MCQOPTIONS
Saved Bookmarks
This section includes 128 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
Strangers cannot cause much trouble if we connect to them over social media. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» C. May be True or False | |
| 102. |
Which of the following is not an example of DNS hijacking? |
| A. | ISP DNS hijacking |
| B. | DNS hijacking for phishing |
| C. | DNS hijacking for pharming |
| D. | HTTP-based DNS hacking |
| Answer» E. | |
| 103. |
_____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access. |
| A. | IM – Trojans |
| B. | Backdoor Trojans |
| C. | Trojan-Downloader |
| D. | Ransom Trojan |
| Answer» E. | |
| 104. |
The __________________ protects your privacy by bouncing your connection and links around a distributed network over the globe run by volunteers. It gives three layers of anonymity. |
| A. | Cookie removers |
| B. | Private Search Engines |
| C. | Tor browser |
| D. | VPNs |
| Answer» D. VPNs | |
| 105. |
________________ phishing is that type of phishing where the construction of a fake webpage is done for targeting definite keywords & waiting for the searcher to land on the fake webpage. |
| A. | Voice |
| B. | SMS |
| C. | Search engine |
| D. | |
| Answer» D. Email | |
| 106. |
_____________ can be attained by the use of malware or by changing the server’s settings. |
| A. | DNS poisoning |
| B. | DNS cracking |
| C. | DNS hijacking |
| D. | DNS redirecting |
| Answer» D. DNS redirecting | |
| 107. |
_____________ will not recreate the original source file created by the compiler. |
| A. | Debugger |
| B. | Hex Editor |
| C. | Decompiler |
| D. | Disassembler |
| Answer» D. Disassembler | |
| 108. |
XSS stands for _________________ |
| A. | Crack Site Scripting |
| B. | Cross Site Server |
| C. | Cross Site Scripting |
| D. | Crack Server Scripting |
| Answer» D. Crack Server Scripting | |
| 109. |
The ______________ hijacking is implemented on the data flow of protocol shared by all web applications. |
| A. | network level |
| B. | physical level |
| C. | application level |
| D. | data level |
| Answer» B. physical level | |
| 110. |
Which of the following is not an example or type of phishing? |
| A. | Spear phishing |
| B. | Deceptive phishing |
| C. | Whaling |
| D. | Monkey in the Middle |
| Answer» E. | |
| 111. |
___________ is a type of DoS threats to overload a server as it sends a large number of requests requiring resources for handling & processing. |
| A. | Network Layer DoS |
| B. | Physical Layer DoS |
| C. | Transport Layer DoS |
| D. | Application Layer DoS |
| Answer» E. | |
| 112. |
Which of the following is not a sniffing tool? |
| A. | Wireshark |
| B. | Dude Sniffer |
| C. | Maltego |
| D. | Look@LAN |
| Answer» D. Look@LAN | |
| 113. |
Which of the following is not an appropriate countermeasure for web server hacking ? |
| A. | Using OS or antivirus without updates |
| B. | Scan web server applications for vulnerabilities |
| C. | Using secure protocols |
| D. | Follow strict access control policy |
| Answer» B. Scan web server applications for vulnerabilities | |
| 114. |
Which among the following is not a symptom of your system compromised with adware? |
| A. | Website links redirect to sites unlike from what user is intended |
| B. | Web browser acts slows to a crawl |
| C. | System takes restarts frequently |
| D. | The browser might crash frequently |
| Answer» D. The browser might crash frequently | |
| 115. |
A ______________ is essentially a text file residing on the server that hosts different domain containing entries for dissimilar resource records. |
| A. | Zone file |
| B. | Robot file |
| C. | Bot file |
| D. | DNS file |
| Answer» B. Robot file | |
| 116. |
The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources of the target website. |
| A. | Phishing attack |
| B. | DoS attack |
| C. | Website attack |
| D. | MiTM attack |
| Answer» C. Website attack | |
| 117. |
In _______________ attack, the attacker doesn’t actively take over another user to perform the attack. |
| A. | phishing |
| B. | spoofing |
| C. | hijacking |
| D. | vishing |
| Answer» C. hijacking | |
| 118. |
_________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator. |
| A. | Ad-based spyware |
| B. | System Monitors |
| C. | Spy-trojans |
| D. | Tracking cookies |
| Answer» D. Tracking cookies | |
| 119. |
Which of the following is not a function or use of disassembler? |
| A. | Extracting functions & libraries |
| B. | Extracting strings and values |
| C. | Assemble medium-level codes |
| D. | Dissect binary codes |
| Answer» D. Dissect binary codes | |
| 120. |
A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 121. |
______________ can be defined as the duplication of another creator’s or developer’s product trailing a thorough examination of its production or development. |
| A. | Reverse hacking |
| B. | Cracking |
| C. | Social engineering |
| D. | Reverse engineering |
| Answer» E. | |
| 122. |
Creators of _____________ also sell your browsing behaviour & information to 3rd parties. |
| A. | Shareware |
| B. | Spyware |
| C. | URL |
| D. | Adware |
| Answer» E. | |
| 123. |
_________________ type of phishing became very popular as if it has been sent from a legitimate source with a legitimate link to its official website. |
| A. | Algo-based phishing |
| B. | Email-based phishing |
| C. | Domain Phishing |
| D. | Vishing |
| Answer» C. Domain Phishing | |
| 124. |
Which of the following is not a disassembler tool? |
| A. | IDA Pro |
| B. | PE Explorer |
| C. | Turbo C |
| D. | W32DASM |
| Answer» D. W32DASM | |
| 125. |
A _____________ takes executable file as input and tries to generate high level code. |
| A. | Debugger |
| B. | Decompiler |
| C. | Disassembler |
| D. | Hex Editor |
| Answer» C. Disassembler | |
| 126. |
Direct Action Virus is also known as ___________ |
| A. | Non-resident virus |
| B. | Boot Sector Virus |
| C. | Polymorphic Virus |
| D. | Multipartite Virus |
| Answer» B. Boot Sector Virus | |
| 127. |
________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects. |
| A. | Boot Sector Virus |
| B. | Direct Action Virus |
| C. | Polymorphic Virus |
| D. | Multipartite Virus |
| Answer» C. Polymorphic Virus | |
| 128. |
In mid-1981, the 1st virus for Apple computers with the name _________ came into existence. |
| A. | Apple I |
| B. | Apple II |
| C. | Apple III |
| D. | Apple Virus |
| Answer» C. Apple III | |