 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium. | 
| A. | Malware | 
| B. | Remote Access Trojans | 
| C. | Keyloggers | 
| D. | Spyware | 
| Answer» E. | |
| 2. | _________ are the special type of programs used for recording and tracking user’s keystroke. | 
| A. | Keylogger | 
| B. | Trojans | 
| C. | Virus | 
| D. | Worms | 
| Answer» B. Trojans | |
| 3. | Which method of hacking will record all your keystrokes? | 
| A. | Keyhijacking | 
| B. | Keyjacking | 
| C. | Keylogging | 
| D. | Keyboard monitoring | 
| Answer» D. Keyboard monitoring | |
| 4. | Which of them is not a wireless attack? | 
| A. | Eavesdropping | 
| B. | MAC Spoofing | 
| C. | Wireless Hijacking | 
| D. | Phishing | 
| Answer» E. | |
| 5. | Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________ | 
| A. | Session Hijacking | 
| B. | Session Fixation | 
| C. | Cookie stuffing | 
| D. | Session Spying | 
| Answer» B. Session Fixation | |
| 6. | This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here? | 
| A. | SQL injection | 
| B. | HTML Injection | 
| C. | Cross Site Scripting (XSS) | 
| D. | Cross Site Request Forgery (XSRF) | 
| Answer» D. Cross Site Request Forgery (XSRF) | |
| 7. | WHICH_OF_THEM_IS_NOT_A_WIRELESS_ATTACK??$ | 
| A. | Eavesdropping | 
| B. | MAC Spoofing | 
| C. | Wireless Hijacking | 
| D. | Phishing | 
| Answer» E. | |
| 8. | Which method of hacking will record all your keystrokes?$ | 
| A. | Keyhijacking | 
| B. | Keyjacking | 
| C. | Keylogging | 
| D. | Keyboard monitoring | 
| Answer» D. Keyboard monitoring | |
| 9. | An_attempt_to_harm,_damage_or_cause_threat_to_a_system_or_network_is_broadly_termed_as_______$ | 
| A. | Cyber-crime | 
| B. | Cyber Attack | 
| C. | System hijacking | 
| D. | Digital crime | 
| Answer» C. System hijacking | |
| 10. | ___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain. | 
| A. | Cyber-warfare | 
| B. | Cyber campaign | 
| C. | Cyber-terrorism | 
| D. | Cyber attack | 
| Answer» D. Cyber attack | |
| 11. | Stuxnet is a _________ | 
| A. | Worm | 
| B. | Virus | 
| C. | Trojan | 
| D. | Antivirus | 
| Answer» B. Virus | |
| 12. | These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.$ | 
| A. | Malware | 
| B. | Remote Access Trojans | 
| C. | Keyloggers | 
| D. | Spyware | 
| Answer» E. | |
| 13. | _________ are the special type of programs used for recording and tracking user’s keystroke.$ | 
| A. | Keylogger | 
| B. | Trojans | 
| C. | Virus | 
| D. | Worms | 
| Answer» B. Trojans | |
| 14. | Which of this is an example of physical hacking? | 
| A. | Remote Unauthorised access | 
| B. | Inserting malware loaded USB to a system | 
| C. | SQL Injection on SQL vulnerable site | 
| D. | DDoS (Distributed Denial of Service) attack | 
| Answer» C. SQL Injection on SQL vulnerable site | |
| 15. | Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________$ | 
| A. | Session Hijacking | 
| B. | Session Fixation | 
| C. | Cookie stuffing | 
| D. | Session Spying | 
| Answer» B. Session Fixation | |
| 16. | When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place. | 
| A. | Database crash attack | 
| B. | DoS (Denial of Service) attack | 
| C. | Data overflow Attack | 
| D. | Buffer Overflow attack | 
| Answer» E. | |
| 17. | This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?$ | 
| A. | SQL injection | 
| B. | HTML Injection | 
| C. | Cross Site Scripting (XSS) | 
| D. | Cross Site Request Forgery (XSRF) | 
| Answer» D. Cross Site Request Forgery (XSRF) | |
| 18. | XSS is abbreviated as __________ | 
| A. | Extreme Secure Scripting | 
| B. | Cross Site Security | 
| C. | X Site Scripting | 
| D. | Cross Site Scripting | 
| Answer» E. | |
| 19. | _____________ is a code injecting method used for attacking the database of a system / website. | 
| A. | HTML injection | 
| B. | SQL Injection | 
| C. | Malicious code injection | 
| D. | XML Injection | 
| Answer» C. Malicious code injection | |
| 20. | Who deploy Malwares to a system or network? | 
| A. | Criminal organizations, Black hat hackers, malware developers, cyber-terrorists | 
| B. | Criminal organizations, White hat hackers, malware developers, cyber-terrorists | 
| C. | Criminal organizations, Black hat hackers, software developers, cyber-terrorists | 
| D. | Criminal organizations, gray hat hackers, Malware developers, Penetration testers | 
| Answer» B. Criminal organizations, White hat hackers, malware developers, cyber-terrorists | |
| 21. | The full form of Malware is ________ | 
| A. | Malfunctioned Software | 
| B. | Multipurpose Software | 
| C. | Malicious Software | 
| D. | Malfunctioning of Security | 
| Answer» D. Malfunctioning of Security | |