

MCQOPTIONS
Saved Bookmarks
This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium. |
A. | Malware |
B. | Remote Access Trojans |
C. | Keyloggers |
D. | Spyware |
Answer» E. | |
2. |
_________ are the special type of programs used for recording and tracking user’s keystroke. |
A. | Keylogger |
B. | Trojans |
C. | Virus |
D. | Worms |
Answer» B. Trojans | |
3. |
Which method of hacking will record all your keystrokes? |
A. | Keyhijacking |
B. | Keyjacking |
C. | Keylogging |
D. | Keyboard monitoring |
Answer» D. Keyboard monitoring | |
4. |
Which of them is not a wireless attack? |
A. | Eavesdropping |
B. | MAC Spoofing |
C. | Wireless Hijacking |
D. | Phishing |
Answer» E. | |
5. |
Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________ |
A. | Session Hijacking |
B. | Session Fixation |
C. | Cookie stuffing |
D. | Session Spying |
Answer» B. Session Fixation | |
6. |
This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here? |
A. | SQL injection |
B. | HTML Injection |
C. | Cross Site Scripting (XSS) |
D. | Cross Site Request Forgery (XSRF) |
Answer» D. Cross Site Request Forgery (XSRF) | |
7. |
WHICH_OF_THEM_IS_NOT_A_WIRELESS_ATTACK??$ |
A. | Eavesdropping |
B. | MAC Spoofing |
C. | Wireless Hijacking |
D. | Phishing |
Answer» E. | |
8. |
Which method of hacking will record all your keystrokes?$ |
A. | Keyhijacking |
B. | Keyjacking |
C. | Keylogging |
D. | Keyboard monitoring |
Answer» D. Keyboard monitoring | |
9. |
An_attempt_to_harm,_damage_or_cause_threat_to_a_system_or_network_is_broadly_termed_as_______$ |
A. | Cyber-crime |
B. | Cyber Attack |
C. | System hijacking |
D. | Digital crime |
Answer» C. System hijacking | |
10. |
___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain. |
A. | Cyber-warfare |
B. | Cyber campaign |
C. | Cyber-terrorism |
D. | Cyber attack |
Answer» D. Cyber attack | |
11. |
Stuxnet is a _________ |
A. | Worm |
B. | Virus |
C. | Trojan |
D. | Antivirus |
Answer» B. Virus | |
12. |
These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.$ |
A. | Malware |
B. | Remote Access Trojans |
C. | Keyloggers |
D. | Spyware |
Answer» E. | |
13. |
_________ are the special type of programs used for recording and tracking user’s keystroke.$ |
A. | Keylogger |
B. | Trojans |
C. | Virus |
D. | Worms |
Answer» B. Trojans | |
14. |
Which of this is an example of physical hacking? |
A. | Remote Unauthorised access |
B. | Inserting malware loaded USB to a system |
C. | SQL Injection on SQL vulnerable site |
D. | DDoS (Distributed Denial of Service) attack |
Answer» C. SQL Injection on SQL vulnerable site | |
15. |
Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________$ |
A. | Session Hijacking |
B. | Session Fixation |
C. | Cookie stuffing |
D. | Session Spying |
Answer» B. Session Fixation | |
16. |
When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place. |
A. | Database crash attack |
B. | DoS (Denial of Service) attack |
C. | Data overflow Attack |
D. | Buffer Overflow attack |
Answer» E. | |
17. |
This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?$ |
A. | SQL injection |
B. | HTML Injection |
C. | Cross Site Scripting (XSS) |
D. | Cross Site Request Forgery (XSRF) |
Answer» D. Cross Site Request Forgery (XSRF) | |
18. |
XSS is abbreviated as __________ |
A. | Extreme Secure Scripting |
B. | Cross Site Security |
C. | X Site Scripting |
D. | Cross Site Scripting |
Answer» E. | |
19. |
_____________ is a code injecting method used for attacking the database of a system / website. |
A. | HTML injection |
B. | SQL Injection |
C. | Malicious code injection |
D. | XML Injection |
Answer» C. Malicious code injection | |
20. |
Who deploy Malwares to a system or network? |
A. | Criminal organizations, Black hat hackers, malware developers, cyber-terrorists |
B. | Criminal organizations, White hat hackers, malware developers, cyber-terrorists |
C. | Criminal organizations, Black hat hackers, software developers, cyber-terrorists |
D. | Criminal organizations, gray hat hackers, Malware developers, Penetration testers |
Answer» B. Criminal organizations, White hat hackers, malware developers, cyber-terrorists | |
21. |
The full form of Malware is ________ |
A. | Malfunctioned Software |
B. | Multipurpose Software |
C. | Malicious Software |
D. | Malfunctioning of Security |
Answer» D. Malfunctioning of Security | |