I&cs MCQ Set-3

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

MCQ SET - 3

1. Trojan-Downloader is a special type of trojans which can download & install new versions of malicious
programs.
a) True
b) False

2. ____________ work in background & keeps on downloading other malicious programs when the system
is online.
a) DDoS-Trojan
b) Backdoor Trojan
c) Trojan-Banker
d) Trojan-Downloader

3. A/an ___________ is a program that steals your logins & passwords for instant messaging applications.
a) IM – Trojans
b) Backdoor Trojans
c) Trojan-Downloader
d) Ransom Trojan

4. _____________ can modify data on your system – so that your system doesn’t run correctly or you can
no longer access specific data, or it may even ask for ransom in order to give your access.
a) IM – Trojans
b) Backdoor Trojans
c) Trojan-Downloader
d) Ransom Trojan

5. The ______________ can cost you money, by sending text messages from your mobile phone numbers.
a) IM – Trojans
b) Backdoor Trojans
c) SMS Trojan
d) Ransom Trojan

6. Trojan-Spy programs can keep an eye on how you are using your system.
a) True
b) False

7. A ___________ is a method in which a computer security mechanism is bypassed untraceable for


accessing the computer or its information.
a) front-door
b) backdoor
c) clickjacking
d) key-logging

8. A _________________ may be a hidden part of a program, a separate infected program a Trojan in


disguise of an executable or code in the firmware of any system’s hardware.
a) crypter
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
b) virus
c) backdoor
d) key-logger

9. Backdoors cannot be designed as ______________


a) the hidden part of a program
b) as a part of Trojans
c) embedded code of the firmware
d) embedded with anti-malware

10. Trojans having backdoors are harmless.


a) True
b) False

11. The threat of backdoors started when ____________ & ____________ OSs became widely accepted.
a) single-user, Windows
b) multiuser, networked
c) single-user, UNIX
d) multiuser, UNIX

12. Backdoors are also known as ______________


a) Malware-doors
b) Trojan-backups
c) Front-doors
d) Trapdoors

13. __________ is a powerful RAT build using the language Delphi 7.


a) Stuxnet
b) T-Bomb
c) Beast
d) Zeus

14. Which of the following is a remote Trojan?


a) Troya
b) DaCryptic
c) BankerA
d) Game-Troj

15. A ___________ consists of at least one bot server or controller and one or more client-bots.
a) Virus
b) Trojan
c) Botnet
d) Adware

16. Botnets are managed by ______________


a) Bot-holders
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
b) Bot-herders
c) Bot-trainers
d) Bot-creators

17. A _____________ is a number of Internet-connected systems, where each of them is running one or
more bots.
a) Trojan
b) Virus
c) Worms
d) Botnet

18. _____________ are implemented to carry out distributed DDoS attacks, steal data, send spam
messages & permits the hacker to access various devices & its connection.
a) Trojan
b) Virus
c) Botnet
d) Worms

19. Botnets are not used for ______________


a) Perform DDoS
b) Steal bulk amount of sensitive data
c) Spamming
d) Encrypting for ransom

20. The owner of botnets can control the botnet using ___________________ software.
a) trojans
b) command and control
c) servers
d) infected servers

21. The full form of C&C is ____________


a) command and control
b) copy and cut
c) command and capture
d) copy and control

22. The word “botnet” is a blend of the words _____________ & ___________
a) robot, network
b) rocket, network
c) bot, network
d) bot, internet

23. Botnets are not the logical connection of which of the following?
a) Smart-phones
b) IoT devices
c) Computer systems
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) Modems

24. Infected computers and other systems within the botnet are called __________
a) killers
b) vampires
c) zombies
d) gargoyles

25. The bot program allows the bot-herders to perform all operations from a ___________ location.
a) local
b) open
c) corporate
d) remote

26. Nowadays, most botnets rely on existing _______________ networks for communication.
a) server-to-server
b) peer-to-peer
c) client-to-server
d) host-to-server

