

MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
____________ work in background & keeps on downloading other malicious programs when the system is online. |
A. | DDoS-Trojan |
B. | Backdoor Trojan |
C. | Trojan-Banker |
D. | Trojan-Downloader |
Answer» E. | |
2. |
Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs. |
A. | True |
B. | False |
Answer» B. False | |
3. |
______________ perform automated DoS (Denial of Service) attacks on a targeted web address. |
A. | DDoS-Trojan |
B. | Backdoor Trojan |
C. | Trojan-Banker |
D. | Trojan-Downloader |
E. | attacks on a targeted web address.a) DDoS-Trojanb) Backdoor Trojanc) Trojan-Bankerd) Trojan-Downloader |
Answer» B. Backdoor Trojan | |
4. |
_______________ programs are specially designed for stealing your account data for online banking systems, e-payment services & credit/debit cards. |
A. | DDoS-Trojan |
B. | Backdoor Trojan |
C. | Trojan-Banker |
D. | Trojan-Downloader |
Answer» D. Trojan-Downloader | |
5. |
A _______________ provides malicious users remote control over the targeted computer. |
A. | DDoS-Trojan |
B. | Backdoor Trojan |
C. | Trojan-Banker |
D. | Trojan-Downloader |
Answer» C. Trojan-Banker | |
6. |
Trojans can not ______________ |
A. | steal data |
B. | self-replicate |
C. | steal financial information |
D. | steal login credentials |
Answer» C. steal financial information | |
7. |
Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system. |
A. | virus, cyber-criminals |
B. | malware, penetration testers |
C. | trojans, cyber-criminals |
D. | virus, penetration testers |
Answer» D. virus, penetration testers | |
8. |
Some Trojans carry ransomware with them to encrypt the data and ask for ransom. |
A. | True |
B. | False |
Answer» B. False | |
9. |
Trojans do not do one of the following. What is that? |
A. | Deleting Data |
B. | Protecting Data |
C. | Modifying Data |
D. | Copying Data |
Answer» C. Modifying Data | |
10. |
Which of the following port is not used by Trojans? |
A. | UDP |
B. | TCP |
C. | SMTP |
D. | MP |
Answer» E. | |
11. |
Which of them is not a proper way of getting into the system? |
A. | IM |
B. | Attachments |
C. | Official product sites |
D. | Un-trusted sites, freeware and pirated software |
Answer» D. Un-trusted sites, freeware and pirated software | |
12. |
Trojan creators do not look for _______________ |
A. | Credit card information |
B. | Confidential data |
C. | Important documents |
D. | Securing systems with such programs |
Answer» E. | |
13. |
By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background. |
A. | Trojan |
B. | Virus |
C. | Antivirus |
D. | Anti-malware |
Answer» B. Virus | |
14. |
____________ works in background and steals sensitive data. |
A. | Virus |
B. | Shareware |
C. | Trojan |
D. | Adware |
Answer» D. Adware | |
15. |
A ___________ is a small malicious program that runs hidden on infected system. |
A. | Virus |
B. | Trojan |
C. | Shareware |
D. | Adware |
Answer» C. Shareware | |