Cyber Security
Cyber Security
2. What is called the collective terms of malicious software, such as viruses, worms and trojans?
A Spam B Phishing C Malware D Harm
Ans. c
7. Which crime involves the use of computer networks to create, distribute or access materials tha
sexually expoit underage persons?
A Assault by Threat B Cyber squatting C Cyber vandalism D Child pornography
Ans. d
8. Which method go through all the files or network elements with an intention to detect something
unusual?
A Probing B Phishing C Infecting D Scanning
Ans. d
10. Under information security, any device having _______is classified as a computing device.
(a) processor (b) memory (c) both a & b (d) neither a nor b
Ans. c
13. Attacking the victims through fake URL resembling that of a valid financial Institution
is called_____ .
(a) Worms
(b) Phishing attack
(c) Trojans
(d) Computer Viruses
Ans. b
14. Getting the user ID and password from avictim through dubious program is called _____attack.
(a) Worms
(b) Phishing attack
(c) Trojan
(d) Computer Viruses
Ans. c
15. A malicious program spreading through internet and storage media and attacking the data in
victims computer is called_______.
(a) Worms
(b) Phishing attack
(c) Trojan
(d) Computer Virus
Ans. d
16. Potential weaknesses in IT infrastructure through which a cyber attack might occur is called
__.
(a) strength
(b) antivirus
(c) vulnerability
(d) port
Ans. c
21. The security audit team______ to keep the computers safe from cyber attacks.
(a) assesses vulnerability
(b) decides the safety measures through hardware and software
(c) considers latest threat scenario and implements information safety
(d) all of them
Ans. d
23. A single point of access for several networking services is called _____.
(a) Directory Service (b) web server
(c) email server (d) none of them
Ans. a
30. Protection from______ of source code means non-disclosure of the source code to outsiders.
(a) disclosure
(b) alteration
(c) destruction
(d) log of changes (whois making request)
Ans. a
31. Protection from ______of source code means alloting the right to edit the source code to
authorized persons only.
(a) disclosure
(b) alteration
(c) destruction
(d) log of changes (whois making request)
Ans. b
32. Protection from _______of source code means protection of any individual from destroying the
software source code.
(a) disclosure
(b) alteration
(c) destruction
(d) log of changes (whois making request)
Ans. c
33. Protection from ________of source code means recording all changes made to the source
code and the person making such changes.
(a) disclosure
(b) alteration
(c) destruction
(d) log of changes (whois making request)
Ans. d
32. _______of access rights in source code development means verification of role before
permitting access to source code.
(a) verification
(b) maintaining historical records
(c) error handling
(d) log of changes (whois making request)
Ans. a
33. _____in source code development means verification of role before permitting access to
source code.
(a) verification
(b) maintaining historical records
(c) error handling
(d) log of changes (whois making request)
Ans. b
34. _____in source code development means handling of configuration errors, session errors and
exceptions.
(a) verification
(b) maintaining historical records
(c) error handling
(d) log of changes (whois making request)
Ans. c
35. Protecting the data divulged by customers from unauthorized access is called____.
(a) privacy protection
(b) audit
(c) antinvirus
(d) vulnerability
Ans a
36. Information on criminal records of individuals, financial data of companies, genetic information,
address, mobile number, email ID, record of web surfing behaviour, record of credit card, record of
debit card, netbanking details, etc. are classified under ______.
(a) privacy protection
(b) audit
(c) antinvirus
(d) vulnerability
Ans. a
38. Information security audit analyses events of past threats to formulate _____.
(a) security measures
(b) safe practices
(c) software protection
(d) all of them
Ans. d
39. Any single employee ______hold all data needed for making a complete financial transaction.
(a) should not
(b) should
(c) may
(d) might
Ans. a
40. IT audit of the firm should be conducted periodically, which may be every______ .
(a) fortnight
(b) month
(c) quarter
(d) all of them
Ans. d
42. Section ______of IT Act imposes fine up to 2Lakh and imprisonment up to 2 years for
tampering with computer source documents.
(a) 65
(b) 66
(c) 66B
(d) 66C
Ans. a
44. Section_____ of IT Act imposes fine up to 1Lakh and imprisonment up to 3 years for receiving
stolen computer or mobile device.
