cipher
b) Shift Cipher
c) Playfair Cipher
d) Block Cipher
View Answer
Answer: c
Explanation: In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of
alphabets which operates as the key to encrypt the plaintext. All the twenty-five alphabets have to be
unique and letter J gets omitted.
5. ______________ employs a text string as a key that is implemented to do a series of shifts on the
plain-text.
a) Vigenere Cipher
b) Shift Cipher
c) Playfair Cipher
d) Block Cipher
View Answer
Answer: a
Explanation: Vigenere Cipher employs a text string as a key that is implemented to do a series of
shifts on the plain-text. Here the sender & the receiver settle on a single key.
6. The ________________ has piece of the keyword that has the same length as that of the plaintext.
a) Block Cipher
b) One-time pad
c) Hash functions
d) Vigenere Cipher
View Answer
Answer: b
Explanation: The one-time pad has a piece of the keyword that has the same length as that of the
plaintext. The keyword gets a randomly produced string of alphabets. For only once, its keyword is
used.
7. In _____________ a sequence of actions is carried out on this block after a block of plain-text bits
is chosen for generating a block of cipher-text bits.
a) Block Cipher
b) One-time pad
c) Hash functions
d) Vigenere Cipher
View Answer
Answer: a
Explanation: In block cipher, a sequence of actions is carried out on this block after a block of plain-
text bits is chosen for generating a block of cipher-text bits. Blocks in these have fixed number of
bits.
8. In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out
on it for generating one bit of cipher-text.
a) Block Cipher
b) One-time pad
c) Stream cipher
d) Vigenere Cipher
View Answer
Answer: c
Explanation: In stream ciphers, the plain-text is processed 1-bit at a time & a series of actions is
carried out on it for generating one bit of cipher-text.
9. The procedure to add bits to the last block is termed as _________________
a) decryption
b) hashing
c) tuning
d) padding
View Answer
Answer: d
Explanation: For a block cipher, a chain of actions is performed on this block after a block of plain-
text. In block ciphers procedure to add bits to the last block is termed as padding.
10. Which of the following is not an example of a block cipher?
a) DES
b) IDEA
c) Caesar cipher
d) Twofish
View Answer
Answer: c
Explanation: In a block cipher, a sequence of actions is carried out on this block after a block of
plain-text bits is chosen for generating a block of cipher-text bits. Examples of block ciphers are
DES, IDEA, Twofish etc.
11. Data Encryption Standard is implemented using the Feistel Cipher which employs 16 round of
Feistel structure.
a) DES
b) IDEA
c) Caesar cipher
d) Twofish
View Answer
Answer: a
Explanation: Data Encryption Standard is a block cipher which implements the Feistel Cipher which
employs 16 round of Feistel structure. The block size it uses is 64-bit.
12. DES stands for ________________
a) Data Encryption Security
b) Data Encrypted Standard
c) Device Encryption Standard
d) Data Encryption Standard
View Answer
Answer: d
Explanation: DES which is abbreviated as Data Encryption Standard falls under the category of a
block cipher that implements the Feistel Cipher which employs 16 round of Feistel structure.
13. ____________ carries out all its calculations on bytes rather than using bits and is at least 6-times
faster than 3-DES.
a) AES
b) DES
c) IDEA
d) Twofish
View Answer
Answer: a
Explanation: Advanced Encryption Standard is a comparatively innovative block cipher that carries
out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.
14. AES stands for ________________
a) Advanced Encryption Security
b) Advanced Encryption Standard
c) Advanced Encrypted Standard
d) Active Encryption Standard
View Answer
Answer: b
Explanation: AES is abbreviated as Advanced Encryption Standard which is a moderately innovative
block cipher which carries out all its calculations on bytes rather than using bits and is at least six
times faster than 3-DES.
15. AES is at least 6-times faster than 3-DES.
a) True
b) False
View Answer
Answer: a
Explanation: AES is a relatively innovative type of block cipher on bytes rather than using bits. It is
one of the most popular forms of a block cipher and helps in securing various applications and
systems.
