Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Active sniffing is difficult to detect.

A. True
B. False
C. May be True or False
D. Can't say
Answer» C. May be True or False
2.

_____________ = voice + phishing.

A. Algo-based phishing
B. Vishing
C. Domain Phishing
D. Email-based phishing
Answer» C. Domain Phishing
3.

_____________ refers to phishing performed over smart-phone by calling.

A. Algo-based phishing
B. Email-based phishing
C. Domain Phishing
D. Vishing
Answer» E.
4.

There are ____________ that are designed to track your browsing habits & aim ads that are relevant to the user.

A. plug-ins
B. cache
C. cookies
D. history
Answer» D. history
5.

Some Trojans carry ransomware with them to encrypt the data and ask for ransom.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
6.

Which of the following tech-concepts cannot be sniffed ?

A. Cloud sessions
B. FTP passwords
C. Telnet passwords
D. Chat sessions
Answer» B. FTP passwords
7.

In an _________________ attack, an attacker finds an active session & takes over that session.

A. network session hijacking
B. passive session hijacking
C. active session hijacking
D. social-networking session hijacking
Answer» D. social-networking session hijacking
8.

Which of the following is not an anti-spam technique ?

A. Reputation control
B. Sender policy framework
C. DNS-based block-list
D. Domain-based blocking
Answer» E.
9.

De-compilation is not done for _______________

A. Recovery of lost source code
B. Migration of assembly language
C. Determining the existence of malicious code in any app
D. Targeting users with stealing code
Answer» E.
10.

The threat of backdoors started when ____________ & ____________ OSs became widely accepted.

A. single-user, Windows
B. multiuser, networked
C. single-user, UNIX
D. multiuser, UNIX
Answer» C. single-user, UNIX
11.

Nowadays, most botnets rely on existing _______________ networks for communication.

A. server-to-server
B. peer-to-peer
C. client-to-server
D. host-to-server
Answer» C. client-to-server
12.

The bot program allows the bot-herders to perform all operations from a ___________ location.

A. local
B. open
C. corporate
D. remote
Answer» E.
13.

Infected computers and other systems within the botnet are called __________

A. killers
B. vampires
C. zombies
D. gargoyles
Answer» D. gargoyles
14.

Which of the following is a remote Trojan?

A. Troya
B. DaCryptic
C. BankerA
D. Game-Troj
Answer» B. DaCryptic
15.

__________ is a powerful RAT build using the language Delphi 7.

A. Stuxnet
B. T-Bomb
C. Beast
D. Zeus
Answer» D. Zeus
16.

Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.

A. advertisers
B. dark-market
C. antivirus company
D. share market
Answer» B. dark-market
17.

Which of the below-mentioned protocol is not susceptible to sniffing ?

A. NNTP
B. UDP
C. FTP
D. IMAP
Answer» C. FTP
18.

Backdoors are also known as ______________

A. Malware-doors
B. Trojan-backups
C. Front-doors
D. Trapdoors
Answer» E.
19.

Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.

A. virus, cyber-criminals
B. malware, penetration testers
C. trojans, cyber-criminals
D. virus, penetration testers
Answer» D. virus, penetration testers
20.

Which of the following is not an example of web application hacking?

A. Defacing websites
B. Stealing credit card information
C. Reverse engineering PC apps
D. Exploiting server-side scripting
Answer» D. Exploiting server-side scripting
21.

Which of the following scripting language is used for injecting executable malicious code for web-app hacking?

A. C++
B. Tcl
C. Frame-Script
D. JavaScript
Answer» E.
22.

___________________ is usually targeted by nature where the emails are exclusively designed to target any exact user.

A. Algo-based phishing
B. Vishing
C. Domain Phishing
D. Spear phishing
Answer» E.
23.

The word “botnet” is a blend of the words _____________ & ___________

A. robot, network
B. rocket, network
C. bot, network
D. bot, internet
Answer» B. rocket, network
24.

Which of the following is not a bulk emailing tool ?

A. Fairlogic Worldcast
B. 123 Hidden sender
C. YL Mail Man
D. NetCut
Answer» E.
25.

Which of the following is not a feature of IDAPro?