(a) 65
(b) 66
(c) 66B
(d) 66C
Ans. c
45. Section ______of IT Act imposes fine up to 1Lakh and imprisonment up to 3 years for misuse
of password.
(a) 65
(b) 66
(c) 66B
(d) 66C
Ans. d
46. Section _______of IT Act imposes fine up to 1Lakh and imprisonment up to 3 years for
cheating with computer.
(a) 66D
(b) 66E
(c) 66F
(d) 67
Ans. a
47. Section of IT Act imposes fine up to 2Lakh and imprisonment up to 3 years for publishing
private images of others.
(a) 66D
(b) 66E
(c) 66F
(d) 67
Ans. b
49. Section______ of IT Act imposes fine up to 1Lakh and imprisonment up to 5 years for
publishing obscene content.
(a) 66D
(b) 66E
(c) 66F
(d) 67
Ans. d
50. Section_____ of IT Act imposes fine up to 1Lakh and imprisonment up to 7 years for
publishing sexual content.
(a) 67A
(b) 67B
(c) 67C
(d) 68
Ans. a
51. Section _____of IT Act imposes fine up to 1Lakh and imprisonment up to 7 years for
publishing child porn.
(a) 67A
(b) 67B
(c) 67C
(d) 68
Ans. b
52. Section _____ of IT Act imposes undefined fine amount and imprisonment up to 3 years for
failure to maintain records by operator.
(a) 67A (b) 67B
(c) 67C (d) 68
Ans. c
53. Section____ of IT Act imposes fine up to 2Lakh and imprisonment up to 3 years for failure to
comply with orders.
(a) 67A
(b) 67B
(c) 67C
(d) 68
Ans. d
54. Section______ of IT Act imposes undefined fine amount and imprisonment up to 7 years for
refusal to decrypt data.
(a) 69
(b) 70
(c) 67C
(d) 68
Ans. a
55. Section____ of IT Act imposes fine up to 1Lakh and imprisonment up to 3 years for disclosure
of wrong information.
(a) 69
(b) 70
(c) 67C
(d) 68
Ans. b
56. Fine up to Rs.______ may be imposed under sections 66B (receiving stolen mobile/
computer), 66C (password misuse), 66D (cheating with computer), 67 (publishing obscene
content), 67A (publishing sexual content), 67B (publishing child porn) & 70 (disclosure of wrong
information) of the IT Act, 2000.
(a) 1Lakh
(b) 2Lakh
(c) 5Lakh
(d) none of them
Ans. a
57. Fine up to Rs._______ may be imposed under sections 65 (tampering with computer), 66E
(publishing private images of others) & 68 (failure to comply with orders) of the IT Act, 2000.
(a) 1Lakh
(b) 2Lakh
(c) 5Lakh
(d) none of them
Ans. b
58. Fine up to Rs.____ may be imposed under section 66 (hacking) of the IT Act, 2000.
(a) 1Lakh
(b) 2Lakh
(c) 5Lakh
(d) none of them
Ans. c
59. Imprisonment up to ______ years may be imposed under section 65 (tampering with computer
documents) of the IT Act, 2000.
(a) 2 (b) 3 (c) 5 (d) 7
Ans. a
60. Imprisonment up to _____ years may be imposed under sections 66 (hacking), 66B (receiving
stolen computer/ mobile), 66C (misuse of password), 66D (cheating with computer), 66E
(publishing private images of others), 67C (failure to maintain records by operator), 68 (failure to
comply with orders) & 70 (disclosure of wrong information) of the IT Act, 2000.
(a) 2
(b) 3
(c) 5
(d) 7
Ans. b
61. Imprisonment up to______ years may be imposed under section 67 (publishing obscene
content) of the IT Act, 2000.
(a) 2
(b) 3
(c) 5
(d) 7
Ans. c
62. Imprisonment up to______ years may be imposed under sections 67A (publishing sexual
content) & 69 (refusal to decrypt data) of the IT Act, 2000.
(a) 2
(b) 3
(c) 5
(d) 7
Ans. d
63. Imprisonment up to____ years may be imposed under section 66F (cyber terrorism) of the IT
Act, 2000.
