

MCQOPTIONS
Saved Bookmarks
This section includes 39 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location. |
A. | EventLog Analyser |
B. | NordVPN |
C. | Wireshark |
D. | PacketFilter Analyzer |
Answer» B. NordVPN | |
2. |
_______________ is a popular tool used for network analysis in multiprotocol diverse network. |
A. | Snort |
B. | SuperScan |
C. | Burp Suit |
D. | EtterPeak |
Answer» E. | |
3. |
Remote exploits is that type of exploits acts over any network to exploit on security vulnerability. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
4. |
Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
5. |
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008. |
A. | Section 66 |
B. | Section 67 |
C. | Section 68 |
D. | Section 69 |
Answer» C. Section 68 | |
6. |
_____________ helps in protecting corporate data, communications and other assets. |
A. | Snort |
B. | CipherCloud |
C. | Burp Suit |
D. | Wireshark |
Answer» C. Burp Suit | |
7. |
________________ helps in protecting businesses against data breaches that may make threats to cloud. |
A. | Centrify |
B. | Mailbox Exchange Recovery |
C. | Nessus |
D. | Dashline |
Answer» B. Mailbox Exchange Recovery | |
8. |
Accessing computer without prior authorization is a cyber-crimes that come under _______ |
A. | Section 65 |
B. | Section 66 |
C. | Section 68 |
D. | Section 70 |
Answer» C. Section 68 | |
9. |
Nmap is abbreviated as Network Mapper. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
10. |
Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. |
A. | 65 |
B. | 65-D |
C. | 67 |
D. | 70 |
Answer» B. 65-D | |
11. |
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine. |
A. | section 67-A |
B. | section 67-B |
C. | section 67-C |
D. | section 67-D |
Answer» B. section 67-B | |
12. |
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act. |
A. | Section 66 |
B. | Section 67 |
C. | Section 68 |
D. | Section 69 |
Answer» C. Section 68 | |
13. |
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» E. | |
14. |
What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means? |
A. | 6 months of imprisonment and a fine of Rs. 50,000 |
B. | 1 year of imprisonment and a fine of Rs. 100,000 |
C. | 2 years of imprisonment and a fine of Rs. 250,000 |
D. | 3 years of imprisonment and a fine of Rs. 500,000 |
Answer» E. | |
15. |
________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit. |
A. | Local exploits |
B. | Remote exploits |
C. | System exploits |
D. | Network exploits |
Answer» B. Remote exploits | |
16. |
______________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes. |
A. | Outlook |
B. | Nessus |
C. | Mailbox Exchange Recovery |
D. | Mail Exchange Recovery toolkit |
Answer» D. Mail Exchange Recovery toolkit | |
17. |
L0phtCrack is formerly known as LC3. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» C. May be True or False | |
18. |
____________ scans TCP ports and resolves different hostnames. |
A. | SuperScan |
B. | Snort |
C. | Ettercap |
D. | QualysGuard |
Answer» B. Snort | |
19. |
___________ is a web application assessment security tool. |
A. | LC4 |
B. | WebInspect |
C. | Ettercap |
D. | QualysGuard |
Answer» C. Ettercap | |
20. |
Aircrack-ng is used for ____________ |
A. | Firewall bypassing |
B. | Wi-Fi attacks |
C. | Packet filtering |
D. | System password cracking |
Answer» C. Packet filtering | |
21. |
Which of the following attack-based checks WebInspect cannot do? |
A. | cross-site scripting |
B. | directory traversal |
C. | parameter injection |
D. | injecting shell code |
Answer» E. | |
22. |
___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems. |
A. | Exploiting |
B. | Cracking |
C. | Hacking |
D. | Pivoting |
Answer» E. | |
23. |
_____________ is a popular IP address and port scanner. |
A. | Cain and Abel |
B. | Snort |
C. | Angry IP Scanner |
D. | Ettercap |
Answer» D. Ettercap | |
24. |
________ is a password recovery and auditing tool. |
A. | LC3 |
B. | LC4 |
C. | Network Stumbler |
D. | Maltego |
Answer» C. Network Stumbler | |
25. |
Which of this Nmap do not check? |
A. | services different hosts are offering |
B. | on what OS they are running |
C. | what kind of firewall is in use |
D. | what type of antivirus is in use |
Answer» E. | |
26. |
Which of the following deals with network intrusion detection and real-time traffic analysis? |
A. | John the Ripper |
B. | L0phtCrack |
C. | Snort |
D. | Nessus |
Answer» D. Nessus | |
27. |
Wireshark is a ____________ tool. |
A. | network protocol analysis |
B. | network connection security |
C. | connection analysis |
D. | defending malicious packet-filtering |
Answer» B. network connection security | |
28. |
____________ is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network. |
A. | Wireshark |
B. | Nessus |
C. | Snort |
D. | WebInspect |
Answer» C. Snort | |
29. |
__________ is a popular tool used for discovering networks as well as in security auditing. |
A. | Ettercap |
B. | Metasploit |
C. | Nmap |
D. | Burp Suit |
Answer» D. Burp Suit | |
30. |
A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system. |
A. | System error |
B. | Bugged system |
C. | Security bug |
D. | System virus |
Answer» D. System virus | |
31. |
Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
32. |
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________ |
A. | 2 years |
B. | 3 years |
C. | 4 years |
D. | 5 years |
Answer» C. 4 years | |
33. |
__________ is a popular corporate security tool that is used to detect the attack on email with cloud only services. |
A. | Cain and Abel |
B. | Proofpoint |
C. | Angry IP Scanner |
D. | Ettercap |
Answer» C. Angry IP Scanner | |
34. |
_________ framework made cracking of vulnerabilities easy like point and click. |
A. | .Net |
B. | Metasploit |
C. | Zeus |
D. | Ettercap |
Answer» C. Zeus | |
35. |
Which of the below-mentioned tool is used for Wi-Fi hacking? |
A. | Wireshark |
B. | Nessus |
C. | Aircrack-ng |
D. | Snort |
Answer» D. Snort | |
36. |
_____________ is a special type of vulnerability that doesn’t possess risk. |
A. | Vulnerabilities without risk |
B. | Vulnerabilities without attacker |
C. | Vulnerabilities without action |
D. | Vulnerabilities no one knows |
Answer» B. Vulnerabilities without attacker | |
37. |
In which year India’s IT Act came into existence? |
A. | 2000 |
B. | 2001 |
C. | 2002 |
D. | 2003 |
Answer» B. 2001 | |
38. |
What is the full form of ITA-2000? |
A. | Information Tech Act -2000 |
B. | Indian Technology Act -2000 |
C. | International Technology Act -2000 |
D. | Information Technology Act -2000 |
Answer» E. | |
39. |
The Information Technology Act -2000 bill was passed by K. R. Narayanan. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» C. May be True or False | |