1. _____________ is another data hiding technique which can be used in conjunction with
cryptography for the extra-secure method of protecting data.
a) Cryptography
b) Steganography
c) Tomography
d) Chorography
View Answer
Answer: b
Explanation: Steganography is the technique of hiding data in another raw data. Steganography is
another data hiding technique which can be used in conjunction with cryptography for an extra-
secure method of protecting data.
2. _____________ is hiding of data within data, where we can hide images, text, and other messages
within images, videos, music or recording files.
a) Cryptography
b) Tomography
c) Steganography
d) Chorography
View Answer
Answer: c
Explanation: Steganography helps in hiding any form of data within data, where we can hide images,
text, and other messages within images, videos, music or recording files.
3. Steganography follows the concept of security through obscurity.
a) True
b) False
View Answer
Answer: a
Explanation: Hiding of data within another data through obscurity is called steganography. It is
another data hiding technique which can be used in conjunction with cryptography for an extra-
secure method of protecting data.
4. The word ________________is a combination of the Greek words ‘steganos’ which means
“covered or concealed”, and ‘graphein’ which means “writing”.
a) Cryptography
b) Tomography
c) Steganography
d) Chorography
View Answer
Answer: c
Explanation: The word steganography is a combination of the Greek words ‘steganos’ which means
“covered or concealed”, and ‘graphein’ which means “writing”. Steganography is hiding of data
within data, where we can hide images, text, and other messages within images, videos, music or
recording files.
5. A ________________ tool permits security professional or a hacker to embed hidden data within a
carrier file like an image or video which can later be extracted from them.
a) Cryptography
b) Tomography
c) Chorography
d) Steganography
View Answer
Answer: d
Explanation: A steganography tool is a software tool that permits a security professional or a hacker
to embed hidden data within a carrier file like an image or video which can later be extracted from
them.
6. Which of the following is not a steganography tool?
a) Xaio steganography
b) Image steganography
c) ReaperExploit
d) Steghide
View Answer
Answer: c
Explanation: ReaperExploit is not a steganography tool that permits security through obscurity. Xaio
steganography, image steganography, Steghide etc are examples of such tools.
7. Which of the following is not a steganography tool?
a) Crypture
b) SteganographX Plus
c) rSteg
d) Burp Suite
View Answer
Answer: d
Explanation: There are some software tools that helps hackers to embed hidden data within a which
can later be extracted from them. SSuite Picsel, rSteg, SteganographX Plus, and crypture are
examples of such tools.
8. The main motive for using steganography is that hackers or other users can hide a secret message
behind a ______________
a) special file
b) ordinary file
c) program file
d) encrypted file
View Answer
Answer: b
Explanation: The main motive for using steganography is that hackers or other users can hide a secret
message behind ordinary files. Some steganography tools are SSuite Picsel, rSteg etc.
9. People will normally think it as a normal/regular file and your secret message will pass on without
any _______________
a) suspicion
b) decryption
c) encryption
d) cracking
View Answer
Answer: a
Explanation: Steganography techniques help hackers or other users to conceal covert message behind
regular files. People will normally think it as a normal/regular file and your secret message will pass
on without any suspicion.
10. By using ______________ you can diminish the chance of data leakage.
a) Cryptography
b) Tomography
c) Chorography
d) Steganography
View Answer
Answer: d
Explanation: Hackers or other cyber criminals target ordinary files to hide different data or
information within another data file. By using steganography, you can diminish the chance of data
leakage.
Cyber Security Questions and Answers – Cyber Security
Privacy – Tor Services
« Prev
Next »
This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Cyber
Security Privacy – Tor Services”.
1. _____________ makes it likely for its users to hide their physical locations & offering a variety of
services like web publishing or an IM maintaining privacy.
a) AnonyMode
b) In-private mode
c) Incognito mode
d) Tor
View Answer
Answer: d
Explanation: Tor makes it likely for its users to hide their physical locations & offering a variety of
services like web publishing or an IM maintaining privacy.
