Cyber Security
Cyber Security
a. Phishing
b. Bulling
c. Stalking
d. Identity theft
ADVERTISEMENT
Answer: c
a. Dos Attack
b. Phishing
c. Soliciting
d. Both A and C
Answer: a
ADVERTISEMENT
a. Virus
b. Malware
c. Spam
4) Which of the following usually observe each activity on the internet of the
victim, gather all information in the background, and send it to someone else?
ADVERTISEMENT
a. Malware
b. Spyware
c. Adware
Answer: b
ADVERTISEMENT
a. Malware
b. Adware
c. Antivirus
d. Both B and C
Answer: c
ADVERTISEMENT
a. Quick heal
b. Mcafee
c. Kaspersky
d. All of the above
7) It can be a software program or a hardware device that filters all data packets
coming through the internet, a network, etc. it is known as the_______:
ADVERTISEMENT
a. Antivirus
b. Firewall
c. Cookies
d. Malware
Answer: b
ADVERTISEMENT
a. Piracy
b. Plagiarism
Answer: d
Explanation: The stealing ideas or the invention of others and using them for
their own profits can also be defined in several different ways, such as piracy,
intellectual property rights, and plagiarism.
9) Read the following statement carefully and find out whether it is correct about
the hacking or not?
ADVERTISEMENT
10) Which of the following refers to exploring the appropriate, ethical behaviors
related to the online environment and digital media platform?
ADVERTISEMENT
a. Cyber low
b. Cyberethics
c. Cybersecurity
d. Cybersafety
Answer: b
ADVERTISEMENT
a. Access control
b. Confidentiality
c. Availability
Answer: c
12) Which one of the following refers to the technique used for verifying the
integrity of the message?
ADVERTISEMENT
a. Digital signature
b. Decryption algorithm
c. Protocol
d. Message Digest
13) Which one of the following usually used in the process of Wi-Fi-hacking?
ADVERTISEMENT
a. Aircrack-ng
b. Wireshark
c. Norton
Answer: a
b. Angry IP Scanner
c. Snort
d. Ettercap
ADVERTISEMENT
Answer: b
15) In ethical hacking and cyber security, there are _______ types of scanning:
a. 1
b. 2
c. 3
d. 4
Answer: c
Explanation: There are usually three types of scanning in ethical hacking and
cyber security. Therefore the correct answer is C.
ADVERTISEMENT
b. Cloud scan
c. Null Scan
d. SYN Stealth
Answer: b
Explanation: Among the following-given options, the Cloud Scan is one, and
only that is not a type of scanning.
17) In system hacking, which of the following is the most crucial activity?
a. Information gathering
b. Covering tracks
c. Cracking passwords
Answer: a
Explanation: The vulnerability, port, and network scanning are three types of
scanning.
19) Which one of the following is actually considered as the first computer virus?
a. Sasser
b. Blaster
c. Creeper
d. Both A and C
Answer: c
Explanation: The Creeper is called the first computer virus as it replicates itself
(or clones itself) and spread from one system to another. It is created by Bob
Thomas at BBN in early 1971 as an experimental computer program.
20) To protect the computer system against the hacker and different kind of
viruses, one must always keep _________ on in the computer system.
a. Antivirus
b. Firewall
c. Vlc player
d. Script
Answer: b
a. An Antivirus Program
c. A computer virus
Answer: c
Explanation: Cod Red is a type of Computer virus that was first discovered on
15 July in 2001 as it attacks the servers of Microsoft. In a couple of next days,
it infects almost 300,000 servers.
22) Which of the following can be considered as the elements of cyber security?
a. Application Security
b. Operational Security
c. Network Security
Answer: d
Explanation: Application security, operational security, network security all are
the main and unforgettable elements of Cyber Security. Therefore the correct
answer is D.
23) Which of the following are famous and common cyber-attacks used by
hackers to infiltrate the user's system?
