

MCQOPTIONS
Saved Bookmarks
This section includes 128 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
_____________ are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser. |
A. | Shareware |
B. | Adware |
C. | Bloatware |
D. | Ransomware |
Answer» C. Bloatware | |
2. |
Which one is not an example of .Net application decompiler? |
A. | Salamander |
B. | Dis# |
C. | Decompiler.Net |
D. | MultiRipper |
Answer» E. | |
3. |
________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user. |
A. | Shareware |
B. | Spyware |
C. | Ransomware |
D. | Freeware |
Answer» C. Ransomware | |
4. |
There are __________ main types of spyware. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 | |
5. |
________ Injection attack is a special attack done through character elements “Carriage Return” or “Line Feed.” Exploitation can be done when an attacker is capable to inject a CRLF series in an HTTP stream. |
A. | XSS |
B. | CSRF |
C. | CRLF |
D. | SQL |
Answer» D. SQL | |
6. |
Session hijacking takes place at ____________ number of levels. |
A. | five |
B. | four |
C. | three |
D. | two |
Answer» E. | |
7. |
Which of the following example do not comes under network level session hijacking. |
A. | TCP/IP Hijacking |
B. | RST Hijacking |
C. | Domain Hijacking |
D. | Blind Hijacking |
Answer» D. Blind Hijacking | |
8. |
Which of the following is not a threat of web application? |
A. | Reverse engineering |
B. | Command injection |
C. | DMZ protocol attack |
D. | Buffer Overflow |
Answer» B. Command injection | |
9. |
______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet. |
A. | DNS poisoning |
B. | DNS re-routing |
C. | DNS cracking |
D. | Domain link poisoning |
Answer» B. DNS re-routing | |
10. |
Which of the following is not a threat of web application ? |
A. | Session poisoning |
B. | Phishing |
C. | Cryptographic interception |
D. | Cookie snooping |
Answer» C. Cryptographic interception | |
11. |
Keeping browsing habits & aiming specific ads to you is harmless but it might reduce your online privacy. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
12. |
DNS poisoning is very dangerous because it can extend its reach from one ___________ to another. |
A. | ISP server |
B. | DNS server |
C. | Linux server |
D. | Domain user |
Answer» C. Linux server | |
13. |
_____________ tracks your data and displays those products as ads for promotions. |
A. | Ad-based spyware |
B. | System Monitors |
C. | Spy-trojans |
D. | Tracking cookies |
Answer» B. System Monitors | |
14. |
Which of the following is not an appropriate method of web application hacking? |
A. | XSS |
B. | CSRF |
C. | SQLi |
D. | Brute-force |
Answer» E. | |
15. |
Which of the following activity is not done by spyware ? |
A. | Monitors your internet activity |
B. | Track user’s login details and passwords |
C. | Uninstalls your mobile browser |
D. | Spy on sensitive information |
Answer» D. Spy on sensitive information | |
16. |
REC stands for ________________ |
A. | Reverse Engineering Compiler |
B. | Reverse Engineering Computer |
C. | Return-to-Code Engineering Compiler |
D. | Reversing Engineered Compiler |
Answer» B. Reverse Engineering Computer | |
17. |
______________ comes under tools for reverse engineering (RE). |
A. | Reassembler |
B. | Compiler |
C. | Disassembler |
D. | Interpreter |
Answer» D. Interpreter | |
18. |
There are ______ types of reverse engineering methodologies. |
A. | 6 |
B. | 2 |
C. | 5 |
D. | 3 |
Answer» C. 5 | |
19. |
A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division. |
A. | Phishing site |
B. | Sniffer tool |
C. | Password cracker |
D. | NIC cracker |
Answer» C. Password cracker | |
20. |
Clicking on enticing Ads can cause trouble. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
21. |
_______________ hacking refers to mistreatment of applications through HTTP or HTTPS that can be done by manipulating the web application through its graphical web interface or by tampering the Uniform Resource Identifier (URI). |
A. | Android application |
B. | Web application |
C. | PC application |
D. | Cloud application |
Answer» C. PC application | |
22. |
Part of the social media sites are the various games & 3rd party applications which helps ______________ to get access to your data. |
A. | ethical hackers |
B. | penetration testers |
C. | security auditors |
D. | cyber-criminals |
Answer» E. | |
23. |
There are __________ types of sniffing. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
24. |
CleanIISLog is not a hacking tool. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» C. May be True or False | |
25. |
They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here? |
A. | Shareware |
B. | Ransomware |
C. | Spyware |
D. | Freeware |
Answer» D. Freeware | |
26. |
A _______________ is a program application which is stored on a remote-server & distributed over the Internet when a user uses a browser interface to request for such applications. |
A. | Android application |
B. | Web application |
C. | PC application |
