I&cs MCQ Set-3
I&cs MCQ Set-3
I&cs MCQ Set-3
1. Trojan-Downloader is a special type of trojans which can download & install new versions of malicious
programs.
a) True
b) False
2. ____________ work in background & keeps on downloading other malicious programs when the system
is online.
a) DDoS-Trojan
b) Backdoor Trojan
c) Trojan-Banker
d) Trojan-Downloader
3. A/an ___________ is a program that steals your logins & passwords for instant messaging applications.
a) IM – Trojans
b) Backdoor Trojans
c) Trojan-Downloader
d) Ransom Trojan
4. _____________ can modify data on your system – so that your system doesn’t run correctly or you can
no longer access specific data, or it may even ask for ransom in order to give your access.
a) IM – Trojans
b) Backdoor Trojans
c) Trojan-Downloader
d) Ransom Trojan
5. The ______________ can cost you money, by sending text messages from your mobile phone numbers.
a) IM – Trojans
b) Backdoor Trojans
c) SMS Trojan
d) Ransom Trojan
6. Trojan-Spy programs can keep an eye on how you are using your system.
a) True
b) False
11. The threat of backdoors started when ____________ & ____________ OSs became widely accepted.
a) single-user, Windows
b) multiuser, networked
c) single-user, UNIX
d) multiuser, UNIX
15. A ___________ consists of at least one bot server or controller and one or more client-bots.
a) Virus
b) Trojan
c) Botnet
d) Adware
17. A _____________ is a number of Internet-connected systems, where each of them is running one or
more bots.
a) Trojan
b) Virus
c) Worms
d) Botnet
18. _____________ are implemented to carry out distributed DDoS attacks, steal data, send spam
messages & permits the hacker to access various devices & its connection.
a) Trojan
b) Virus
c) Botnet
d) Worms
20. The owner of botnets can control the botnet using ___________________ software.
a) trojans
b) command and control
c) servers
d) infected servers
22. The word “botnet” is a blend of the words _____________ & ___________
a) robot, network
b) rocket, network
c) bot, network
d) bot, internet
23. Botnets are not the logical connection of which of the following?
a) Smart-phones
b) IoT devices
c) Computer systems
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) Modems
24. Infected computers and other systems within the botnet are called __________
a) killers
b) vampires
c) zombies
d) gargoyles
25. The bot program allows the bot-herders to perform all operations from a ___________ location.
a) local
b) open
c) corporate
d) remote
26. Nowadays, most botnets rely on existing _______________ networks for communication.
a) server-to-server
b) peer-to-peer
c) client-to-server
d) host-to-server
31. _______________deals with the protection of an individual’s information which is implemented while
using the Internet on any computer or personal device.
a) Digital agony
b) Digital privacy
c) Digital secrecy
d) Digital protection
33. Which of the following do not comes under the three pillars of digital privacy?
a) Information privacy
b) Individual privacy
c) Communication privacy
d) Family privacy
34. Which of the following is not an appropriate solution for preserving privacy?
a) Use privacy-focussed SE
b) Use private Browser-window
c) Disable cookies
d) Uninstall Antivirus
35. Which of the following is not an appropriate solution for preserving privacy?
a) Use privacy-focussed SE
b) Close all logical ports
c) Do not use malicious sites and torrent sites
d) Use VPN
37. Which of the following is a private Search-engine and do not track our searching data?
a) Google
b) Search Encrypt
c) Bing
d) Yahoo
40. The Tor browser protects your privacy by bouncing your connection and links around a distributed
network over the globe run by volunteers. It gives three layers of anonymity.
a) True
b) False
41. The __________________ protects your privacy by bouncing your connection and links around a
distributed network over the globe run by volunteers. It gives three layers of anonymity.
a) Cookie removers
b) Private Search Engines
c) Tor browser
d) VPNs
43. ____________ allow its users to attach to the internet via a remote or virtual server which preserves
privacy.
a) Cookie removers
b) VPNs
c) Tor browser
d) Private Search Engines
44. The ____________ transferred between your device & the server is securely encrypted if you are using
VPNs.
a) data
b) virus
c) music files
d) document files
45. The data transferred between your device & the server is securely _____________ if you’re using VPNs.
a) locked
b) sealed
c) packed
d) encrypted
46. A ______________ tries to formulate a web resource occupied or busy its users by flooding the URL of
the victim with unlimited requests than the server can handle.
a) Phishing attack
b) DoS attack
c) Website attack
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) MiTM attack
47. During a DoS attack, the regular traffic on the target _____________ will be either dawdling down or
entirely interrupted.
a) network
b) system
c) website
d) router
48. The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources of
the target website.
a) Phishing attack
b) DoS attack
c) Website attack
d) MiTM attack
50. A DoS attack coming from a large number of IP addresses, making it hard to manually filter or crash the
traffic from such sources is known as a _____________
a) GoS attack
b) PDoS attack
c) DoS attack
d) DDoS attack
52. Instead of implementing single computer & its internet bandwidth, a ____________ utilizes various
systems & their connections for flooding the targeted website.
