Explore topic-wise MCQs in Cyber Security.

This section includes 19 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Nowadays, most botnets rely on existing _______________ networks for communication.

A. server-to-server
B. peer-to-peer
C. client-to-server
D. host-to-server
Answer» C. client-to-server
2.

The bot program allows the bot-herders to perform all operations from a ___________ location.

A. local
B. open
C. corporate
D. remote
Answer» E.
3.

Infected computers and other systems within the botnet are called __________

A. killers
B. vampires
C. zombies
D. gargoyles
Answer» D. gargoyles
4.

The word “botnet” is a blend of the words _____________ & ___________

A. robot, network
B. rocket, network
C. bot, network
D. bot, internet
Answer» B. rocket, network
5.

INFECTED_COMPUTERS_AND_OTHER_SYSTEMS_WITHIN_THE_BOTNET_ARE_CALLED___________?$

A. killers
B. vampires
C. zombies
D. gargoyles
Answer» D. gargoyles
6.

Nowadays, most botnets rely on existing _______________ networks for communication.$

A. server-to-server
B. peer-to-peer
C. client-to-server
D. host-to-server
Answer» C. client-to-server
7.

The bot program allows the bot-herders to perform all operations from a ___________ location.$

A. local
B. open
C. corporate
D. remote
Answer» E.
8.

Which of the following is an example of a Botnet program?

A. Slammer
B. GameOver
C. Stuxnet
D. Anna Kournikova
Answer» C. Stuxnet
9.

Which of the following is an example of Botnet?

A. Zeus
B. ILOVEYOU
C. Storm Worm
D. MyDoom
Answer» B. ILOVEYOU
10.

Which of the following is not an example of a botnet program?

A. Zeus
B. GameOver
C. ZeroAccess
D. MyDoom
Answer» E.
11.

Botnets are not the logical connection of which of the following?

A. Smart-phones
B. IoT devices
C. Computer systems
D. Modems
Answer» E.
12.

The word “botnet” is a blend of the words _____________ & ___________$

A. robot, network
B. rocket, network
C. bot, network
D. bot, internet
Answer» B. rocket, network
13.

The full form of C&C is ____________

A. command and control
B. copy and cut
C. command and capture
D. copy and control
Answer» B. copy and cut
14.

The owner of botnets can control the botnet using ___________________ software.

A. trojans
B. command and control
C. servers
D. infected servers
Answer» C. servers
15.

Botnets are not used for ______________

A. Perform DDoS
B. Steal bulk amount of sensitive data
C. Spamming
D. Encrypting for ransom
Answer» E.
16.

_____________ are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection.

A. Trojan
B. Virus
C. Botnet
D. Worms
Answer» D. Worms
17.

A _____________ is a number of Internet-connected systems, where each of them is running one or more bots.

A. Trojan
B. Virus
C. Worms
D. Botnet
Answer» E.
18.

Botnets are managed by ______________

A. Bot-holders
B. Bot-herders
C. Bot-trainers
D. Bot-creators
Answer» C. Bot-trainers
19.

A ___________ consists of at least one bot server or controller and one or more client-bots.

A. Virus
B. Trojan
C. Botnet
D. Adware
Answer» D. Adware