27. Which of the following is not an example of a botnet program?


a) Zeus
b) GameOver
c) ZeroAccess
d) MyDoom

28. Which of the following is an example of Botnet?


a) Zeus
b) ILOVEYOU
c) Storm Worm
d) MyDoom

29. Which of the following is an example of a Botnet program?


a) Slammer
b) GameOver
c) Stuxnet
d) Anna Kournikova

31. _______________deals with the protection of an individual’s information which is implemented while
using the Internet on any computer or personal device.
a) Digital agony
b) Digital privacy
c) Digital secrecy
d) Digital protection

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
32. _______________ is a combined term which encompasses 3 sub-pillars; information privacy, individual
privacy, and communication privacy.
a) Digital Integrity
b) Digital privacy
c) Digital secrecy
d) Digital protection

33. Which of the following do not comes under the three pillars of digital privacy?
a) Information privacy
b) Individual privacy
c) Communication privacy
d) Family privacy

34. Which of the following is not an appropriate solution for preserving privacy?
a) Use privacy-focussed SE
b) Use private Browser-window
c) Disable cookies
d) Uninstall Antivirus

35. Which of the following is not an appropriate solution for preserving privacy?
a) Use privacy-focussed SE
b) Close all logical ports
c) Do not use malicious sites and torrent sites
d) Use VPN

36. Which of the following is not a private Search-engine?


a) Yahoo
b) DuckDuckGo
c) StartPage
d) Wolfram Alpha

37. Which of the following is a private Search-engine and do not track our searching data?
a) Google
b) Search Encrypt
c) Bing
d) Yahoo

38. It is necessary to use ________________ for maintaining searched data privacy.


a) Private email services
b) Private search engines
c) Tor Browser
d) Private Browser window

39. Which of the following browser is used for Privacy purpose?


a) Chrome
b) Firefox
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
c) Opera
d) Tor

40. The Tor browser protects your privacy by bouncing your connection and links around a distributed
network over the globe run by volunteers. It gives three layers of anonymity.
a) True
b) False

41. The __________________ protects your privacy by bouncing your connection and links around a
distributed network over the globe run by volunteers. It gives three layers of anonymity.
a) Cookie removers
b) Private Search Engines
c) Tor browser
d) VPNs

42. Which of the following is not an example of privacy-browser?


a) Tor
b) Brave
c) Epic
d) Opera

43. ____________ allow its users to attach to the internet via a remote or virtual server which preserves
privacy.
a) Cookie removers
b) VPNs
c) Tor browser
d) Private Search Engines

44. The ____________ transferred between your device & the server is securely encrypted if you are using
VPNs.
a) data
b) virus
c) music files
d) document files

45. The data transferred between your device & the server is securely _____________ if you’re using VPNs.
a) locked
b) sealed
c) packed
d) encrypted

46. A ______________ tries to formulate a web resource occupied or busy its users by flooding the URL of
the victim with unlimited requests than the server can handle.
a) Phishing attack
b) DoS attack
c) Website attack
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) MiTM attack

47. During a DoS attack, the regular traffic on the target _____________ will be either dawdling down or
entirely interrupted.
a) network
b) system
c) website
d) router

48. The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources of
the target website.
a) Phishing attack
b) DoS attack
c) Website attack
d) MiTM attack

49. DoS is abbreviated as _____________________


a) Denial of Service
b) Distribution of Server
c) Distribution of Service
d) Denial of Server

50. A DoS attack coming from a large number of IP addresses, making it hard to manually filter or crash the
traffic from such sources is known as a _____________
a) GoS attack
b) PDoS attack
c) DoS attack
d) DDoS attack

51. DDoS stands for _________________


a) Direct Distribution of Server
b) Distributed Denial of Service
c) Direct Distribution of Service
d) Distributed Denial of Server

52. Instead of implementing single computer & its internet bandwidth, a ____________ utilizes various
systems & their connections for flooding the targeted website.
a) GoS attack
b) PoS attack
c) DDoS attack
d) DoS attack

