Explore topic-wise MCQs in Cyber Security.

This section includes 22 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

DNS poisoning is very dangerous because it can extend its reach from one ___________ to another.

A. ISP server
B. DNS server
C. Linux server
D. Domain user
Answer» C. Linux server
2.

______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet.

A. DNS poisoning
B. DNS re-routing
C. DNS cracking
D. Domain link poisoning
Answer» B. DNS re-routing
3.

A ______________ is essentially a text file residing on the server that hosts different domain containing entries for dissimilar resource records.

A. Zone file
B. Robot file
C. Bot file
D. DNS file
Answer» B. Robot file
4.

Which of the following is not an example of DNS hijacking?

A. ISP DNS hijacking
B. DNS hijacking for phishing
C. DNS hijacking for pharming
D. HTTP-based DNS hacking
Answer» E.
5.

The _______________ matches and maps to the user friendly domain name.

A. HTTP
B. DNS
C. WWW
D. ISP
Answer» C. WWW
6.

_____________ can be attained by the use of malware or by changing the server’s settings.

A. DNS poisoning
B. DNS cracking
C. DNS hijacking
D. DNS redirecting
Answer» D. DNS redirecting
7.

______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings.

A. DNS mal-functioning
B. DNS cracking
C. DNS redirecting
D. DNS hijacking
Answer» E.
8.

WHICH_OF_THE_FOLLOWING_IS_NOT_AN_EXAMPLE_OF_DNS_HIJACKING??$

A. ISP DNS hijacking
B. DNS hijacking for phishing
C. DNS hijacking for pharming
D. HTTP-based DNS hacking
Answer» E.
9.

______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of internet.$

A. DNS poisoning
B. DNS re-routing
C. DNS cracking
D. Domain link poisoning
Answer» B. DNS re-routing
10.

A________________is_essentially_a_text_file_residing_on_the_server_that_hosts_different_domain_containing_entries_for_dissimilar_resource_records.$

A. Zone file
B. Robot file
C. Bot file
D. DNS file
Answer» B. Robot file
11.

The user could be influenced by DNS hijacking if the government of that country uses DNS redirecting as a mechanism to mask censorship.

A. True
B. False
Answer» B. False
12.

The ____________ Domain Name Server data will get spread to the ISPs & will be cached there.

A. working
B. compromised
C. corrupted
D. poisoned
Answer» E.
13.

A _________________ can be poisoned if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of information on it.

A. Server data
B. Domain name
C. DNS cache
D. System file
Answer» D. System file
14.

DNS_poisoning_is_very_dangerous_because_it_can_extend_its_reach_from_one_____________to_another.

A. ISP server
B. DNS server
C. Linux server
D. Domain user
Answer» C. Linux server
15.

The _______________ matches and maps to the user friendly domain name?

A. HTTP
B. DNS
C. WWW
D. ISP
Answer» C. WWW
16.

DNS trojans are used for performing a type of DNS hijacking.

A. True
B. False
Answer» B. False
17.

There are _________ main types of DNS hijacking.

A. 4
B. 2
C. 3
D. 5
Answer» C. 3
18.

_____________ can be attained by the use of malware or by changing the server’s settings.$

A. DNS poisoning
B. DNS cracking
C. DNS hijacking
D. DNS redirecting
Answer» D. DNS redirecting
19.

______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings.$

A. DNS mal-functioning
B. DNS cracking
C. DNS redirecting
D. DNS hijacking
Answer» E.
20.

Some security issues might exist owing to misconfigured __________________ which can direct to disclosure of information regarding the domain.

A. DNS names
B. HTTP setup
C. ISP setup
D. FTP-unsecured
Answer» B. HTTP setup
21.

DNS stands for _____________

A. Data Name System
B. Domain Name Server
C. Domain Name System
D. Domain’s Naming System
Answer» D. Domain‚Äö√Ñ√∂‚àö√ë‚àö¬•s Naming System
22.

__________ is a naming system given to different computers which adapt to human-readable domain names.

A. HTTP
B. DNS
C. WWW
D. ISP
Answer» C. WWW