MCQOPTIONS
Saved Bookmarks
This section includes 128 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Active sniffing is difficult to detect. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» C. May be True or False | |
| 52. |
_____________ = voice + phishing. |
| A. | Algo-based phishing |
| B. | Vishing |
| C. | Domain Phishing |
| D. | Email-based phishing |
| Answer» C. Domain Phishing | |
| 53. |
_____________ refers to phishing performed over smart-phone by calling. |
| A. | Algo-based phishing |
| B. | Email-based phishing |
| C. | Domain Phishing |
| D. | Vishing |
| Answer» E. | |
| 54. |
There are ____________ that are designed to track your browsing habits & aim ads that are relevant to the user. |
| A. | plug-ins |
| B. | cache |
| C. | cookies |
| D. | history |
| Answer» D. history | |
| 55. |
Some Trojans carry ransomware with them to encrypt the data and ask for ransom. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 56. |
Which of the following tech-concepts cannot be sniffed ? |
| A. | Cloud sessions |
| B. | FTP passwords |
| C. | Telnet passwords |
| D. | Chat sessions |
| Answer» B. FTP passwords | |
| 57. |
In an _________________ attack, an attacker finds an active session & takes over that session. |
| A. | network session hijacking |
| B. | passive session hijacking |
| C. | active session hijacking |
| D. | social-networking session hijacking |
| Answer» D. social-networking session hijacking | |
| 58. |
Which of the following is not an anti-spam technique ? |
| A. | Reputation control |
| B. | Sender policy framework |
| C. | DNS-based block-list |
| D. | Domain-based blocking |
| Answer» E. | |
| 59. |
De-compilation is not done for _______________ |
| A. | Recovery of lost source code |
| B. | Migration of assembly language |
| C. | Determining the existence of malicious code in any app |
| D. | Targeting users with stealing code |
| Answer» E. | |
| 60. |
The threat of backdoors started when ____________ & ____________ OSs became widely accepted. |
| A. | single-user, Windows |
| B. | multiuser, networked |
| C. | single-user, UNIX |
| D. | multiuser, UNIX |
| Answer» C. single-user, UNIX | |
| 61. |
Nowadays, most botnets rely on existing _______________ networks for communication. |
| A. | server-to-server |
| B. | peer-to-peer |
| C. | client-to-server |
| D. | host-to-server |
| Answer» C. client-to-server | |
| 62. |
The bot program allows the bot-herders to perform all operations from a ___________ location. |
| A. | local |
| B. | open |
| C. | corporate |
| D. | remote |
| Answer» E. | |
| 63. |
Infected computers and other systems within the botnet are called __________ |
| A. | killers |
| B. | vampires |
| C. | zombies |
| D. | gargoyles |
| Answer» D. gargoyles | |
| 64. |
Which of the following is a remote Trojan? |
| A. | Troya |
| B. | DaCryptic |
| C. | BankerA |
| D. | Game-Troj |
| Answer» B. DaCryptic | |
| 65. |
__________ is a powerful RAT build using the language Delphi 7. |
| A. | Stuxnet |
| B. | T-Bomb |
| C. | Beast |
| D. | Zeus |
| Answer» D. Zeus | |
| 66. |
Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator. |
| A. | advertisers |
| B. | dark-market |
| C. | antivirus company |
| D. | share market |
| Answer» B. dark-market | |
| 67. |
Which of the below-mentioned protocol is not susceptible to sniffing ? |
| A. | NNTP |
| B. | UDP |
| C. | FTP |
| D. | IMAP |
| Answer» C. FTP | |
| 68. |
Backdoors are also known as ______________ |
| A. | Malware-doors |
| B. | Trojan-backups |
| C. | Front-doors |
| D. | Trapdoors |
| Answer» E. | |
| 69. |
Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system. |
| A. | virus, cyber-criminals |
| B. | malware, penetration testers |
| C. | trojans, cyber-criminals |
| D. | virus, penetration testers |
| Answer» D. virus, penetration testers | |
| 70. |
Which of the following is not an example of web application hacking? |
| A. | Defacing websites |
| B. | Stealing credit card information |
| C. | Reverse engineering PC apps |
| D. | Exploiting server-side scripting |
| Answer» D. Exploiting server-side scripting | |
| 71. |
Which of the following scripting language is used for injecting executable malicious code for web-app hacking? |
| A. | C++ |
| B. | Tcl |
| C. | Frame-Script |
| D. | JavaScript |
| Answer» E. | |
| 72. |
___________________ is usually targeted by nature where the emails are exclusively designed to target any exact user. |
| A. | Algo-based phishing |
| B. | Vishing |
| C. | Domain Phishing |
| D. | Spear phishing |
| Answer» E. | |
| 73. |
The word “botnet” is a blend of the words _____________ & ___________ |
| A. | robot, network |
| B. | rocket, network |
| C. | bot, network |
| D. | bot, internet |
| Answer» B. rocket, network | |
| 74. |
Which of the following is not a bulk emailing tool ? |
| A. | Fairlogic Worldcast |
| B. | 123 Hidden sender |
| C. | YL Mail Man |
| D. | NetCut |
| Answer» E. | |
| 75. |
Which of the following is not a feature of IDAPro? |
| A. | Instant debugging |
| B. | Connect local and remote systems easily |
| C. | Explore in-depth binary data |