2. TOR stands for _______________
a) The Open Router
b) The Onion Reader
c) The Onion Router
d) Tactical Onion Router
View Answer
Answer: c
Explanation: Tor is abbreviated as The Onion Router, is an open-source program which allows
internet users to shield their privacy as well as security and data gathering techniques.
3. Tor services are also popularly known as _____________
a) onion services
b) garlic services
c) privacy policy service
d) anti-surveillance service
View Answer
Answer: a
Explanation: The Onion Router (TOR) is an open-source service that allows internet users to
preserve their privacy as well as security against different online surveillance.
4. Tor was originally designed for the _____________ for protecting government communications.
a) U.S. Navy
b) Indian Navy
c) US army
d) Chinese cyber army
View Answer
Answer: a
Explanation: Tor is an open-source service designed to preserve privacy as well as security against
different online. Tor was originally designed for the US Navy for protecting government
communications.
5. Tor is written in ______ language having roughly 146,000 LOC (lines of code).
a) C#
b) C++
c) C
d) Objective C
View Answer
Answer: c
Explanation: Tor was originally designed for the US Navy for secure communication which was
written in the popular C language having roughly 146,000 LOC (lines of code).
6. __________ contains a huge proxy DB which users can use to protect their online privacy and
preserve their identity online.
a) AnonyMode
b) In-private mode
c) Incognito mode
d) Tor
View Answer
Answer: d
Explanation: Tor was at first designed for secure communication and preserving US Navy’s data
privacy. It contains a huge proxy DB which users can use to protect their online privacy and preserve
their identity online.
7. The _________ is developed for negotiating a virtual tunnel throughout the network by encrypting
& arbitrarily bouncing all of its communications via relay networks.
a) AnonyMode
b) Tor
c) Incognito mode
d) In-private mode
View Answer
Answer: b
Explanation: The Tor is developed for negotiating a virtual tunnel throughout the network by
encrypting & arbitrarily bouncing all of its communications via relay networks.
8. Which of the following online services’ privacy cannot be protected using Tor?
a) Instant messaging
b) Browsing data
c) Relay chats
d) Login using ID
View Answer
Answer: d
Explanation: Login using ID will obviously take your ID in order to access your account and is not
the headache of Tor. Privacy regarding instant messaging, browsing data, relay chats are some of the
following online services protected by Tor.
9. Tor is usually used by the military, cyber-criminals, activists, journalists, law enforcement officers
etc.
a) True
b) False
View Answer
Answer: a
Explanation: Privacy regarding instant messaging, browsing data, relay chats are some of the
following online services protected by Tor hence it is used by the military, cyber-criminals, activists,
journalists, law enforcement officers etc.
10. ___________________ is employed by encrypting the application layer with a communication
protocol stack, nested in various layers of onion.
a) Privacy routing
b) Onion routing
c) Turbo routing
d) DHCP routing
View Answer
Answer: b
Explanation: Onion routing is employed by encrypting the application layer with a communication
protocol stack, nested in various layers of the onion. This service is used by the military, cyber-
criminals, activists, journalists, law enforcement officers etc
1. The term _____________ means taking care of a user’s name as well as the identity hidden or
veiled using a variety of applications.
a) pseudonymous
b) anonymous
c) eponymous
d) homonymous
View Answer
Answer: b
Explanation: The term anonymous means taking care of a user’s name as well as the identity is
hidden or veiled using a variety of applications. Some data are kept anonymous for maintaining
privacy or protecting them from cyber-crimes like personal identity theft.
2. Sometimes __________________ anonymize them to perform criminal activities.
a) virus
b) incident handlers
c) cyber-criminals
d) ethical hackers
View Answer
Answer: c
Explanation: Sometimes cyber-criminals anonymize their identity or network to perform criminal
activities so that it becomes difficult by forensic investigators or cyber cell to identify them.