53. There are ______ types of DoS attack.


a) 2
b) 3
c) 4
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) 5

54. Application layer DoS attack is also known as _______________


a) Layer4 DoS attack
b) Layer5 DoS attack
c) Layer6 DoS attack
d) Layer7 DoS attack

55. ___________ is a type of DoS threats to overload a server as it sends a large number of requests
requiring resources for handling & processing.
a) Network Layer DoS
b) Physical Layer DoS
c) Transport Layer DoS
d) Application Layer DoS

56. Which of the following is not a type of application layer DoS?


a) HTTP flooding
b) Slowloris
c) TCP flooding
d) DNS query flooding

57. Network layer attack is also known as ________________


a) Layer3-4 DoS attack
b) Layer5 DoS attack
c) Layer6-7 DoS attack
d) Layer2 DoS attack

58. Which of the following do not comes under network layer DoS flooding?
a) UDP flooding
b) HTTP Flooding
c) SYN flooding
d) NTP Amplification

59. Which of the following do not comes under network layer DoS flooding?
a) DNS amplification
b) UDP flooding
c) DNS query flooding
d) NTP Amplification

60. DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per second
(PPS).
a) True
b) False

61. A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network infrastructures.
a) True
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
b) False

62. ______________ is an internet scam done by cyber-criminals where the user is convinced digitally to
provide confidential information.
a) Phishing attack
b) DoS attack
c) Website attack
d) MiTM attack

63. In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and
web pages via emails, IMs, ads and spyware.
a) URL Redirection
b) DoS
c) Phishing
d) MiTM attack

64. Phishers often develop ______________ websites for tricking users & filling their personal data.
a) legitimate
b) illegitimate
c) genuine
d) official

65. Which of the following type of data, phishers cannot steal from its target victims?
a) bank details
b) phone number
c) passwords
d) apps installed in the mobile

66. Algorithm-Based Phishing was developed in the year __________


a) 1988
b) 1989
c) 1990
d) 1991

67. ______________ was the first type of phishing where the phishers developed an algorithm for
generating random credit card numbers.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing

68. Email Phishing came into origin in the year __________


a) 1990
b) 2000
c) 2005

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
d) 2015

69. _________________ type of phishing became very popular as if it has been sent from a legitimate
source with a legitimate link to its official website.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing

70. _____________ refers to phishing performed over smart-phone by calling.


a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing

71. _____________ = voice + phishing.


a) Algo-based phishing
b) Vishing
c) Domain Phishing
d) Email-based phishing

72. Victims of phishing are mostly ___________________


a) Tech enthusiast
b) Professional computer engineers
c) Lack of computer knowledge
d) Lack of management skill

73. ___________________ is usually targeted by nature where the emails are exclusively designed to
target any exact user.
a) Algo-based phishing
b) Vishing
c) Domain Phishing
d) Spear phishing

74. ____________ or smishing is one of the simplest types of phishing where the target victims may get a
fake order detail with a cancellation link.
a) Algo-based phishing
b) SMS phishing
c) Domain Phishing
d) Spear phishing

75. ________________ phishing is that type of phishing where the construction of a fake webpage is done
for targeting definite keywords & waiting for the searcher to land on the fake webpage.
a) Voice
b) SMS
c) Search engine
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) Email

76. Which of the following is not an example or type of phishing?


a) Spear phishing
b) Deceptive phishing
c) Whaling
d) Monkey in the Middle

77. Which of the following is not an example or type of phishing?


a) Tracking
b) Vishing
c) Smishing
d) Pharming

78. _____________ is data interception method used by hackers.


a) Phishing
b) DoS
c) Sniffing
d) MiTM

79. Sniffing is also known as ___________________


a) network-tapping
b) wiretapping
c) net-tapping
d) wireless-tapping

80. _____________ are programs or devices that capture the vital information from the target network or
particular network.
a) Routers
b) Trappers
c) Wireless-crackers
d) Sniffers

81. Which of them is not an objective of sniffing for hackers?


a) Fetching passwords
b) Email texts
c) Types of files transferred
d) Geographic location of a user