D. | Cloud application |
Answer» C. PC application | |
27. |
Malicious adware may sneak into your system by __________ different ways. |
A. | five |
B. | four |
C. | three |
D. | two |
Answer» E. | |
28. |
Keeping the password by the name of your pet is a good choice. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» C. May be True or False | |
29. |
______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings. |
A. | DNS mal-functioning |
B. | DNS cracking |
C. | DNS redirecting |
D. | DNS hijacking |
Answer» E. | |
30. |
_______________ is a universal interactive program environment for reverse engineering. |
A. | TurboC |
B. | Andromeda Decompiler |
C. | IDAPro |
D. | PE Explorer |
Answer» C. IDAPro | |
31. |
With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth. |
A. | network session hijacking |
B. | passive session hijacking |
C. | active session hijacking |
D. | social-networking session hijacking |
Answer» C. active session hijacking | |
32. |
Increase your security for social media account by always ____________ as you step away from the system. |
A. | signing in |
B. | logging out |
C. | signing up |
D. | logging in |
Answer» C. signing up | |
33. |
_____________ is the attack method for decoding user credentials. Using this technique an attacker can log on as a user & gain access to unauthorized data. |
A. | Cache Snooping |
B. | Cookie-jacking |
C. | Cookie Snooping |
D. | Cache-compromising |
Answer» D. Cache-compromising | |
34. |
________________ is a type of reverse engineering tool that is used to dissect binary codes into assembly codes. |
A. | PE & Resource Viewer |
B. | Debugger |
C. | Disassembler |
D. | Hex Editor |
Answer» D. Hex Editor | |
35. |
________________ are required because HTTP uses a lot of diverse TCP connections, so, the web server needs a means to distinguish every user’s connections. |
A. | Internet |
B. | Network |
C. | Hijacking |
D. | Sessions |
Answer» E. | |
36. |
______________ infects the executables as well as the boot sectors. |
A. | Non-resident virus |
B. | Boot Sector Virus |
C. | Polymorphic Virus |
D. | Multipartite Virus |
Answer» E. | |
37. |
Which of the following is not an example of web application hacking technique? |
A. | LDAP injection |
B. | Cryptanalysis |
C. | Race condition attack |
D. | OS command injection. |
Answer» C. Race condition attack | |
38. |
Which of the following activity is a good aspect of reverse engineering in ethical hacking ? |
A. | Cracking the trial version of the product to make it full-version |
B. | Removing the product key insertion step |
C. | Jumping the code for premium facilities |
D. | Determine whether the app contains any undocumented functionality |
Answer» E. | |
39. |
____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details. |
A. | Ad-based spyware |
B. | System Monitors |
C. | Spy-trojans |
D. | Tracking cookies |
Answer» C. Spy-trojans | |
40. |
Creators of adware also sell your browsing behaviour & information to 3rd parties. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
41. |
Trojans can not ______________ |
A. | steal data |
B. | self-replicate |
C. | steal financial information |
D. | steal login credentials |
Answer» C. steal financial information | |
42. |
A _______________ provides malicious users remote control over the targeted computer. |
A. | DDoS-Trojan |
B. | Backdoor Trojan |
C. | Trojan-Banker |
D. | Trojan-Downloader |
Answer» C. Trojan-Banker | |
43. |
Which of the following is not an actual Reverse Engineering tool? |
A. | Debugger |
B. | Disassembler |
C. | Text Editor |
D. | Hex Editor |
Answer» D. Hex Editor | |
44. |
______________ are difficult to identify as they keep on changing their type and signature. |
A. | Non-resident virus |
B. | Boot Sector Virus |
C. | Polymorphic Virus |
D. | Multipartite Virus |
Answer» D. Multipartite Virus | |
45. |
In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered in different ways to accomplish the attack. |
A. | passive |
B. | signal |
C. | network |
D. | active |
Answer» E. | |
46. |
A/an ___________ is a program that steals your logins & passwords for instant messaging applications. |
A. | IM – Trojans |
B. | Backdoor Trojans |
C. | Trojan-Downloader |
D. | Ransom Trojan |
Answer» B. Backdoor Trojans | |
47. |
Trojans having backdoors are harmless. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» C. May be True or False | |
48. |
______________ was the first type of phishing where the phishers developed an algorithm for generating random credit card numbers. |
A. | Algo-based phishing |
B. | Email-based phishing |
C. | Domain Phishing |
D. | Vishing |
Answer» B. Email-based phishing | |
49. |
Email Phishing came into origin in the year __________ |
A. | 1990 |
B. | 2000 |
C. | 2005 |
D. | 2015 |
Answer» C. 2005 | |
50. |
Victims of phishing are mostly ___________________ |
A. | Tech enthusiast |
B. | Professional computer engineers |
C. | Lack of computer knowledge |
D. | Lack of management skill |
Answer» D. Lack of management skill | |