Explore topic-wise MCQs in Cyber Security.

This section includes 128 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

_____________ are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser.

A. Shareware
B. Adware
C. Bloatware
D. Ransomware
Answer» C. Bloatware
2.

Which one is not an example of .Net application decompiler?

A. Salamander
B. Dis#
C. Decompiler.Net
D. MultiRipper
Answer» E.
3.

________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.

A. Shareware
B. Spyware
C. Ransomware
D. Freeware
Answer» C. Ransomware
4.

There are __________ main types of spyware.

A. 2
B. 3
C. 4
D. 5
Answer» D. 5
5.

________ Injection attack is a special attack done through character elements “Carriage Return” or “Line Feed.” Exploitation can be done when an attacker is capable to inject a CRLF series in an HTTP stream.

A. XSS
B. CSRF
C. CRLF
D. SQL
Answer» D. SQL
6.

Session hijacking takes place at ____________ number of levels.

A. five
B. four
C. three
D. two
Answer» E.
7.

Which of the following example do not comes under network level session hijacking.

A. TCP/IP Hijacking
B. RST Hijacking
C. Domain Hijacking
D. Blind Hijacking
Answer» D. Blind Hijacking
8.

Which of the following is not a threat of web application?

A. Reverse engineering
B. Command injection
C. DMZ protocol attack
D. Buffer Overflow
Answer» B. Command injection
9.

______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet.

A. DNS poisoning
B. DNS re-routing
C. DNS cracking
D. Domain link poisoning
Answer» B. DNS re-routing
10.

Which of the following is not a threat of web application ?

A. Session poisoning
B. Phishing
C. Cryptographic interception
D. Cookie snooping
Answer» C. Cryptographic interception
11.

Keeping browsing habits & aiming specific ads to you is harmless but it might reduce your online privacy.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
12.

DNS poisoning is very dangerous because it can extend its reach from one ___________ to another.

A. ISP server
B. DNS server
C. Linux server
D. Domain user
Answer» C. Linux server
13.

_____________ tracks your data and displays those products as ads for promotions.

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» B. System Monitors
14.

Which of the following is not an appropriate method of web application hacking?

A. XSS
B. CSRF
C. SQLi
D. Brute-force
Answer» E.
15.

Which of the following activity is not done by spyware ?

A. Monitors your internet activity
B. Track user’s login details and passwords
C. Uninstalls your mobile browser
D. Spy on sensitive information
Answer» D. Spy on sensitive information
16.

REC stands for ________________

A. Reverse Engineering Compiler
B. Reverse Engineering Computer
C. Return-to-Code Engineering Compiler
D. Reversing Engineered Compiler
Answer» B. Reverse Engineering Computer
17.

______________ comes under tools for reverse engineering (RE).

A. Reassembler
B. Compiler
C. Disassembler
D. Interpreter
Answer» D. Interpreter
18.

There are ______ types of reverse engineering methodologies.

A. 6
B. 2
C. 5
D. 3
Answer» C. 5
19.

A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.

A. Phishing site
B. Sniffer tool
C. Password cracker
D. NIC cracker
Answer» C. Password cracker
20.

Clicking on enticing Ads can cause trouble.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
21.

_______________ hacking refers to mistreatment of applications through HTTP or HTTPS that can be done by manipulating the web application through its graphical web interface or by tampering the Uniform Resource Identifier (URI).

A. Android application
B. Web application
C. PC application
D. Cloud application
Answer» C. PC application
22.

Part of the social media sites are the various games & 3rd party applications which helps ______________ to get access to your data.

A. ethical hackers
B. penetration testers
C. security auditors
D. cyber-criminals
Answer» E.
23.

There are __________ types of sniffing.

A. 2
B. 3
C. 4
D. 5
Answer» B. 3
24.

CleanIISLog is not a hacking tool.

A. True
B. False
C. May be True or False
D. Can't say
Answer» C. May be True or False
25.

They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?

A. Shareware
B. Ransomware
C. Spyware
D. Freeware
Answer» D. Freeware
26.

A _______________ is a program application which is stored on a remote-server & distributed over the Internet when a user uses a browser interface to request for such applications.