Answer: d
a. Maliciousware
b. Badware
c. Ilegalware
d. Malware
Answer: d
25) Hackers usually used the computer virus for ______ purpose.
Answer: d
a. WPA
b. WPA2
c. WPS
d. Both A and C
Answer: b
Explanation: Nowadays, in Wi-Fi Security, the WPA2 is one of the most widely
used protocols because it offers a more secure connection rather than the
WPA. It is also known as the upgraded version of the WPA protocol.
Answer: b
Explanation: The term "TCP/IP" stood for Transmission Control Protocol/
internet protocol and was developed by the US government in the early days
of the internet.
28) The response time and transit time is used to measure the ____________
of a network.
a. Security
b. Longevity
c. Reliability
d. Performance
Answer: d
Explanation: On the basis of response time and transit time, the performance
of a network is measured.
29) Which of the following factor of the network gets hugely impacted when the
number of users exceeds the network's limit?
a. Reliability
b. Performance
c. Security
d. Longevity
Answer: d
30) In the computer networks, the encryption techniques are primarily used for
improving the ________
a. Security
b. Performance
c. Reliability
d. Longevity
Answer: a
Answer: b
a. 1970
b. 1971
c. 1972
d. 1969
Hide Answer Workspace
Answer: b
Explanation: In 1970, the world's first computer virus was created by Robert
(Bob) Thomas. This virus was designed as it creates copies of itself or clones
itself and spreads one computer to another. So the correct answer will be
1970.
33) Which of the following is considered as the world's first antivirus program?
a. Creeper
b. Reaper
c. Tinkered
d. Ray Tomlinson
Answer: b
a. Open-Design
c. Least privilege
d. Fail-safe Defaults
Answer: b
35) Which of the following principle of cyber security restricts how privileges are
initiated whenever any object or subject is created?
a. Least privilege
b. Open-Design
c. Fail-safe Defaults
Answer: c
Explanation: The fail-safe Defaults principle of cyber security restricts how
privileges are initiated whenever a subject or object is created. In cases
where the privileges, rights, access or some other security-related attribute
is not granted explicitly, it should also not granted access to the object.
36) Suppose an employee demands the root access to a UNIX system, where
you are the administrator; that right or access should not be given to the
employee unless that employee has work that requires certain rights, privileges.
It can be considered as a perfect example of which principle of cyber security?
a. Least privileges
b. Open Design
c. Separation of Privileges
d. Both A & C
Answer: a
Explanation: The example given in the above question refers to the least
privileges principle of cyber security. The least privileges principle of cyber
security states that no rights, access to the system should be given to any of
the employees of the organization unless he/she needs those particular
rights, access in order to complete the given task. In short, we can say that
its primary work is to restrict or control the assignment of rights to the
employees.
37) Which of the following can also consider as the instances of Open Design?
a. CSS
b. DVD Player
c. Only A
d. Both A and B
Answer: d
38) Which one of the following principles states that sometimes it is become
more desirable to rescored the details of intrusion that to adopt more efficient
measure to avoid it?
b. Compromise recording
c. Psychological acceptability
d. Work factor
Explanation: The principle called compromise factor states that in some cases,
it is more beneficial to records or document the details of the intrusion that
to adopt more efficient measures to avoid it.
39) The web application like banking websites should ask its users to log-in again
after some specific period of time, let say 30 min. It can be considered as an
example of which cybersecurity principle?
a. Compromise recording
b. Psychological acceptability
c. Complete mediation
Answer: c
a. One has to deploy hardware, software, and security procedures to lock those
apps down.
b. One should know about what the normal behavior of a network look likes so
that he/she can spot any changes, breaches in the behavior of the network.
c. Phishing is one of the most commonly used methods that are used by hackers
to gain access to the network
Answer: c
41) Which of the following statements is true about the VPN in Network security?
c. It typically creates a secure, encrypted virtual "tunnel" over the open internet
d. All of the above
Answer: d
Explanation: The term VPN stands for Virtual Private Network. It is a type of
network security-enhancing tool that can be either a software program or a
hardware device. It usually authenticates the communication between a
device and a network by creating a secure encrypted virtual "tunnel". In
general, the software VPNs are considered as the most cost-effective, user
friendly over the hardware VPNs.
