Explore topic-wise MCQs in Cyber Security.

This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

____________ work in background & keeps on downloading other malicious programs when the system is online.

A. DDoS-Trojan
B. Backdoor Trojan
C. Trojan-Banker
D. Trojan-Downloader
Answer» E.
2.

Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs.

A. True
B. False
Answer» B. False
3.

______________ perform automated DoS (Denial of Service) attacks on a targeted web address.

A. DDoS-Trojan
B. Backdoor Trojan
C. Trojan-Banker
D. Trojan-Downloader
E. attacks on a targeted web address.a) DDoS-Trojanb) Backdoor Trojanc) Trojan-Bankerd) Trojan-Downloader
Answer» B. Backdoor Trojan
4.

_______________ programs are specially designed for stealing your account data for online banking systems, e-payment services & credit/debit cards.

A. DDoS-Trojan
B. Backdoor Trojan
C. Trojan-Banker
D. Trojan-Downloader
Answer» D. Trojan-Downloader
5.

A _______________ provides malicious users remote control over the targeted computer.

A. DDoS-Trojan
B. Backdoor Trojan
C. Trojan-Banker
D. Trojan-Downloader
Answer» C. Trojan-Banker
6.

Trojans can not ______________

A. steal data
B. self-replicate
C. steal financial information
D. steal login credentials
Answer» C. steal financial information
7.

Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.

A. virus, cyber-criminals
B. malware, penetration testers
C. trojans, cyber-criminals
D. virus, penetration testers
Answer» D. virus, penetration testers
8.

Some Trojans carry ransomware with them to encrypt the data and ask for ransom.

A. True
B. False
Answer» B. False
9.

Trojans do not do one of the following. What is that?

A. Deleting Data
B. Protecting Data
C. Modifying Data
D. Copying Data
Answer» C. Modifying Data
10.

Which of the following port is not used by Trojans?

A. UDP
B. TCP
C. SMTP
D. MP
Answer» E.
11.

Which of them is not a proper way of getting into the system?

A. IM
B. Attachments
C. Official product sites
D. Un-trusted sites, freeware and pirated software
Answer» D. Un-trusted sites, freeware and pirated software
12.

Trojan creators do not look for _______________

A. Credit card information
B. Confidential data
C. Important documents
D. Securing systems with such programs
Answer» E.
13.

By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.

A. Trojan
B. Virus
C. Antivirus
D. Anti-malware
Answer» B. Virus
14.

____________ works in background and steals sensitive data.

A. Virus
B. Shareware
C. Trojan
D. Adware
Answer» D. Adware
15.

A ___________ is a small malicious program that runs hidden on infected system.

A. Virus
B. Trojan
C. Shareware
D. Adware
Answer» C. Shareware