A. Android application
B. Web application
C. PC application
D. Cloud application
Answer» C. PC application
27.

Malicious adware may sneak into your system by __________ different ways.

A. five
B. four
C. three
D. two
Answer» E.
28.

Keeping the password by the name of your pet is a good choice.

A. True
B. False
C. May be True or False
D. Can't say
Answer» C. May be True or False
29.

______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings.

A. DNS mal-functioning
B. DNS cracking
C. DNS redirecting
D. DNS hijacking
Answer» E.
30.

_______________ is a universal interactive program environment for reverse engineering.

A. TurboC
B. Andromeda Decompiler
C. IDAPro
D. PE Explorer
Answer» C. IDAPro
31.

With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth.

A. network session hijacking
B. passive session hijacking
C. active session hijacking
D. social-networking session hijacking
Answer» C. active session hijacking
32.

Increase your security for social media account by always ____________ as you step away from the system.

A. signing in
B. logging out
C. signing up
D. logging in
Answer» C. signing up
33.

_____________ is the attack method for decoding user credentials. Using this technique an attacker can log on as a user & gain access to unauthorized data.

A. Cache Snooping
B. Cookie-jacking
C. Cookie Snooping
D. Cache-compromising
Answer» D. Cache-compromising
34.

________________ is a type of reverse engineering tool that is used to dissect binary codes into assembly codes.

A. PE & Resource Viewer
B. Debugger
C. Disassembler
D. Hex Editor
Answer» D. Hex Editor
35.

________________ are required because HTTP uses a lot of diverse TCP connections, so, the web server needs a means to distinguish every user’s connections.

A. Internet
B. Network
C. Hijacking
D. Sessions
Answer» E.
36.

______________ infects the executables as well as the boot sectors.

A. Non-resident virus
B. Boot Sector Virus
C. Polymorphic Virus
D. Multipartite Virus
Answer» E.
37.

Which of the following is not an example of web application hacking technique?

A. LDAP injection
B. Cryptanalysis
C. Race condition attack
D. OS command injection.
Answer» C. Race condition attack
38.

Which of the following activity is a good aspect of reverse engineering in ethical hacking ?

A. Cracking the trial version of the product to make it full-version
B. Removing the product key insertion step
C. Jumping the code for premium facilities
D. Determine whether the app contains any undocumented functionality
Answer» E.
39.

____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details.

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» C. Spy-trojans
40.

Creators of adware also sell your browsing behaviour & information to 3rd parties.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
41.

Trojans can not ______________

A. steal data
B. self-replicate
C. steal financial information
D. steal login credentials
Answer» C. steal financial information
42.

A _______________ provides malicious users remote control over the targeted computer.

A. DDoS-Trojan
B. Backdoor Trojan
C. Trojan-Banker
D. Trojan-Downloader
Answer» C. Trojan-Banker
43.

Which of the following is not an actual Reverse Engineering tool?

A. Debugger
B. Disassembler
C. Text Editor
D. Hex Editor
Answer» D. Hex Editor
44.

______________ are difficult to identify as they keep on changing their type and signature.

A. Non-resident virus
B. Boot Sector Virus
C. Polymorphic Virus
D. Multipartite Virus
Answer» D. Multipartite Virus
45.

In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered in different ways to accomplish the attack.

A. passive
B. signal
C. network
D. active
Answer» E.
46.

A/an ___________ is a program that steals your logins & passwords for instant messaging applications.

A. IM – Trojans
B. Backdoor Trojans
C. Trojan-Downloader
D. Ransom Trojan
Answer» B. Backdoor Trojans
47.

Trojans having backdoors are harmless.

A. True
B. False
C. May be True or False
D. Can't say
Answer» C. May be True or False
48.

______________ was the first type of phishing where the phishers developed an algorithm for generating random credit card numbers.

A. Algo-based phishing
B. Email-based phishing
C. Domain Phishing
D. Vishing
Answer» B. Email-based phishing
49.

Email Phishing came into origin in the year __________

A. 1990
B. 2000
C. 2005
D. 2015
Answer» C. 2005
50.

Victims of phishing are mostly ___________________

A. Tech enthusiast
B. Professional computer engineers
C. Lack of computer knowledge
D. Lack of management skill
Answer» D. Lack of management skill