a) GoS attack
b) PoS attack
c) DDoS attack
d) DoS attack
55. ___________ is a type of DoS threats to overload a server as it sends a large number of requests
requiring resources for handling & processing.
a) Network Layer DoS
b) Physical Layer DoS
c) Transport Layer DoS
d) Application Layer DoS
58. Which of the following do not comes under network layer DoS flooding?
a) UDP flooding
b) HTTP Flooding
c) SYN flooding
d) NTP Amplification
59. Which of the following do not comes under network layer DoS flooding?
a) DNS amplification
b) UDP flooding
c) DNS query flooding
d) NTP Amplification
60. DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per second
(PPS).
a) True
b) False
61. A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network infrastructures.
a) True
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
b) False
62. ______________ is an internet scam done by cyber-criminals where the user is convinced digitally to
provide confidential information.
a) Phishing attack
b) DoS attack
c) Website attack
d) MiTM attack
63. In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and
web pages via emails, IMs, ads and spyware.
a) URL Redirection
b) DoS
c) Phishing
d) MiTM attack
64. Phishers often develop ______________ websites for tricking users & filling their personal data.
a) legitimate
b) illegitimate
c) genuine
d) official
65. Which of the following type of data, phishers cannot steal from its target victims?
a) bank details
b) phone number
c) passwords
d) apps installed in the mobile
67. ______________ was the first type of phishing where the phishers developed an algorithm for
generating random credit card numbers.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
69. _________________ type of phishing became very popular as if it has been sent from a legitimate
source with a legitimate link to its official website.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
73. ___________________ is usually targeted by nature where the emails are exclusively designed to
target any exact user.
a) Algo-based phishing
b) Vishing
c) Domain Phishing
d) Spear phishing
74. ____________ or smishing is one of the simplest types of phishing where the target victims may get a
fake order detail with a cancellation link.
a) Algo-based phishing
b) SMS phishing
c) Domain Phishing
d) Spear phishing
75. ________________ phishing is that type of phishing where the construction of a fake webpage is done
for targeting definite keywords & waiting for the searcher to land on the fake webpage.
a) Voice
b) SMS
c) Search engine
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) Email
80. _____________ are programs or devices that capture the vital information from the target network or
particular network.
a) Routers
b) Trappers
c) Wireless-crackers
d) Sniffers
89. A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all your
data transmitted on its division.
a) True
b) False
90. A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen to
all your data transmitted on its division.
a) Phishing site
b) Sniffer tool
c) Password cracker
d) NIC cracker
92. __________________ are those devices which can be plugged into your network at the hardware level
& it can monitor traffic.
a) Hardware sniffers & analyzers
b) Hardware protocol analyzers
c) Hardware protocol sniffers
d) Hardware traffic sniffers and observers
93. _____________ attack is the exploitation of the web-session & its mechanism that is usually managed
with a session token.
a) Session Hacking
b) Session Hijacking
c) Session Cracking
d) Session Compromising
94. The most commonly used session hijacking attack is the _______________
a) IP hacking
b) IP spooling
c) IP spoofing
d) IP tracking
95. ________________ are required because HTTP uses a lot of diverse TCP connections, so, the web
server needs a means to distinguish every user’s connections.
a) Internet
b) Network
c) Hijacking
d) Sessions
96. Since most _______________________ occur at the very beginning of the TCP session, this allows
hackers to gain access to any system.
a) authentications
b) breaches
c) integrations
d) associations
97. _______________ is done only after the target user has connected to the server.
a) Server hacking
b) Banner grabbing
c) Cracking
98. In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.
a) phishing
b) spoofing
c) hijacking
d) vishing
100. With ___________________ attack, an attacker hijacks a session but do not alter anything. They just
sit back and watch or record all the traffic and data being sent forth.
a) network session hijacking
b) passive session hijacking
c) active session hijacking
d) social-networking session hijacking
101. In an _________________ attack, an attacker finds an active session & takes over that session.
a) network session hijacking
b) passive session hijacking
c) active session hijacking
d) social-networking session hijacking
103. The ______________ hijacking is implemented on the data flow of protocol shared by all web
applications.
a) network level
b) physical level
c) application level
d) data level
104. Which of the following example do not comes under network level session hijacking.
a) TCP/IP Hijacking
b) RST Hijacking
c) Domain Hijacking
d) Blind Hijacking
108. Hjksuite Tool is a collection of programs for hijacking. It contains a library called hjklib which can help
in implementing TCP/IP stack-over hijacking.
a) True
b) False
109. Which of the following is not an appropriate way to compromise web servers?
a) Misconfiguration in OS
b) Using network vulnerabilities
c) Misconfiguration in networks
d) Bugs in OS which allow commands to run on web servers
110. Which of the following is not an appropriate method of defacing web server?
a) Fetching credentials through MiTM
b) Brute-forcing Admin Password
c) IP address spoofing
d) DNS Attack through cache poisoning
111. Which of the following is not an appropriate method of defacing web server?
a) Mail server intrusion
b) Web application bugs
c) Web shares misconfiguration
d) Sessions hijacking
112. _________ is one of the most widely used web server platforms.
