B. Cyber Attack
B. Cyber Attack
3.Which of the following refers to exploring the appropriate, ethical behaviors related to the online
environment and digital media platform
a. Cyber low
b. Cyber ethics
c. Cyber security
d. Cyber safety
5. ...... is the technique used in business organizations and firms to protect IT assets
a. Ethical hacking
b. Unethical hacking
c Fixing bugs
d. Internal data breach
6.When there is an excessive amount of data flow, which the system cannot handle ..... attacks takes
place
a. Database crash attack
b. Dos (Denial of Service) attack
c. Data overflow attack
d. Buffer overflow attack
7. Which of follwing usually observe each activity on the internet of the victim, gather all
information in the background and send it to someone else
a. Malware
b. Spyware
c. Adware
d. All of the above
8. ..... is the branch of cyber security that deals with morality and provides different theories and a
principle regarding the view-points about what is right and wrong
a. Social ethics
b. Ethics in cyber security
c. Corporate ethics
d. Ethics in black hat hacking
10. .....are the special type of programs used for recording and tracking user's keystroke
a. Keylogger
b. Trojans
c. Virus
d. Worms
12. Which of the following option is used to protect data and passwords?
a. Authentication
b. Authorization
c. Encryption
d. All of the above
13 During a Dos attack the regular traffic on the target ...... will be either dawdling down or
entirely interrupted
a. Network
b. System
c. Website
d. Router
17. A ...... consists of at least one bot server or controller and one or more client-bots
a. Virus
b. Trojan
c. Botnet
d. Adware
19. ........ phishing is the type of phishing where the construction of a fake webpage is done for
targeting definite keywords and waiting for the searcher to land on the fake webpage
a. Voice
b. SMS
c. Search engine
d Email
20. ...... is an anti malware tool found in newer OS which is designed for protecting computers from
viruses, spyware and other malware
a. Nortan antivirus
b. Windows Defender
c. Anti- Malware
d. Microsoft security Essentials
25. which of the stored procedure is used to test the SQL injection attack
a. xp_write
b. xp_regwrite
c. xp_reg
d. all of the mentioned
30. What is it called when a hacker inserts programming commands into a web form
a. Form tampering
b. Command injection
c. Buffer overflow
d. Web form attack