A. Instant debugging
B. Connect local and remote systems easily
C. Explore in-depth binary data
D. Convert machine language to high-level code
Answer» E.
26.

Algorithm-Based Phishing was developed in the year __________

A. 1988
B. 1989
C. 1990
D. 1991
Answer» D. 1991
27.

_______________deals with the protection of an individual’s information which is implemented while using the Internet on any computer or personal device.

A. Digital agony
B. Digital privacy
C. Digital secrecy
D. Digital protection
Answer» C. Digital secrecy
28.

______________ takes advantage if hidden fields that work as the only security measure in some applications.

A. Parameter tampering
B. Data tampering
C. Tampering of network topology
D. Protocol tampering
Answer» B. Data tampering
29.

A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system’s hardware.

A. crypter
B. virus
C. backdoor
D. key-logger
Answer» D. key-logger
30.

The _______________ matches and maps to the user friendly domain name.

A. HTTP
B. DNS
C. WWW
D. ISP
Answer» C. WWW
31.

______________ tool clears the log entries in the IIS log files filtered by an IP address.

A. CleanIISLoging
B. CleanLogger
C. CleanIISLog
D. ClearIISLog
Answer» D. ClearIISLog
32.

If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.

A. passwords
B. email ID
C. name
D. address
Answer» B. email ID
33.

Which of the following is not a decompiler tool?

A. DCC decompiler
B. Borol and C
C. Boomerang Decompiler
D. ExeToC
Answer» C. Boomerang Decompiler
34.

There are ______ types of DoS attack.

A. 2
B. 3
C. 4
D. 5
Answer» B. 3
35.

The data transferred between your device & the server is securely _____________ if you’re using VPNs.

A. locked
B. sealed
C. packed
D. encrypted
Answer» E.
36.

Application layer DoS attack is also known as _______________

A. Layer4 DoS attack
B. Layer5 DoS attack
C. Layer6 DoS attack
D. Layer7 DoS attack
Answer» E.
37.

Which of the following browser is used for Privacy purpose?

A. Chrome
B. Firefox
C. Opera
D. Tor
Answer» E.
38.

It is necessary to use ________________ for maintaining searched data privacy.

A. Private email services
B. Private search engines
C. Tor Browser
D. Private Browser window
Answer» C. Tor Browser
39.

The Tor browser protects your privacy by bouncing your connection and links around a distributed network over the globe run by volunteers. It gives three layers of anonymity.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
40.

____________ or smishing is one of the simplest types of phishing where the target victims may get a fake order detail with a cancellation link.

A. Algo-based phishing
B. SMS phishing
C. Domain Phishing
D. Spear phishing
Answer» C. Domain Phishing
41.

Which of the following is not a bulk emailing tool?

A. Wireshark
B. Sendblaster
C. Direct Sender
D. Hotmailer
Answer» B. Sendblaster
42.

________________ does not attempt to reverse the actions of compiler; rather it transforms the input program repeatedly until HLL code is achieved.

A. Debugger
B. Hex Editor
C. Disassembler
D. Decompiler
Answer» E.
43.

Which of the following type of data, phishers cannot steal from its target victims?

A. bank details
B. phone number
C. passwords
D. apps installed in the mobile
Answer» E.
44.

Which of the following is not a type of application layer DoS?

A. HTTP flooding
B. Slowloris
C. TCP flooding
D. DNS query flooding
Answer» D. DNS query flooding
45.

______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.

A. Phishing attack
B. DoS attack
C. Website attack
D. MiTM attack
Answer» B. DoS attack
46.

Phishers often develop ______________ websites for tricking users & filling their personal data.

A. legitimate
B. illegitimate
C. genuine
D. official
Answer» C. genuine
47.

In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.

A. URL Redirection
B. DoS
C. Phishing
D. MiTM attack
Answer» D. MiTM attack
48.

Which of the following term is not a valid terminology and type of adware?

A. Mobile adware
B. Mac Adware
C. Smart-home adware
D. Windows adware
Answer» D. Windows adware
49.

_____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes.

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» E.
50.

Which of the following is not an appropriate method of defacing web server ?

A. Mail server intrusion
B. Web application bugs
C. Web shares misconfiguration
D. Sessions hijacking
Answer» E.