a) IIS
b) IAS
c) ISS
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) AIS
114. ____________ is a tiny script that if uploaded to a web server can give hacker complete control of a
remote PC.
a) Spyware
b) ASP Trojan
c) Web ransomware
d) Stuxnet
115. ____________ logs all the visits in log files which is located at <%systemroot%>\logfiles.
a) IIS
b) Microsoft Server
c) Linux
d) IAS
117. ______________ tool clears the log entries in the IIS log files filtered by an IP address.
a) CleanIISLoging
b) CleanLogger
c) CleanIISLog
d) ClearIISLog
119. Which of the following is not an appropriate countermeasure for web server hacking?
a) Patch updates need to be done regularly
b) Not to use default configurations
c) Use IDS and firewalls with signature updates
d) Use low-speed internet
120. Which of the following is not an appropriate countermeasure for web server hacking?
a) Using OS or antivirus without updates
b) Scan web server applications for vulnerabilities
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
c) Using secure protocols
d) Follow strict access control policy
121. _____________ are unwanted software intended to pitch advertisements upon the user’s screen,
most often within a web browser.
a) Shareware
b) Adware
c) Bloatware
d) Ransomware
123. Users might invite some bogus virus in his/her system by clicking the ____________
a) Shareware
b) Spyware
c) URL
d) Adware
124. Which among the following is not an abnormal symptom found once you click any malicious adware?
a) Automatic opening of new tabs in the browser
b) Automatic updates of antivirus
c) Changes in home page
d) Popping up of new Search engines on your browser
125. Once _____________ hijacks your system, it might perform different sorts of unwanted tasks.
a) Server hacking
b) Banner grabbing
c) Cracking
d) Adware
126. Creators of _____________ also sell your browsing behaviour & information to 3 rd parties.
a) Shareware
b) Spyware
c) URL
d) Adware
127. Modern ____________ can even use it to target users with additional advertisements that are
customized to the browsing habits.
a) smart shareware
b) smart adware
c) smart bloatware
128. Creators of adware also sell your browsing behaviour & information to 3rd parties.
a) True
b) False
129. Which among the following is not a symptom of your system compromised with adware?
a) Website links redirect to sites unlike from what user is intended
b) Web browser acts slows to a crawl
c) System takes restarts frequently
d) The browser might crash frequently
130. Malicious adware may sneak into your system by __________ different ways.
a) five
b) four
c) three
d) two
131. Which of the following term is not a valid terminology and type of adware?
a) Mobile adware
b) Mac Adware
c) Smart-home adware
d) Windows adware
132. Adware will not come to your system if you are using Chrome.
a) True
b) False
133. ________________ are unnecessary software which infiltrates user’s system, spy on user’s activities,
stealing internet usage data & sensitive information of that user.
a) Shareware
b) Spyware
c) Ransomware
d) Freeware
134. They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who
are ‘they’ referring to here?
a) Shareware
b) Ransomware
c) Spyware
d) Freeware
135. Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
a) advertisers
b) dark-market
c) antivirus company
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) share market
138. Spyware is not a powerful & one of the most widespread threats on the internet.
a) True
b) False
139. It actually infects your device easily & makes it hard to _____________
a) delete
b) identify
c) modify
d) copy
141. _____________ track the user’s online activities like search queries, history pages & downloads, for
selling purposes.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
142. _____________ tracks your data and displays those products as ads for promotions.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
143. _________________ disguises them as legitimate software & appear as Java or Flash Player updates.
They will periodically collect your system data and send it to its creator.
a) Ad-based spyware
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
b) System Monitors
c) Spy-trojans
d) Tracking cookies
144. ____________ records all your key-strokes, chat-room dialogs, program run in your system, and
system details.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
145. Which of the following do not lead you to invite spyware into your system?
a) Accepting fishy prompt or pop-ups
b) Downloading apps from an unreliable source
c) Opening unknown attachments
d) Installing antivirus patches
146. As you sense your device has been infected with spyware, you should run a scan with your existing
security software/AV for making sure it has cleaned up all malicious contents.
a) True
b) False
148. If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to
remove it and proactively change your ________ and delete browsing activities from web browser.
a) passwords
b) email ID
c) name
d) address
149. ______________ is populating the inbox of any target victim with unsolicited or junk emails.
a) Phishing
b) Spamming
c) Hooking
d) DoS
152. ___________ are used which crawl web pages looking for email Ids and copies them to the database.
a) Caches
b) Cookies
c) Bots
d) Spiders
153. Which of the following is not a proper way of how spammers get the email Ids?
a) When a user registers to online services, blogs, and sites
b) Databases formed by spiders fetching email Ids from different sources
c) From offline form fill-up documents
d) Online ad-tracking tools
161. ___________ is a tool used as spam filter in association with email programs and automatically
intercepts spam emails.
a) Nessus
b) SpamExpert Desktop
c) Spam-Rescurer
d) Burp-Suite