82. Which of the following tech-concepts cannot be sniffed?


a) Router configuration
b) ISP details
c) Email Traffic
d) Web Traffic

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
83. Which of the following tech-concepts cannot be sniffed?
a) Cloud sessions
b) FTP passwords
c) Telnet passwords
d) Chat sessions

84. Which of the below-mentioned protocol is not susceptible to sniffing?


a) HTTP
b) SMTP
c) POP
d) TCP

85. Which of the below-mentioned protocol is not susceptible to sniffing?


a) NNTP
b) UDP
c) FTP
d) IMAP

86. There are __________ types of sniffing.


a) 2
b) 3
c) 4
d) 5

87. Active sniffing is difficult to detect.


a) True
b) False

88. Which of the following is not a sniffing tool?


a) Wireshark
b) Dude Sniffer
c) Maltego
d) Look@LAN

89. A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all your
data transmitted on its division.
a) True
b) False

90. A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen to
all your data transmitted on its division.
a) Phishing site
b) Sniffer tool
c) Password cracker
d) NIC cracker

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
91. In _____________ sniffing, the network traffic is not only supervised & locked but also be can be
altered in different ways to accomplish the attack.
a) passive
b) signal
c) network
d) active

92. __________________ are those devices which can be plugged into your network at the hardware level
& it can monitor traffic.
a) Hardware sniffers & analyzers
b) Hardware protocol analyzers
c) Hardware protocol sniffers
d) Hardware traffic sniffers and observers

93. _____________ attack is the exploitation of the web-session & its mechanism that is usually managed
with a session token.
a) Session Hacking
b) Session Hijacking
c) Session Cracking
d) Session Compromising

94. The most commonly used session hijacking attack is the _______________
a) IP hacking
b) IP spooling
c) IP spoofing
d) IP tracking

95. ________________ are required because HTTP uses a lot of diverse TCP connections, so, the web
server needs a means to distinguish every user’s connections.
a) Internet
b) Network
c) Hijacking
d) Sessions

96. Since most _______________________ occur at the very beginning of the TCP session, this allows
hackers to gain access to any system.
a) authentications
b) breaches
c) integrations
d) associations

97. _______________ is done only after the target user has connected to the server.
a) Server hacking
b) Banner grabbing
c) Cracking

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
d) Hijacking

98. In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.
a) phishing
b) spoofing
c) hijacking
d) vishing

99. There are ___________ types of session hijacking.


a) 2
b) 3
c) 4
d) 5

100. With ___________________ attack, an attacker hijacks a session but do not alter anything. They just
sit back and watch or record all the traffic and data being sent forth.
a) network session hijacking
b) passive session hijacking
c) active session hijacking
d) social-networking session hijacking

101. In an _________________ attack, an attacker finds an active session & takes over that session.
a) network session hijacking
b) passive session hijacking
c) active session hijacking
d) social-networking session hijacking

102. Session hijacking takes place at ____________ number of levels.


a) five
b) four
c) three
d) two

103. The ______________ hijacking is implemented on the data flow of protocol shared by all web
applications.
a) network level
b) physical level
c) application level
d) data level

104. Which of the following example do not comes under network level session hijacking.
a) TCP/IP Hijacking
b) RST Hijacking
c) Domain Hijacking
d) Blind Hijacking

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
105. In ___________________ session hijacking, hackers gain session ID for taking control of existing
session or even create a new unauthorized session.
a) network level
b) physical level
c) application level
d) data level

106. Which of them is not a session hijacking tool?


a) Juggernaut
b) IP watcher
c) Wireshark
d) Paros HTTP Hijacker

107. Which of the following is a session hijacking tool?


a) T-Sight
b) Wireshark
c) Maltego
d) Nessus

108. Hjksuite Tool is a collection of programs for hijacking. It contains a library called hjklib which can help
in implementing TCP/IP stack-over hijacking.
a) True
b) False

109. Which of the following is not an appropriate way to compromise web servers?
a) Misconfiguration in OS
b) Using network vulnerabilities
c) Misconfiguration in networks
d) Bugs in OS which allow commands to run on web servers

