

MCQOPTIONS
Saved Bookmarks
This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Known bugs can be solved or removed by __________________ develop by the vendors of the application. |
A. | removing the application |
B. | changing the software |
C. | installing security patches |
D. | installing database patches |
Answer» D. installing database patches | |
2. |
Fixing of security vulnerabilities in a system by additional programs is known as __________ patches. |
A. | hacking |
B. | database |
C. | server |
D. | security |
Answer» E. | |
3. |
A ____________ is a set of changes done to any program or its associated data designed for updating, fixing, or improving it. |
A. | scratch |
B. | patch |
C. | fixer |
D. | resolver |
Answer» C. fixer | |
4. |
Unknown exploits are those exploits that have not yet been reported openly and hence present a straightforward attack at firms and the government agencies. |
A. | True |
B. | False |
Answer» B. False | |
5. |
Known exploits have a confirmation of and measures can be taken against it to resolve them. |
A. | True |
B. | False |
Answer» B. False | |
6. |
How many types of exploits are there based on their nature from hacking’s perspective? |
A. | 4 |
B. | 3 |
C. | 2 |
D. | 5 |
Answer» D. 5 | |
7. |
A______________IS_A_SET_OF_CHANGES_DONE_TO_ANY_PROGRAM_OR_ITS_ASSOCIATED_DATA_DESIGNED_FOR_UPDATING,_FIXING,_OR_IMPROVING_IT.?$ |
A. | scratch |
B. | patch |
C. | fixer |
D. | resolver |
Answer» C. fixer | |
8. |
UNKNOWN_EXPLOITS_ARE_THOSE_EXPLOITS_THAT_HAVE_NOT_YET_BEEN_REPORTED_OPENLY_AND_HENCE_PRESENT_A_STRAIGHTFORWARD_ATTACK_AT_FIRMS_AND_THE_GOVERNMENT_AGENCIES.?$ |
A. | True |
B. | False |
Answer» B. False | |
9. |
Known bugs can be solved or removed by __________________ develop by the vendors of the application.$ |
A. | removing the application |
B. | changing the software |
C. | installing security patches |
D. | installing database patches |
Answer» D. installing database patches | |
10. |
Fixing of security vulnerabilities in a system by additional programs is known as __________ patches.$ |
A. | hacking |
B. | database |
C. | server |
D. | security |
Answer» E. | |
11. |
CVE is a directory of lists of publicly recognized information security vulnerabilities as well as exposures. |
A. | True |
B. | False |
Answer» B. False | |
12. |
National Vulnerability Database (NVD) is _________________ repository of data regarding vulnerability standards. |
A. | U.S. government |
B. | India government |
C. | Russian government |
D. | China Government |
Answer» B. India government | |
13. |
___________________ are some very frequent updates that come for every anti-virus. |
A. | Patch update |
B. | Data update |
C. | Code update |
D. | Definition update |
Answer» E. | |
14. |
Known exploits have a confirmation of and measures can be taken against it to resolve them? |
A. | True |
B. | False |
Answer» B. False | |
15. |
How many types of exploits are there based on their nature from hacking’s perspective?$ |
A. | 4 |
B. | 3 |
C. | 2 |
D. | 5 |
Answer» D. 5 | |
16. |
There are __________ types of exploits based on their working. |
A. | two |
B. | three |
C. | four |
D. | Five |
Answer» B. three | |
17. |
Which of the following are not a vulnerability-listed site/database? |
A. | Exploit-db |
B. | Common Vulnerabilities and Exposures (CVE) |
C. | National Vulnerability Database (NVD) |
D. | Bing Vulnerability database (BVD) |
Answer» E. | |
18. |
__________ is the specific search engine for exploits where anyone can find all the exploits associated to vulnerability. |
A. | |
B. | Bing |
C. | Exploit-db |
D. | Exploit-engine |
Answer» D. Exploit-engine | |
19. |
Which of them is not a powerful vulnerability detecting tool? |
A. | Nessus |
B. | Nexpose |
C. | Metasploit |
D. | Nmap |
Answer» E. | |
20. |
The process of finding vulnerabilities and exploiting them using exploitable scripts or programs are known as _____________ |
A. | infiltrating |
B. | exploitation |
C. | cracking |
D. | hacking |
Answer» C. cracking | |
21. |
________________ are piece of programs or scripts that allow hackers to take control over any system. |
A. | Exploits |
B. | Antivirus |
C. | Firewall by-passers |
D. | Worms |
Answer» B. Antivirus | |