What is Cyber Security?
2. What does cyber security protect?
a) Cyber security protects criminals
c) Cyber security protects hackers
d) None of the mentioned
3. Who is the father of computer security?
a) August Kerckhoffs
b) Bob Thomas
4. Which of the following is defined as an attempt to steal,
spy, damage or destroy computer systems, networks, or their associated
information?
5. Which of the following is a type of cyber security?
6. What are the features of cyber security?
7. Which of the following is an objective of network
security?
8. Which of the following is not a cybercrime?
a) Denial of Service
c) Malware
9. Which of the following is a component of cyber security?
10. Which of the following is a type of cyber attack?
11. Which of the following is not an advantage of cyber
security?
12. “Cyberspace” was coined by _________
13. In which year has hacking become a practical crime and a
matter of concern in the field of cyber technology?
14. Governments hired some highly skilled hackers for
providing cyber security for the country or state. These types of hackers are
termed as _______
15. Which of the following act violates cyber security?
16. Which of the following actions compromise cyber
security?
17. Which of the following is the hacking approach where
cyber-criminals design fake websites or pages for tricking or gaining
additional traffic?
18. Which of the following is not a type of peer-to-peer
cyber-crime?
19. A cyber-criminal or penetration tester uses the
additional data that stores certain special instructions in the memory for
activities to break the system in which of the following attack?
20. Which of the following do Cyber attackers commonly
target for fetching IP address of a target or victim user?
21. Which of the following is defined as an attempt to harm,
damage or cause threat to a system or network?
22. They are nefarious hackers, and their main motive is to
gain financial profit by doing cyber crimes. Who are “they” referred to here?
24. Where did the term “hacker” originate?
25. What is the existence of weakness in a system or network
is known as?
26. Which of the following is an internet scam done by
cyber-criminals where the user is convinced digitally to provide confidential
information.
27. Which of the following is not a step followed by
cyber-criminals in data breaching?
28. Which of the following online service’s privacy cannot
be protected using Tor?
29. Which of the following term refers to a group of hackers
who are both white and black hat?
30. Which of the following is not an email-related hacking
tool?
30. Which of the following DDoS in mobile systems wait for
the owner to trigger the cyber attack?
31. Which of the following is the least strong security
encryption standard?
32. Which of the following is a Stuxnet?
33. Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?
a) Operating System fingerprinting
34. Which of the following can diminish the chance of data
leakage?
35. The full form of Malware is ________
36. Who deploy Malwares to a system or network?
d) Criminal organizations, gray hat hackers, Malware developers, Penetration testers
37. _____________ is a code injecting method used for
attacking the database of a system / website.
38. XSS is abbreviated as __________
39. This attack can be deployed by infusing a malicious code
in a website’s comment section. What is “this” attack referred to here?
a) SQL injection
40. When there is an excessive amount of data flow, which
the system cannot handle, _____ attack takes place.
41. Compromising a user’s session for exploiting the user’s
data and do malicious activities or misuse user’s credentials is called
___________
42. Which of this is an example of physical hacking?
43. Which of them is not a wireless attack?
d) Phishing
44. An attempt to harm, damage or cause threat to a system
or network is broadly termed as ______
45. Which method of hacking will record all your keystrokes?
46. _________ are the special type of programs used for
recording and tracking user’s keystroke.
a) Keylogger
47. These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.
a) Malware
48. Stuxnet is a _________
a) Worm
49. ___________ is a violent act done using the Internet,
which either threatens any technology user or leads to loss of life or
otherwise harms anyone in order to accomplish political gain.
0 Comments