42) Which of the following type of text is transformed with the help of a cipher
algorithm?
a. Transformed text
b. Complex text
c. Scalar text
d. Plain text
Answer: d
Answer: c
44) Which type of the following malware does not replicate or clone them self's
through infection?
a. Rootkits
b. Trojans
c. Worms
d. Viruses
Answer: b
Explanation: The Trojans type of malware does not generate copies of them
self's or clone them. The main reason why these types of viruses are referred
to as the Trojans is the mythological story of the Greeks. In which some top-
level accessions were hidden in the big wooden horse-like structure and given
to the enemy as a gift. So that they can enter to the enemy's palace without
come in any sight.
45) Which of the following malware's type allows the attacker to access the
administrative controls and enables his/or her to do almost anything he wants
to do with the infected computers.
a. RATs
b. Worms
c. Rootkits
d. Botnets
Answer: a
Explanation: The RAT is an abbreviation of Remote Access Trojans or Remote
Administration Tools, which gives the total control of a Device, which means
it, can control anything or do anything in the target device remotely. It allows
the attacker administrative control just as if they have physical access to your
device.
Answer: a
Explanation: Trojans are a type of malware that will perform any types of
actions for those they are design or programmed. Another important thing
about Trojans is that the user may not know that the malware enters their
system until the Trojan starts doing its job for which they are programmed.
47) Which of the following is just opposite to the Open Design principle?
d. Work factor
Answer: a
48) Which of the following is a type of independent malicious program that never
required any host program?
a. Trojan Horse
b. Worm
c. Trap Door
d. Virus
Answer: b
49) Which of the following usually considered as the default port number of
apache and several other web servers?
a. 20
b. 40
c. 80
d. 87
Answer: c
Explanation: The default port number used by the apache and several other
web servers is 80. So the correct answer will be C.
a. Hex
b. Binary
c. IP
d. URL
Explanation: DNS stands for the Domain name system; the main work of a
DNS is to translate the Domain name into an IP address that is
understandable to the computers.
a. Windows 8
c. BSD Linux
d. Microsoft Office
Answer: d
52) In the CIA Triad, which one of the following is not involved?
a. Availability
b. Confidentiality
c. Authenticity
d. Integrity
Answer: c
a. CIA Triad
b. Confidentiality
c. Authenticity
Answer: a
54) Why are the factors like Confidentiality, Integrity, Availability, and
Authenticity considered as the fundamentals?
c. They help to understand the security and its components in a better manner
Answer: c
a. Encrypt
b. Decrypt
c. Delete
Answer: a
56) Which one of the following is considered as the most secure Linux operating
system that also provides anonymity and the incognito option for securing the
user's information?
a. Ubuntu
b. Tails
c. Fedora
Answer: b
57) Which type following UNIX account provides all types of privileges and rights
which one can perform administrative functions?
a. Client
b. Guest
c. Root
d. Administrative
Answer: d
Explanation: If a user uses the Root account of the UNIX operating system,
he can carry out all types of administrative functions because it provides all
necessary privileges and rights to a user.
a. OSCON
b. DEVON
c. DEFCON
d. SECTION
Hide Answer Workspace
Answer: c
Explanation: DEFCON is one of the most popular and largest Hacker's as well
as the security consultant's conference. It is always held once a year in Las
Vegas, Nevada, where hackers of all types (such as black hats, gray hats,
and white hat hackers), government agents as well as security professionals
from around the world attend the conference attends this meeting.
59) Which of the following known as the oldest phone hacking techniques used
by hackers to make free calls?
a. Phreaking
b. Phishing
c. Cracking
d. Spraining
Answer: a
a. John Draper
b. Kevin Mitnick
d. Kevin Poulsen
Answer: d