3. An _______________ allows users for accessing the web while blocking the trackers or agents
that keep tracing the identity online.
a) intranet
b) extranet
c) complex network
d) anonymity network
View Answer
Answer: d
Explanation: An anonymity network allows users to access the web while blocking the trackers or
agents that keep tracking the identity online. Some data are kept anonymous for maintaining privacy
or protecting them from cyber-crimes like personal identity theft.
4. _________ services are examples of anonymity services that conceal the location and usage of any
user.
a) Tor
b) Encrypted router
c) Firewall
d) HTTPS
View Answer
Answer: a
Explanation: Tor services are examples of anonymity services that conceal the location and usage of
any user. An anonymity network allows users for accessing the web while blocking the trackers or
agents that keep tracing the identity online.
5. Another anonymity network is the I2P identity-sensitive network which gets distributed & is
dynamic in nature as they route traffic through other peers.
a) True
b) False
View Answer
Answer: a
Explanation: Another anonymity network is the I2P identity-sensitive network which gets distributed
& is dynamic in nature as they route traffic through other peers.
6. Which of the following is not an example of approaches for maintaining anonymity?
a) Use of VPNs
b) Use of Tor Browser
c) Use of Proxy servers
d) Use of Antivirus
View Answer
Answer: d
Explanation: An anonymity network allows users to block the trackers or agents which track the
identity online. Use of VPNs, Tor Browser, proxy servers are examples of approaches usually taken
by online users for maintaining anonymity.
7. Which of the following is not an example of approaches for maintaining anonymity?
a) Using encrypted search engines that don’t share your search data
b) Use firewalls
c) Fake email services
d) Use file shielders
View Answer
Answer: b
Explanation: Using encrypted search engines that don’t share your search data, fake email services,
file shielders are examples of approaches usually taken by online users for maintaining anonymity.
8. Big multinational companies are providing us with search engines to easily search for data for free.
But they are also taking our searched data and browsing habits as well as choices.
a) True
b) False
View Answer
Answer: a
Explanation: Big multinational companies are providing us with search engines to easily search for
data for free. But they are also taking our searched data and browsing habits as well as choices which
hamper our e-privacy.
9. Which of the following is not a VPN used for preserving our anonymity?
a) Nord VPN
b) Express VPN
c) Microsoft Security Essential
d) CyberGhost
View Answer
Answer: c
Explanation: An anonymity network allows users to access the web while blocking the trackers or
agents that keep tracing the identity online. Nord VPN, Express VPN, and CyberGhost are examples
of VPNs that can preserve your anonymity.
10. __________________ are those search engines that are intended and designed not to take our
searched data or browsing habits hence do not hampers our online privacy.
a) Paid search engines
b) Incognito mode
c) In-private mode
d) Private search engines
View Answer
Answer: d
Explanation: Private search engines are those search engines that are intended and designed not to
take our searched data or browsing habits hence do not hampers our online privacy and users can use
them for free.
11. Which of the following is a private search engine?
a) Bing
b) Google
c) Duckduckgo
d) Yahoo
View Answer
Answer: c
Explanation: There are different private search engines that are designed not to take our searched
data or browsing habits. Hence it does not hamper users’ online privacy and security. Duckduckgo is
an example of such SE.
12. Which of the following is not a private search engine?
a) StartPage
b) Baidu
c) SearX.me
d) Qwant
View Answer
Answer: b
Explanation: Baidu is not a private search engine. Private search engines are those search engines
that are intended and designed not to take our searched data or browsing habits hence do not hampers
our online privacy and users can use them for free.
13. Which of the below-mentioned search engine can provide you with anonymity while searching?
a) Privatelee
b) Baidu
c) Google
d) Bing
View Answer
Answer: a
Explanation: Privatelee is a private search engine that can provide users with anonymity. Private
search engines are those search engines that are intended and designed not to take our searched data
or browsing habits hence do not hampers our online privacy and users can use them for free.