110. Which of the following is not an appropriate method of defacing web server?
a) Fetching credentials through MiTM
b) Brute-forcing Admin Password
c) IP address spoofing
d) DNS Attack through cache poisoning

111. Which of the following is not an appropriate method of defacing web server?
a) Mail server intrusion
b) Web application bugs
c) Web shares misconfiguration
d) Sessions hijacking

112. _________ is one of the most widely used web server platforms.
a) IIS
b) IAS
c) ISS
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) AIS

113. IIS stands for __________________


a) Interconnected Information Server
b) Interconnected Information Services
c) Internet Information Server
d) Internet Information Services

114. ____________ is a tiny script that if uploaded to a web server can give hacker complete control of a
remote PC.
a) Spyware
b) ASP Trojan
c) Web ransomware
d) Stuxnet

115. ____________ logs all the visits in log files which is located at <%systemroot%>\logfiles.
a) IIS
b) Microsoft Server
c) Linux
d) IAS

116. Which of the following is not a web server attack type?


a) DOS attack
b) Website Defacement using SQLi
c) Directory Traversal
d) Password guessing

117. ______________ tool clears the log entries in the IIS log files filtered by an IP address.
a) CleanIISLoging
b) CleanLogger
c) CleanIISLog
d) ClearIISLog

118. CleanIISLog is not a hacking tool.


a) True
b) False

119. Which of the following is not an appropriate countermeasure for web server hacking?
a) Patch updates need to be done regularly
b) Not to use default configurations
c) Use IDS and firewalls with signature updates
d) Use low-speed internet

120. Which of the following is not an appropriate countermeasure for web server hacking?
a) Using OS or antivirus without updates
b) Scan web server applications for vulnerabilities
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
c) Using secure protocols
d) Follow strict access control policy

121. _____________ are unwanted software intended to pitch advertisements upon the user’s screen,
most often within a web browser.
a) Shareware
b) Adware
c) Bloatware
d) Ransomware

122. PUP is abbreviated as ____________


a) Potentially Useless Programs
b) Potentially Unwanted Protocols
c) Potentially Unwanted Programs
d) Partial Unwanted Programs

123. Users might invite some bogus virus in his/her system by clicking the ____________
a) Shareware
b) Spyware
c) URL
d) Adware

124. Which among the following is not an abnormal symptom found once you click any malicious adware?
a) Automatic opening of new tabs in the browser
b) Automatic updates of antivirus
c) Changes in home page
d) Popping up of new Search engines on your browser

125. Once _____________ hijacks your system, it might perform different sorts of unwanted tasks.
a) Server hacking
b) Banner grabbing
c) Cracking
d) Adware

126. Creators of _____________ also sell your browsing behaviour & information to 3 rd parties.
a) Shareware
b) Spyware
c) URL
d) Adware

127. Modern ____________ can even use it to target users with additional advertisements that are
customized to the browsing habits.
a) smart shareware
b) smart adware
c) smart bloatware

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
d) smart spyware

128. Creators of adware also sell your browsing behaviour & information to 3rd parties.
a) True
b) False

129. Which among the following is not a symptom of your system compromised with adware?
a) Website links redirect to sites unlike from what user is intended
b) Web browser acts slows to a crawl
c) System takes restarts frequently
d) The browser might crash frequently

130. Malicious adware may sneak into your system by __________ different ways.
a) five
b) four
c) three
d) two

131. Which of the following term is not a valid terminology and type of adware?
a) Mobile adware
b) Mac Adware
c) Smart-home adware
d) Windows adware

132. Adware will not come to your system if you are using Chrome.
a) True
b) False

133. ________________ are unnecessary software which infiltrates user’s system, spy on user’s activities,
stealing internet usage data & sensitive information of that user.
a) Shareware
b) Spyware
c) Ransomware
d) Freeware

134. They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who
are ‘they’ referring to here?
a) Shareware
b) Ransomware
c) Spyware
d) Freeware

135. Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
a) advertisers
b) dark-market
c) antivirus company
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) share market

