 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 39 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | ________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location. | 
| A. | EventLog Analyser | 
| B. | NordVPN | 
| C. | Wireshark | 
| D. | PacketFilter Analyzer | 
| Answer» B. NordVPN | |
| 2. | _______________ is a popular tool used for network analysis in multiprotocol diverse network. | 
| A. | Snort | 
| B. | SuperScan | 
| C. | Burp Suit | 
| D. | EtterPeak | 
| Answer» E. | |
| 3. | Remote exploits is that type of exploits acts over any network to exploit on security vulnerability. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 4. | Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 5. | Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008. | 
| A. | Section 66 | 
| B. | Section 67 | 
| C. | Section 68 | 
| D. | Section 69 | 
| Answer» C. Section 68 | |
| 6. | _____________ helps in protecting corporate data, communications and other assets. | 
| A. | Snort | 
| B. | CipherCloud | 
| C. | Burp Suit | 
| D. | Wireshark | 
| Answer» C. Burp Suit | |
| 7. | ________________ helps in protecting businesses against data breaches that may make threats to cloud. | 
| A. | Centrify | 
| B. | Mailbox Exchange Recovery | 
| C. | Nessus | 
| D. | Dashline | 
| Answer» B. Mailbox Exchange Recovery | |
| 8. | Accessing computer without prior authorization is a cyber-crimes that come under _______ | 
| A. | Section 65 | 
| B. | Section 66 | 
| C. | Section 68 | 
| D. | Section 70 | 
| Answer» C. Section 68 | |
| 9. | Nmap is abbreviated as Network Mapper. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 10. | Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. | 
| A. | 65 | 
| B. | 65-D | 
| C. | 67 | 
| D. | 70 | 
| Answer» B. 65-D | |
| 11. | IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine. | 
| A. | section 67-A | 
| B. | section 67-B | 
| C. | section 67-C | 
| D. | section 67-D | 
| Answer» B. section 67-B | |
| 12. | Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act. | 
| A. | Section 66 | 
| B. | Section 67 | 
| C. | Section 68 | 
| D. | Section 69 | 
| Answer» C. Section 68 | |
| 13. | If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years. | 
| A. | 2 | 
| B. | 3 | 
| C. | 4 | 
| D. | 5 | 
| Answer» E. | |
| 14. | What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means? | 
| A. | 6 months of imprisonment and a fine of Rs. 50,000 | 
| B. | 1 year of imprisonment and a fine of Rs. 100,000 | 
| C. | 2 years of imprisonment and a fine of Rs. 250,000 | 
| D. | 3 years of imprisonment and a fine of Rs. 500,000 | 
| Answer» E. | |
| 15. | ________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit. | 
| A. | Local exploits | 
| B. | Remote exploits | 
| C. | System exploits | 
| D. | Network exploits | 
| Answer» B. Remote exploits | |
| 16. | ______________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes. | 
| A. | Outlook | 
| B. | Nessus | 
| C. | Mailbox Exchange Recovery | 
| D. | Mail Exchange Recovery toolkit | 
| Answer» D. Mail Exchange Recovery toolkit | |
| 17. | L0phtCrack is formerly known as LC3. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» C. May be True or False | |
| 18. | ____________ scans TCP ports and resolves different hostnames. | 
| A. | SuperScan | 
| B. | Snort | 
| C. | Ettercap | 
| D. | QualysGuard | 
| Answer» B. Snort | |
| 19. | ___________ is a web application assessment security tool. | 
| A. | LC4 | 
| B. | WebInspect | 
| C. | Ettercap | 
| D. | QualysGuard | 
| Answer» C. Ettercap | |
| 20. | Aircrack-ng is used for ____________ | 
| A. | Firewall bypassing | 
| B. | Wi-Fi attacks | 
| C. | Packet filtering | 
| D. | System password cracking | 
