MCQOPTIONS
Saved Bookmarks
This section includes 8 Mcqs, each offering curated multiple-choice questions to sharpen your Technical MCQs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
A cyberattack may steal, alter, or destroy a specified target by hacking into a susceptible system |
| A. | Yes |
| B. | No |
| C. | Can be yes or no |
| D. | Can not say |
| E. | |
| Answer» B. No | |
| 2. |
Compromising a users session for exploiting the users data and do malicious activities or misuse users credentials is called ___________ |
| A. | Session Fixation |
| B. | Cookie stuffing |
| C. | Session Spying |
| D. | Session Hijacking |
| Answer» E. | |
| 3. |
Which attack attempts to alter system resources or affect their operation? |
| A. | active attack |
| B. | passive attack |
| C. | dual attack |
| D. | third-party attack |
| Answer» B. passive attack | |
| 4. |
which factor is a measure of the actual damage achieved by an attack? |
| A. | Cyberwarfare |
| B. | Spectacularity |
| C. | Vulnerability |
| D. | All of the above |
| Answer» C. Vulnerability | |
| 5. |
A worm does not need another file or program to copy itself; it is a self-sustaining running program. |
| A. | TRUE |
| B. | FALSE |
| C. | Can be true or false |
| D. | Can not say |
| Answer» B. FALSE | |
| 6. |
Which of the following is designed to perform legitimate tasks but it also performs unknown and unwanted activity? |
| A. | Viruses |
| B. | Worms |
| C. | Trojan horses |
| D. | Semantic attack |
| Answer» D. Semantic attack | |
| 7. |
A product that facilitates a cyberattack is sometimes called a ? |
| A. | weapon |
| B. | cyberweapon |
| C. | c-weapon |
| D. | cyberwarfare |
| Answer» C. c-weapon | |
| 8. |
A cyberattack is any offensive maneuver that targets? |
| A. | computer information systems |
| B. | infrastructures |
| C. | computer networks |
| D. | All of the above |
| Answer» E. | |