MCQOPTIONS
Saved Bookmarks
This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Known bugs can be solved or removed by __________________ develop by the vendors of the application. |
| A. | removing the application |
| B. | changing the software |
| C. | installing security patches |
| D. | installing database patches |
| Answer» D. installing database patches | |
| 2. |
Fixing of security vulnerabilities in a system by additional programs is known as __________ patches. |
| A. | hacking |
| B. | database |
| C. | server |
| D. | security |
| Answer» E. | |
| 3. |
A ____________ is a set of changes done to any program or its associated data designed for updating, fixing, or improving it. |
| A. | scratch |
| B. | patch |
| C. | fixer |
| D. | resolver |
| Answer» C. fixer | |
| 4. |
Unknown exploits are those exploits that have not yet been reported openly and hence present a straightforward attack at firms and the government agencies. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 5. |
Known exploits have a confirmation of and measures can be taken against it to resolve them. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 6. |
How many types of exploits are there based on their nature from hacking’s perspective? |
| A. | 4 |
| B. | 3 |
| C. | 2 |
| D. | 5 |
| Answer» D. 5 | |
| 7. |
A______________IS_A_SET_OF_CHANGES_DONE_TO_ANY_PROGRAM_OR_ITS_ASSOCIATED_DATA_DESIGNED_FOR_UPDATING,_FIXING,_OR_IMPROVING_IT.?$ |
| A. | scratch |
| B. | patch |
| C. | fixer |
| D. | resolver |
| Answer» C. fixer | |
| 8. |
UNKNOWN_EXPLOITS_ARE_THOSE_EXPLOITS_THAT_HAVE_NOT_YET_BEEN_REPORTED_OPENLY_AND_HENCE_PRESENT_A_STRAIGHTFORWARD_ATTACK_AT_FIRMS_AND_THE_GOVERNMENT_AGENCIES.?$ |
| A. | True |
| B. | False |
| Answer» B. False | |
| 9. |
Known bugs can be solved or removed by __________________ develop by the vendors of the application.$ |
| A. | removing the application |
| B. | changing the software |
| C. | installing security patches |
| D. | installing database patches |
| Answer» D. installing database patches | |
| 10. |
Fixing of security vulnerabilities in a system by additional programs is known as __________ patches.$ |
| A. | hacking |
| B. | database |
| C. | server |
| D. | security |
| Answer» E. | |
| 11. |
CVE is a directory of lists of publicly recognized information security vulnerabilities as well as exposures. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 12. |
National Vulnerability Database (NVD) is _________________ repository of data regarding vulnerability standards. |
| A. | U.S. government |
| B. | India government |
| C. | Russian government |
| D. | China Government |
| Answer» B. India government | |
| 13. |
___________________ are some very frequent updates that come for every anti-virus. |
| A. | Patch update |
| B. | Data update |
| C. | Code update |
| D. | Definition update |
| Answer» E. | |
| 14. |
Known exploits have a confirmation of and measures can be taken against it to resolve them? |
| A. | True |
| B. | False |
| Answer» B. False | |
| 15. |
How many types of exploits are there based on their nature from hacking’s perspective?$ |
| A. | 4 |
| B. | 3 |
| C. | 2 |
| D. | 5 |
| Answer» D. 5 | |
| 16. |
There are __________ types of exploits based on their working. |
| A. | two |
| B. | three |
| C. | four |
| D. | Five |
| Answer» B. three | |
| 17. |
Which of the following are not a vulnerability-listed site/database? |
| A. | Exploit-db |
| B. | Common Vulnerabilities and Exposures (CVE) |
| C. | National Vulnerability Database (NVD) |
| D. | Bing Vulnerability database (BVD) |
| Answer» E. | |
| 18. |
__________ is the specific search engine for exploits where anyone can find all the exploits associated to vulnerability. |
| A. | |
| B. | Bing |
| C. | Exploit-db |
| D. | Exploit-engine |
| Answer» D. Exploit-engine | |
| 19. |
Which of them is not a powerful vulnerability detecting tool? |
| A. | Nessus |
| B. | Nexpose |
| C. | Metasploit |
| D. | Nmap |
| Answer» E. | |
| 20. |
The process of finding vulnerabilities and exploiting them using exploitable scripts or programs are known as _____________ |
| A. | infiltrating |
| B. | exploitation |
| C. | cracking |
| D. | hacking |
| Answer» C. cracking | |
| 21. |
________________ are piece of programs or scripts that allow hackers to take control over any system. |
| A. | Exploits |
| B. | Antivirus |
| C. | Firewall by-passers |
| D. | Worms |
| Answer» B. Antivirus | |