136. Which of the following activity is not done by spyware?


a) sell internet usage data
b) capture credit card details
c) user’s personal identity
d) steal signature of the different virus

137. Which of the following activity is not done by spyware?


a) Monitors your internet activity
b) Track user’s login details and passwords
c) Uninstalls your mobile browser
d) Spy on sensitive information

138. Spyware is not a powerful & one of the most widespread threats on the internet.
a) True
b) False

139. It actually infects your device easily & makes it hard to _____________
a) delete
b) identify
c) modify
d) copy

140. There are __________ main types of spyware.


a) 2
b) 3
c) 4
d) 5

141. _____________ track the user’s online activities like search queries, history pages & downloads, for
selling purposes.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies

142. _____________ tracks your data and displays those products as ads for promotions.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies

143. _________________ disguises them as legitimate software & appear as Java or Flash Player updates.
They will periodically collect your system data and send it to its creator.
a) Ad-based spyware
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
b) System Monitors
c) Spy-trojans
d) Tracking cookies

144. ____________ records all your key-strokes, chat-room dialogs, program run in your system, and
system details.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies

145. Which of the following do not lead you to invite spyware into your system?
a) Accepting fishy prompt or pop-ups
b) Downloading apps from an unreliable source
c) Opening unknown attachments
d) Installing antivirus patches

146. As you sense your device has been infected with spyware, you should run a scan with your existing
security software/AV for making sure it has cleaned up all malicious contents.
a) True
b) False

147. Which of the following is not an anti-spyware tool?


a) MalwareBytes Anti-Malware tool
b) SpyBot Search and Destroy
c) Emsisoft Emergency Kit
d) MS Firewall Defender

148. If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to
remove it and proactively change your ________ and delete browsing activities from web browser.
a) passwords
b) email ID
c) name
d) address

149. ______________ is populating the inbox of any target victim with unsolicited or junk emails.
a) Phishing
b) Spamming
c) Hooking
d) DoS

150. _________________ technique is also used in product advertisement.


a) Phishing
b) Cookies
c) e-Banners

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
d) Spamming

151. Which of the following is not a technique used by spanners?


a) Spoofing the domain
b) Sending attached virus in spams
c) Junk tags associated with spam-emails
d) Making important deals through such emails

152. ___________ are used which crawl web pages looking for email Ids and copies them to the database.
a) Caches
b) Cookies
c) Bots
d) Spiders

153. Which of the following is not a proper way of how spammers get the email Ids?
a) When a user registers to online services, blogs, and sites
b) Databases formed by spiders fetching email Ids from different sources
c) From offline form fill-up documents
d) Online ad-tracking tools

154. There are ___________ major ways of spamming.


a) 4
b) 2
c) 3
d) 5

155. There are _______ types of spamming.


a) 3
b) 4
c) 5
d) 6

156. Which of the following is not a type of spamming attack?


a) Page-jacking
b) Image spamming
c) Spear phishing
d) Blog & wiki spamming

157. Which of the following is not a bulk emailing tool?


a) Fairlogic Worldcast
b) 123 Hidden sender
c) YL Mail Man
d) NetCut

158. Which of the following is not a bulk emailing tool?


a) Wireshark
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
b) Sendblaster
c) Direct Sender
d) Hotmailer

159. Which of the following is not an anti-spam technique?


a) Signature-based content filtering
b) DNS routing
c) Bayesian Content Filtering
d) Collaborative content filtering

160. Which of the following is not an anti-spam technique?


a) Reputation control
b) Sender policy framework
c) DNS-based block-list
d) Domain-based blocking

161. ___________ is a tool used as spam filter in association with email programs and automatically
intercepts spam emails.
a) Nessus
b) SpamExpert Desktop
c) Spam-Rescurer
d) Burp-Suite

162. Which of the following is not an anti-spamming tool or system?


a) Spam-Eater Pro
b) SpyTech Spam Agent
c) SpamExperts Desktop
d) Anti-spyware Tech

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577

You might also like