(a) Life
(b) 3
(c) 5
(d) 7
Ans. a
66. ______ servers provides a central storeroom for storing and managing information?
a) Clint
b) Directory
c) Post
d) Group
Ans. b
67. ______ generally refers to a system that can control, monitor and restrict the movement of
people, assets or vehicles, in, out and around a building or site?
a) Access control
b) Security Guard
c) Form Denial
d) None
Ans. a
68. Which chapter of the IT awareness Act talks about electronic governance?
a) 4
b) 3
c) 2
d) 1
Ans. b
70. Which chapter of the IT awareness act talks about penalities and adjudication?
a) 5
b) 7
c) 11
d) 9
Ans. d
73. What type of symmetric key algorithm using a streaming cipher to encrypt information?
a) RC4 b) Blowfish c) SHA d) MD5
Ans. a
74. Which of the following is not a factor in securing the environment against an attack on
security?
a) The education of the attacker b) The system configuration
c) The network architecture d) The business strategy of the company
Ans. d
75. What type of attack uses a fraudulent server with a relay address?
a) NTLM
b) MITM
c) NetBIOS
d) SMB
Ans. b
78. Attempting to gain access to a network using an employee’s credential is called the ______
mode of ethical hacking.
a) Local networking
b) Social engineering
c) Physical entry
d) Remote networking
Ans. a
79. Which federal code applies the consequences of hacking activities that disrupt subway transit
system?
a) Electronic Communications Interception of Oral Communications
b) 18 U.S.C $ 1029
c) Cyber security Enhancement Act 2002
d) 18 U.S.C. $ 1030
Ans. c
84. What type of rootkit will patch, hook, or replace the version of system call in order to hide
information?
a) Library level rootkits
b) Kernel level rootkits
c) System level rootkits
d) Application level rootkits
Ans. a
86. Which of the following will allow footprinting to be conducted without detection?
a) PingSweep b) Traceroute c) War Dialers d) ARIN
Ans. d
87. Performing hacking activities with the intent of gaining visibility for an unfair situation is
called_______.
a) Cracking
b) Analysis
c) Hacktivism
d)Exploitation
Ans. c
93. What is the best statement for taking advantage of a weakness in the security of an IT
system?
a) Threat
b) Attack
c) Exploit
d) Vulnerability
Ans. c
94. Having individuals provide personal information to obtain a free offer provided through the
internet is considered what type of social engineering?
a) Web-based
b) Human-based
c) User-based
d) Computer-based
Ans. d
95. _____framework made cracking of vulnerabilities easy like point and click.
a) .Net
b) Metasploit
c) Zeus
d) Ettercap
Ans. b
96. _____ is a popular tool used for discovering networks as well as in security auditing.
a) Ettercap b) Metasploit c) Nmap d) Burp Suit
Ans. c
97. Which of the below mentioned tool is used for Wi-Fi hacking?
a) Wireshark b) Nessus c) Aircrack-ng d) Snort
Ans. c
101. All of the following are example of real security and privacy threats except:
a) Hackers
b) Virus
c) Spam
d) Worm
Ans. c
105. Which of the following is not an external threat to a compute or a computer network.
a) Ignorance
b) Trojan horses
c) Adware
d) Crackers
Ans. a
106. When a person is harassed repeatedly by being followed, called or be written to he/ she is
target of
a) Bullying b) Stalking c) Identity theft d) Phishing
Ans. B
107. Which of the following is a class of compute threat
a) Phishing
b) Soliciting
c) DoS attacks
d) Stalking
Ans. c
109. It allow a visited website to store its own information about a user on the user’s computer.
a) Spam
b) Cookies
c) Malware
d) Adware
Ans. b
112. Exploring appropriate and ethical behaviours related to online environments and digital
media.
a) Cyber ethics
b) Cyber security
c) Cyber safety
d) Cyber law
Ans. a
114. Which of the following technique is used to verify the integrity of the message?
a) Message digest
b) Digital signature
c) Decryption algorithm
d) Protocol
Ans. a
115. Which of the following principle is violated if computer system is not accessible?
a) Confidentiality
b) Availability
c) Access Control
d) Authentication
Ans. b
121. Unauthorized access and viruses are issues dealing with network______
a) Performance b) Reliability
c) Security d) none of the above
Ans. c
124. A company changes its network configuration so that only one router instead of two can
access the internet. The greatest impact will be on the _____ of the network.
