0% found this document useful (0 votes)
147 views4 pages

B. Cyber Attack

This document contains 30 multiple choice questions about various topics in cyber security. Some of the topics covered include cyber attacks (e.g. DDoS, malware), cyber ethics, elements of cyber security (e.g. network security, application security), types of hacking (e.g. black hat, white hat), and security vulnerabilities (e.g. SQL injection, session hijacking, buffer overflow).

Uploaded by

Dani Danial
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
147 views4 pages

B. Cyber Attack

This document contains 30 multiple choice questions about various topics in cyber security. Some of the topics covered include cyber attacks (e.g. DDoS, malware), cyber ethics, elements of cyber security (e.g. network security, application security), types of hacking (e.g. black hat, white hat), and security vulnerabilities (e.g. SQL injection, session hijacking, buffer overflow).

Uploaded by

Dani Danial
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CYBER SECURITY

1. An attempt to harm, damage or cause threat to a system or networ is broadly termed as


a. Cyber crime
b. Cyber attack
c. System hijacking
d. Digital crime

2. Which of this is an example of physical hacking


a. Remote unauthorized access
b. Inserting malware loaded USB to a system
c. SQL injection on SQL vulnerable site
d. DdoS(Distributed Denial of Service) attack

3.Which of the following refers to exploring the appropriate, ethical behaviors related to the online
environment and digital media platform
a. Cyber low
b. Cyber ethics
c. Cyber security
d. Cyber safety

4. Who deploys malware to a system or network


a. Criminal organizations, Black hat hackers , malware developers, cyber terrorists
b. Criminal organizations, White hat hackers, malware developers, cyber terrorists
c. Criminal organizations, Black hat hackers, software developers, cyber terrorists
d. Criminal organizations, Gray hat hackers, malware developers , penetration testers

5. ...... is the technique used in business organizations and firms to protect IT assets
a. Ethical hacking
b. Unethical hacking
c Fixing bugs
d. Internal data breach

6.When there is an excessive amount of data flow, which the system cannot handle ..... attacks takes
place
a. Database crash attack
b. Dos (Denial of Service) attack
c. Data overflow attack
d. Buffer overflow attack

7. Which of follwing usually observe each activity on the internet of the victim, gather all
information in the background and send it to someone else
a. Malware
b. Spyware
c. Adware
d. All of the above
8. ..... is the branch of cyber security that deals with morality and provides different theories and a
principle regarding the view-points about what is right and wrong
a. Social ethics
b. Ethics in cyber security
c. Corporate ethics
d. Ethics in black hat hacking

9. Which of the following can be considered as the elements of cyber security


a. application security
b. Operational security
c. Network security
d All of the above

10. .....are the special type of programs used for recording and tracking user's keystroke
a. Keylogger
b. Trojans
c. Virus
d. Worms

11. Which of the following are types of scanning?


a. Passive, active and interactive
b. Port, network and services
c. Server, network , client
d. Network, Vulnerability and port

12. Which of the following option is used to protect data and passwords?
a. Authentication
b. Authorization
c. Encryption
d. All of the above

13 During a Dos attack the regular traffic on the target ...... will be either dawdling down or
entirely interrupted
a. Network
b. System
c. Website
d. Router

14.Dos is abbreviated as .....


a. Denial of service
b. Distribution of Service
c. Distribution of Server
d. Denial of server

15. Which of following is not an example or type of phishing


a. Tracking
b. Vishing
c. Smishing
d. Pharming
16. Which of the following is not an appropriate method of defacing web server?
a. Mail Server intrusion
b. Web application bugs
c. Web shares misconfiguration
d. Session hijacking

17. A ...... consists of at least one bot server or controller and one or more client-bots
a. Virus
b. Trojan
c. Botnet
d. Adware

18. Which of the following is not a web server attack type


a. Dos Attack
b. Website Defacement using SQLi
c. Directory Traversal
d. Password guessing

19. ........ phishing is the type of phishing where the construction of a fake webpage is done for
targeting definite keywords and waiting for the searcher to land on the fake webpage
a. Voice
b. SMS
c. Search engine
d Email

20. ...... is an anti malware tool found in newer OS which is designed for protecting computers from
viruses, spyware and other malware
a. Nortan antivirus
b. Windows Defender
c. Anti- Malware
d. Microsoft security Essentials

21. Mobile security is also known as ........


a. OS Security
b. Wireless Security
c. Cloud Security
d. Database Security

22. Which of the following is a countermeasure for a buffer overflow attack


a. Input field length validation
b. Encryption
c. Firewall
d. Use of web forms

23. A password of P@ASSWORD can be cracked using which type of attack


a. Bruteforce
b. Hybrid
c. Dictionary
d. Zero day exploit
24. Which of the following is essential information a hacker performing a session-hijacking attack
a. Session ID
b. Session number
c. Sequence number
d. Source IP address

25. which of the stored procedure is used to test the SQL injection attack
a. xp_write
b. xp_regwrite
c. xp_reg
d. all of the mentioned

26. Which of the following tool is used for Blackjacking


a. BBAttacker
b. BBProxy
c. Blackburried
d. BBJacking

27. which of the following best describes sniffing


a. Gathering packets to locate IP address, in order to initiate a session-hijacking attack
b. Analyzing packets in order to locate the sequence number to start a session hijack
c. Monitoring TCP sessions in order to initiate a session hijacking attack
d. Locating a host susceptible to a session hijack attack

28. ........ is time based SQL injection attack


a. Quick detection
b. Initial Exploitation
c. Blind SQL Injection
d.Inline Comments

29 Which of the following is not a security issue for PDAs


a. Password theft
b. Data theft
c. Reverse engineering
d. Wireless vulnerability

30. What is it called when a hacker inserts programming commands into a web form
a. Form tampering
b. Command injection
c. Buffer overflow
d. Web form attack

You might also like