 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | ____________ work in background & keeps on downloading other malicious programs when the system is online. | 
| A. | DDoS-Trojan | 
| B. | Backdoor Trojan | 
| C. | Trojan-Banker | 
| D. | Trojan-Downloader | 
| Answer» E. | |
| 2. | Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 3. | ______________ perform automated DoS (Denial of Service) attacks on a targeted web address. | 
| A. | DDoS-Trojan | 
| B. | Backdoor Trojan | 
| C. | Trojan-Banker | 
| D. | Trojan-Downloader | 
| E. | attacks on a targeted web address.a) DDoS-Trojanb) Backdoor Trojanc) Trojan-Bankerd) Trojan-Downloader | 
| Answer» B. Backdoor Trojan | |
| 4. | _______________ programs are specially designed for stealing your account data for online banking systems, e-payment services & credit/debit cards. | 
| A. | DDoS-Trojan | 
| B. | Backdoor Trojan | 
| C. | Trojan-Banker | 
| D. | Trojan-Downloader | 
| Answer» D. Trojan-Downloader | |
| 5. | A _______________ provides malicious users remote control over the targeted computer. | 
| A. | DDoS-Trojan | 
| B. | Backdoor Trojan | 
| C. | Trojan-Banker | 
| D. | Trojan-Downloader | 
| Answer» C. Trojan-Banker | |
| 6. | Trojans can not ______________ | 
| A. | steal data | 
| B. | self-replicate | 
| C. | steal financial information | 
| D. | steal login credentials | 
| Answer» C. steal financial information | |
| 7. | Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system. | 
| A. | virus, cyber-criminals | 
| B. | malware, penetration testers | 
| C. | trojans, cyber-criminals | 
| D. | virus, penetration testers | 
| Answer» D. virus, penetration testers | |
| 8. | Some Trojans carry ransomware with them to encrypt the data and ask for ransom. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 9. | Trojans do not do one of the following. What is that? | 
| A. | Deleting Data | 
| B. | Protecting Data | 
| C. | Modifying Data | 
| D. | Copying Data | 
| Answer» C. Modifying Data | |
| 10. | Which of the following port is not used by Trojans? | 
| A. | UDP | 
| B. | TCP | 
| C. | SMTP | 
| D. | MP | 
| Answer» E. | |
| 11. | Which of them is not a proper way of getting into the system? | 
| A. | IM | 
| B. | Attachments | 
| C. | Official product sites | 
| D. | Un-trusted sites, freeware and pirated software | 
| Answer» D. Un-trusted sites, freeware and pirated software | |
| 12. | Trojan creators do not look for _______________ | 
| A. | Credit card information | 
| B. | Confidential data | 
| C. | Important documents | 
| D. | Securing systems with such programs | 
| Answer» E. | |
| 13. | By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background. | 
| A. | Trojan | 
| B. | Virus | 
| C. | Antivirus | 
| D. | Anti-malware | 
| Answer» B. Virus | |
| 14. | ____________ works in background and steals sensitive data. | 
| A. | Virus | 
| B. | Shareware | 
| C. | Trojan | 
| D. | Adware | 
| Answer» D. Adware | |
| 15. | A ___________ is a small malicious program that runs hidden on infected system. | 
| A. | Virus | 
| B. | Trojan | 
| C. | Shareware | 
| D. | Adware | 
| Answer» C. Shareware | |