| Answer» C. Packet filtering | |
| 21. | Which of the following attack-based checks WebInspect cannot do? | 
| A. | cross-site scripting | 
| B. | directory traversal | 
| C. | parameter injection | 
| D. | injecting shell code | 
| Answer» E. | |
| 22. | ___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems. | 
| A. | Exploiting | 
| B. | Cracking | 
| C. | Hacking | 
| D. | Pivoting | 
| Answer» E. | |
| 23. | _____________ is a popular IP address and port scanner. | 
| A. | Cain and Abel | 
| B. | Snort | 
| C. | Angry IP Scanner | 
| D. | Ettercap | 
| Answer» D. Ettercap | |
| 24. | ________ is a password recovery and auditing tool. | 
| A. | LC3 | 
| B. | LC4 | 
| C. | Network Stumbler | 
| D. | Maltego | 
| Answer» C. Network Stumbler | |
| 25. | Which of this Nmap do not check? | 
| A. | services different hosts are offering | 
| B. | on what OS they are running | 
| C. | what kind of firewall is in use | 
| D. | what type of antivirus is in use | 
| Answer» E. | |
| 26. | Which of the following deals with network intrusion detection and real-time traffic analysis? | 
| A. | John the Ripper | 
| B. | L0phtCrack | 
| C. | Snort | 
| D. | Nessus | 
| Answer» D. Nessus | |
| 27. | Wireshark is a ____________ tool. | 
| A. | network protocol analysis | 
| B. | network connection security | 
| C. | connection analysis | 
| D. | defending malicious packet-filtering | 
| Answer» B. network connection security | |
| 28. | ____________ is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network. | 
| A. | Wireshark | 
| B. | Nessus | 
| C. | Snort | 
| D. | WebInspect | 
| Answer» C. Snort | |
| 29. | __________ is a popular tool used for discovering networks as well as in security auditing. | 
| A. | Ettercap | 
| B. | Metasploit | 
| C. | Nmap | 
| D. | Burp Suit | 
| Answer» D. Burp Suit | |
| 30. | A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system. | 
| A. | System error | 
| B. | Bugged system | 
| C. | Security bug | 
| D. | System virus | 
| Answer» D. System virus | |
| 31. | Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» B. False | |
| 32. | Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________ | 
| A. | 2 years | 
| B. | 3 years | 
| C. | 4 years | 
| D. | 5 years | 
| Answer» C. 4 years | |
| 33. | __________ is a popular corporate security tool that is used to detect the attack on email with cloud only services. | 
| A. | Cain and Abel | 
| B. | Proofpoint | 
| C. | Angry IP Scanner | 
| D. | Ettercap | 
| Answer» C. Angry IP Scanner | |
| 34. | _________ framework made cracking of vulnerabilities easy like point and click. | 
| A. | .Net | 
| B. | Metasploit | 
| C. | Zeus | 
| D. | Ettercap | 
| Answer» C. Zeus | |
| 35. | Which of the below-mentioned tool is used for Wi-Fi hacking? | 
| A. | Wireshark | 
| B. | Nessus | 
| C. | Aircrack-ng | 
| D. | Snort | 
| Answer» D. Snort | |
| 36. | _____________ is a special type of vulnerability that doesn’t possess risk. | 
| A. | Vulnerabilities without risk | 
| B. | Vulnerabilities without attacker | 
| C. | Vulnerabilities without action | 
| D. | Vulnerabilities no one knows | 
| Answer» B. Vulnerabilities without attacker | |
| 37. | In which year India’s IT Act came into existence? | 
| A. | 2000 | 
| B. | 2001 | 
| C. | 2002 | 
| D. | 2003 | 
| Answer» B. 2001 | |
| 38. | What is the full form of ITA-2000? | 
| A. | Information Tech Act -2000 | 
| B. | Indian Technology Act -2000 | 
| C. | International Technology Act -2000 | 
| D. | Information Technology Act -2000 | 
| Answer» E. | |
| 39. | The Information Technology Act -2000 bill was passed by K. R. Narayanan. | 
| A. | True | 
| B. | False | 
| C. | May be True or False | 
| D. | Can't say | 
| Answer» C. May be True or False | |