a) a) Performance
b) Reliability
c) Security
d) none of the above
Ans. c
125. A company requires its users to change passwords every month. This improves the _____ of
the network.
a) Performance
b) Reliability
c) Security
d) none of the above
Ans. c
126. A company requires each employee to power off his computer at the end of the day. This rule
was implanted to make the network _______.
a) Perform better
b) more reliable
c) more secure
d) more error-free
Ans. c
128. A firewall is a
a) Wall build to prevent fires from damaging a corporate intranet
b) security device deployed at the boundary of a company to prevent unauthorized physical
access
c) security device deployed at the boundary of a corporate intranet to protect it from unauthorized
access
d) device to prevent all accesses from the internet to the corporate intranet
Ans. c
139. DES
(i) is a symmetric key encryption method
(ii) guarantees absolute security
(iii) is implemented as hardware VLSI chip
(iv) is a public key encryption method
a) i and ii
b) ii and iii
c) i and iii
d) iii and iv
Ans. c
145. The responsibility of a certification authority for digital signature is to authenticate the
a) hash function used
b) private keys of subscribers
c) public keys of subscribers
d) key used in DES
Ans. c
157. In which of the following protocols does a website (if accessed using the protocol) encrypt the
session with a digital certificate?
a) TCP b) SHTTP
c) HTTPS d) XHTTP
Ans. c
158. Which of the following are possible security threats?
a) illegitimate use
b) Backdoors
c) Masquerading
d) All of the given option are correct
Ans. d
161. Which of the following refers to programs that surreptitiously monitor activity on a computer
system and report that information to others without the user’s consent?
a) Malware
b) Botnet
c) Trojan horse
d) Spyware
Ans. d
163. Which of the following is a means to access a computer program or entire computer system
bypassing all security mechanisms?
a) Backdoor b) Masquerading
c) Phishing d) Trojan Horse
Ans. a
167. Which of the following is the collective name for Trojan horses, spyware, and worms?
a) Spyware
b) Botnets
c) Virus
d) Malware
Ans. d
168. When cookies are used as session identifiers, how are they then used as a potential security
hazard?
a) They emulate user’s by downloading all the victims information onto a virtual machine.
b) User’s cookies are altered to a virus like state.
c) The emulate user’s by stealing their personal identity.
d) Attackers emulate users by stealing their cookies.
Ans. d
185. Which of the following enables secure and private data exchange/ transfer on an unsecure
public network?
a) Public key infrastructure
b) Virtual key infrastructure
c) Private key infrastructure
d) All of these
Ans. a
186. Which of the following is a standalone computer program that pretends to be a well-known
program in order to steal confidential data?
a) virus
b) Spyware
c) Fraudtool
d) Malware
Ans. c
189. Which of the following anti-spam measures are taken to reduce spam?
a) Legislative measures
b) Organizational measures
c) Behavioral measures
d) All of these
Ans. d
191. Which of the following techniques are used by spammers to find valid/existent email
addresses?
a) SMTP spoofing
b) SMTP poisioning
c) DNS poisioning
d) Directory Harvest Attack
Ans. d
193. Which of the following types of virus lives in the boot sector ?
a) Sector virus
b) Parasitic virus
c) Boot sector virus
d) Bootable virus
Ans. c
194. Suppose you got a mail from someone saying that you gave won a Rs. 100000/- and asking
you to give him/her Rs. 5000/- to claim your prize. Under Which category does this type of spam
mail file?
a) Phishing and Fraud
b) Spoofing mails
c) Hoaxes
d) Chain mails
Ans. a
195. What is botnet?
a) A software that runs automatically and authonomously.
b) A software used for antispam
c) A software used to manage MTA
d) A software used to manage MDA
Ans. a
197. Which of the following are the ways through which virus spreads?
a) Floppy Disk
b) CD
c) Email Attachment
d) All of the above
Ans. d
200. Suppose you got a mail from the HDFC bank asking you to give your online bank account
details. Under which of the spam mail categories does this mail?