| D. | Convert machine language to high-level code |
| Answer» E. | |
| 76. |
Algorithm-Based Phishing was developed in the year __________ |
| A. | 1988 |
| B. | 1989 |
| C. | 1990 |
| D. | 1991 |
| Answer» D. 1991 | |
| 77. |
_______________deals with the protection of an individual’s information which is implemented while using the Internet on any computer or personal device. |
| A. | Digital agony |
| B. | Digital privacy |
| C. | Digital secrecy |
| D. | Digital protection |
| Answer» C. Digital secrecy | |
| 78. |
______________ takes advantage if hidden fields that work as the only security measure in some applications. |
| A. | Parameter tampering |
| B. | Data tampering |
| C. | Tampering of network topology |
| D. | Protocol tampering |
| Answer» B. Data tampering | |
| 79. |
A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system’s hardware. |
| A. | crypter |
| B. | virus |
| C. | backdoor |
| D. | key-logger |
| Answer» D. key-logger | |
| 80. |
The _______________ matches and maps to the user friendly domain name. |
| A. | HTTP |
| B. | DNS |
| C. | WWW |
| D. | ISP |
| Answer» C. WWW | |
| 81. |
______________ tool clears the log entries in the IIS log files filtered by an IP address. |
| A. | CleanIISLoging |
| B. | CleanLogger |
| C. | CleanIISLog |
| D. | ClearIISLog |
| Answer» D. ClearIISLog | |
| 82. |
If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser. |
| A. | passwords |
| B. | email ID |
| C. | name |
| D. | address |
| Answer» B. email ID | |
| 83. |
Which of the following is not a decompiler tool? |
| A. | DCC decompiler |
| B. | Borol and C |
| C. | Boomerang Decompiler |
| D. | ExeToC |
| Answer» C. Boomerang Decompiler | |
| 84. |
There are ______ types of DoS attack. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» B. 3 | |
| 85. |
The data transferred between your device & the server is securely _____________ if you’re using VPNs. |
| A. | locked |
| B. | sealed |
| C. | packed |
| D. | encrypted |
| Answer» E. | |
| 86. |
Application layer DoS attack is also known as _______________ |
| A. | Layer4 DoS attack |
| B. | Layer5 DoS attack |
| C. | Layer6 DoS attack |
| D. | Layer7 DoS attack |
| Answer» E. | |
| 87. |
Which of the following browser is used for Privacy purpose? |
| A. | Chrome |
| B. | Firefox |
| C. | Opera |
| D. | Tor |
| Answer» E. | |
| 88. |
It is necessary to use ________________ for maintaining searched data privacy. |
| A. | Private email services |
| B. | Private search engines |
| C. | Tor Browser |
| D. | Private Browser window |
| Answer» C. Tor Browser | |
| 89. |
The Tor browser protects your privacy by bouncing your connection and links around a distributed network over the globe run by volunteers. It gives three layers of anonymity. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 90. |
____________ or smishing is one of the simplest types of phishing where the target victims may get a fake order detail with a cancellation link. |
| A. | Algo-based phishing |
| B. | SMS phishing |
| C. | Domain Phishing |
| D. | Spear phishing |
| Answer» C. Domain Phishing | |
| 91. |
Which of the following is not a bulk emailing tool? |
| A. | Wireshark |
| B. | Sendblaster |
| C. | Direct Sender |
| D. | Hotmailer |
| Answer» B. Sendblaster | |
| 92. |
________________ does not attempt to reverse the actions of compiler; rather it transforms the input program repeatedly until HLL code is achieved. |
| A. | Debugger |
| B. | Hex Editor |
| C. | Disassembler |
| D. | Decompiler |
| Answer» E. | |
| 93. |
Which of the following type of data, phishers cannot steal from its target victims? |
| A. | bank details |
| B. | phone number |
| C. | passwords |
| D. | apps installed in the mobile |
| Answer» E. | |
| 94. |
Which of the following is not a type of application layer DoS? |
| A. | HTTP flooding |
| B. | Slowloris |
| C. | TCP flooding |
| D. | DNS query flooding |
| Answer» D. DNS query flooding | |
| 95. |
______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information. |
| A. | Phishing attack |
| B. | DoS attack |
| C. | Website attack |
| D. | MiTM attack |
| Answer» B. DoS attack | |
| 96. |
Phishers often develop ______________ websites for tricking users & filling their personal data. |
| A. | legitimate |
| B. | illegitimate |
| C. | genuine |
| D. | official |
| Answer» C. genuine | |
| 97. |
In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware. |
| A. | URL Redirection |
| B. | DoS |
| C. | Phishing |
| D. | MiTM attack |
| Answer» D. MiTM attack | |
| 98. |
Which of the following term is not a valid terminology and type of adware? |
| A. | Mobile adware |
| B. | Mac Adware |
| C. | Smart-home adware |
| D. | Windows adware |
| Answer» D. Windows adware | |
| 99. |
_____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes. |
| A. | Ad-based spyware |
| B. | System Monitors |
| C. | Spy-trojans |
| D. | Tracking cookies |
| Answer» E. | |
| 100. |
Which of the following is not an appropriate method of defacing web server ? |
| A. | Mail server intrusion |
| B. | Web application bugs |
| C. | Web shares misconfiguration |
| D. | Sessions hijacking |
| Answer» E. | |