

MCQOPTIONS
Saved Bookmarks
This section includes 8 Mcqs, each offering curated multiple-choice questions to sharpen your Technical MCQs knowledge and support exam preparation. Choose a topic below to get started.
1. |
A cyberattack may steal, alter, or destroy a specified target by hacking into a susceptible system |
A. | Yes |
B. | No |
C. | Can be yes or no |
D. | Can not say |
E. | |
Answer» B. No | |
2. |
Compromising a users session for exploiting the users data and do malicious activities or misuse users credentials is called ___________ |
A. | Session Fixation |
B. | Cookie stuffing |
C. | Session Spying |
D. | Session Hijacking |
Answer» E. | |
3. |
Which attack attempts to alter system resources or affect their operation? |
A. | active attack |
B. | passive attack |
C. | dual attack |
D. | third-party attack |
Answer» B. passive attack | |
4. |
which factor is a measure of the actual damage achieved by an attack? |
A. | Cyberwarfare |
B. | Spectacularity |
C. | Vulnerability |
D. | All of the above |
Answer» C. Vulnerability | |
5. |
A worm does not need another file or program to copy itself; it is a self-sustaining running program. |
A. | TRUE |
B. | FALSE |
C. | Can be true or false |
D. | Can not say |
Answer» B. FALSE | |
6. |
Which of the following is designed to perform legitimate tasks but it also performs unknown and unwanted activity? |
A. | Viruses |
B. | Worms |
C. | Trojan horses |
D. | Semantic attack |
Answer» D. Semantic attack | |
7. |
A product that facilitates a cyberattack is sometimes called a ? |
A. | weapon |
B. | cyberweapon |
C. | c-weapon |
D. | cyberwarfare |
Answer» C. c-weapon | |
8. |
A cyberattack is any offensive maneuver that targets? |
A. | computer information systems |
B. | infrastructures |
C. | computer networks |
D. | All of the above |
Answer» E. | |