a) Phishing and fraud b) Chain mails
c) Hoaxes d) Brand spoofing
Ans. a
204. Which of the following measures should be taken to tackle spam mails?
a) Blocking and accepting on the basis of MTA IP address
b) Limiting the number of outgoing e-mails per account
c) Authentication mechanisms
d) All of the above
Ans. d
206. What is the function of the Reverse DNS look up Technique in identifying spam mails?
a) To check the sender’s email server attempting for spoofing
b) To check the receiver’s email server attempting for spoofing
c) To check the DNS server validity
d) None of these
Ans. c
213. Which of the following are different types of spam filtering methods?
a) Blacklisting
b) Rule based filtering
c) Signature based filtering
d) All of these
Ans. d
216. Which of the following techniques are used to identify spam mails?
a) Blacklist/ Whitelists
b) Integrity Check
c) Heuristics
d) All of these
Ans. d
217. Which of the following actions can be taken while filtering POP3 spam traffic?
a) Delete the spam mail
b) Redirect it to the spam mail box
c) Return it to the sender
d) Tag the spam mail
Ans. b
220. Which of the following spam filtering techniques has the highest potential for generating false
positives?
a) Community Filtering
b) Bayesian Filtering
c) Challenge-Response Filtering
d) Keyword Filtering
Ans. d
221. Why shouldn’t a user click unsubscribe links from spam messages?
a) clicking the link will prevent
b) unsubscribing makes finding the sender difficult
c) the click may validate the email address
d) None of these
Ans. c
224. What is a good method for a website owner to confirm a user is not using an account for a
spamming purpose?
a) Users must associate a phone to their account and confirm a number sent to them via text
b) Requiring users provide valid personal information during sign up
c) Users that register must click on a confirmation link to the email they specify in their profile
d) All of these
Ans. d
225. A virus is a program that attached itself to (or replace the content of) which of the following
file types?
a) Text files
b) Executables
c) Header files
d) Source files
Ans. b
226. In order for antivirus programs to be most effective, it is necessary to keep which of the
following up to date?
a) Web browsers
b) File hashes
c) Antivirus encryption keys
d) Virus definition files
Ans. d
231. In order to infect a system, clicking an email attachment must cause which of the following
conditions to occur?
a) The attachment is saved to the disk
b) the attachment is decompressed
c) the attachment opens in a preview editor
d) the attachment executes
Ans. d
232. If you cannot delete malware infected file, what is good method to try first?
a) Reformat then attempt to delete the file
b) Run windows Repair
c) Run windows Restore
d) Boot in Windows safe mode and attempt to delete the file
Ans. D
233. Which of these is an example of a possible victim in a phishing attack?
a) The website that was hacked
b) The person who had their identity stolen
c) The bank of the victim
d) All of these
Ans. d
234. Automated spamming tools subscribe to mail lists in order to complete which of the following
tasks?
a) collect email addresses
b) deny services to mail list recipients
c) introduce security holes into the list
d) none of these
Ans. a
235. Which of these techniques would be effective in helping to prevent phishing attacks by
scammers?
a) Use IFRAM’s
b) Allow XSS
c) Scan for and fix XSS issues
d) Use pop-ups
Ans. c
236. A client asks you to fix his computer because it has ransomware on it. He says he sees a
message as soon as he loads windows, and cannot do anything else. What is the best way to fix
this computer without losing any of his data?
a) Reinstall windows
b) Reformat the computer
c) Boot from a USB drive and run a program to remove the malware
d) Use windows restore
Ans. c
241. Virus infection via email attachment can be minimized using which of the following?
a) Opening attachment from external hard drives
b) Copying attachments to special directories before opening them
c) Right clicking attachments
d) Deleting mail containing attachments from unknown senders
Ans. d
242. In order to help prevent spam, a tarpit performs which of the following functions?
a) traps suspected spam messages
b) routes suspected spam to special enclaves in the system
c) acts as a desirable mail server in order to lure spammers
d) delivers suspected spam messages more slowly
Ans. d
244. When a spammer forges the sender’s address and enters and invalid receiver, which of the
following settings will cause the receiving mail server to create backscatter?
a) Reject messages
b) Drop messages
c) Bounce messages
d) none of these
Ans. c
245. In order to help prevent spam, a honeypot performs which of the following functions?
a) acts as a desirable mail server in order to lure spammers
b) delivers suspects spam messages more slowly
c) traps suspected spam messages
d) routes suspected spam to special enclaves in the system
Ans. A
246. What is an example of a captcha?
a) An interactive program which have instructions that read: “Move the triangle into the circle”
b) 1 + 1 = ?
c) What are the characters in this picture?
d) All of these
Ans. d
247. You have been told by several of your friends you have recently sent SPAM emails to them,
what could be the cause of this and what should you do?
a) A spammer may have infiltrated your email provider’s host and compromised your account. You
should notify your email provider.
b) A spammer or bot may have gained access to your email account and sent out SPAM to all of
your contacts. You should change your password immediately.
c) A spammer has gained access to your email. Unfortunately, the only thing you can do to
prevent further SPAM is to close your account and create a new email address.
d) A spammer is spoofing your email address. You should tell your friends to block the email
address.
Ans. b
249. Which of the following spam filtering issues stops valid messages from being delivered?
a) false positives
b) false negatives
Ans. a
250. Which of the following techniques requires posting an email address where only spammers
would find it ?
a) Tarpits
b) Spam Traps
c) Blacklists
d) None of these
Ans. b
251. Antivirus programs hash files on a computer in order to detect which of the following
activities?
a) File size changes
b) File permission changes
c) File content changes
d) All of these
Ans. c
252. Performing outbound spam filtering does which of the following for an organization?
a) helps prevent whitelisting
b) helps prevent blacklisting
c) helps prevent spam trapping
d) all of these
Ans. B
253. What is a Cryptolocker?
a) A module of the windows Bitlocker encryption system
b) A type of encrypted Linux file system
c) A type of ransomware which encrypts user files and demands payment for the decrypted key.
d) A malware class which is known for encrypting itself to avoid detection.
Ans. c
254. Which of the following tools would NOT be useful in figuring out what spyware or viruses
could be installed on a client’s computer?
a) WireShark
b) Malware Bytes
c) Highjack This
d) HitmanPro
Ans. a
255. How can delivering mail as text instead of html help prevent spam?
a) text mail prevents web bugs from altering spammers that the message was opened
b) mail servers won’t accept html messages if they are in text mode
c) text is easier to analyze for spammer information
d) All of these
Ans. a
257. Which of the following reduces spam by rejecting mail from a specific IP addresses?
a) URL Blacklisting
b) DNS Blacklisting
c) IMAP Blacklisting
d) POP3 Blacklisting
Ans. b
263. In a compromised system, which of the following provides the safest way to analyze it?
a) Live CD/DVD
b) Resident Antivirus Program
c) Live USB
d) All of these
Ans. a
266. Which of the following spam filtering techniques statistically analyzes mail?
a) keyword filtering
b) challenge-Response Filtering
c) Community Filtering
d) Bayesian Filtering
Ans. d
267. Firewalls help to prevent which of the following malware from propagating?
a) Encrypted viruses b) Worms
c) Polymorphic viruses d) Trojan viruses
Ans. b
268. On a wordpress site, which is the default service/tool to prevent spammers from posting
comments?
a) Website Inspector
b) Akismet
c) MailWasher Pro
d) SpamAssassin
Ans. b
270. Which of the following is valid difference between a virus and a spyware?
a) Spyware damages data and also steals sensitive private information
b) Virus damaged data, spyware steals sensitive private information
c) Spyware damages data, virus steals sensitive private information
d) Virus damages data and also steals sensitive private information
Ans. b
271. What is called the protection of information and data from unauthorized Access?
A Physical security
B Link security
C Risk management
D Information security
Ans. d
274. Trojan horses are very similar to virus in the programs that replicate copies of themselves
a) True b) False
Ans. b
3. What is called the unauthorized control/acess over the computer system and destroys the
data?
A) Defamation B) Carding
C) Hacking D) Cyber - stalking
6. ______ monitors user activity on internet and transmit that information in the background to
someone else.
a) Malware b) Spyware c) Adware d) None of these
7. It is a program or hardware device that filters the information coming through an internet
connection to a network or computer system.
a) Anti virus b) Cookies c) Firewall d) Cyber Safety
GK EDITORIAL
Telegram https://t.me/gkeditorialOfficial