

MCQOPTIONS
Saved Bookmarks
This section includes 128 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
51. |
Active sniffing is difficult to detect. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» C. May be True or False | |
52. |
_____________ = voice + phishing. |
A. | Algo-based phishing |
B. | Vishing |
C. | Domain Phishing |
D. | Email-based phishing |
Answer» C. Domain Phishing | |
53. |
_____________ refers to phishing performed over smart-phone by calling. |
A. | Algo-based phishing |
B. | Email-based phishing |
C. | Domain Phishing |
D. | Vishing |
Answer» E. | |
54. |
There are ____________ that are designed to track your browsing habits & aim ads that are relevant to the user. |
A. | plug-ins |
B. | cache |
C. | cookies |
D. | history |
Answer» D. history | |
55. |
Some Trojans carry ransomware with them to encrypt the data and ask for ransom. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
56. |
Which of the following tech-concepts cannot be sniffed ? |
A. | Cloud sessions |
B. | FTP passwords |
C. | Telnet passwords |
D. | Chat sessions |
Answer» B. FTP passwords | |
57. |
In an _________________ attack, an attacker finds an active session & takes over that session. |
A. | network session hijacking |
B. | passive session hijacking |
C. | active session hijacking |
D. | social-networking session hijacking |
Answer» D. social-networking session hijacking | |
58. |
Which of the following is not an anti-spam technique ? |
A. | Reputation control |
B. | Sender policy framework |
C. | DNS-based block-list |
D. | Domain-based blocking |
Answer» E. | |
59. |
De-compilation is not done for _______________ |
A. | Recovery of lost source code |
B. | Migration of assembly language |
C. | Determining the existence of malicious code in any app |
D. | Targeting users with stealing code |
Answer» E. | |
60. |
The threat of backdoors started when ____________ & ____________ OSs became widely accepted. |
A. | single-user, Windows |
B. | multiuser, networked |
C. | single-user, UNIX |
D. | multiuser, UNIX |
Answer» C. single-user, UNIX | |
61. |
Nowadays, most botnets rely on existing _______________ networks for communication. |
A. | server-to-server |
B. | peer-to-peer |
C. | client-to-server |
D. | host-to-server |
Answer» C. client-to-server | |
62. |
The bot program allows the bot-herders to perform all operations from a ___________ location. |
A. | local |
B. | open |
C. | corporate |
D. | remote |
Answer» E. | |
63. |
Infected computers and other systems within the botnet are called __________ |
A. | killers |
B. | vampires |
C. | zombies |
D. | gargoyles |
Answer» D. gargoyles | |
64. |
Which of the following is a remote Trojan? |
A. | Troya |
B. | DaCryptic |
C. | BankerA |
D. | Game-Troj |
Answer» B. DaCryptic | |
65. |
__________ is a powerful RAT build using the language Delphi 7. |
A. | Stuxnet |
B. | T-Bomb |
C. | Beast |
D. | Zeus |
Answer» D. Zeus | |
66. |
Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator. |
A. | advertisers |
B. | dark-market |
C. | antivirus company |
D. | share market |
Answer» B. dark-market | |
67. |
Which of the below-mentioned protocol is not susceptible to sniffing ? |
A. | NNTP |
B. | UDP |
C. | FTP |
D. | IMAP |
Answer» C. FTP | |
68. |
Backdoors are also known as ______________ |
A. | Malware-doors |
B. | Trojan-backups |
C. | Front-doors |
D. | Trapdoors |
Answer» E. | |
69. |
Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system. |
A. | virus, cyber-criminals |
B. | malware, penetration testers |
C. | trojans, cyber-criminals |
D. | virus, penetration testers |
Answer» D. virus, penetration testers | |
70. |
Which of the following is not an example of web application hacking? |
A. | Defacing websites |
B. | Stealing credit card information |
C. | Reverse engineering PC apps |
D. | Exploiting server-side scripting |
Answer» D. Exploiting server-side scripting | |
71. |
Which of the following scripting language is used for injecting executable malicious code for web-app hacking? |
A. | C++ |
B. | Tcl |
C. | Frame-Script |
D. | JavaScript |
Answer» E. | |
72. |
___________________ is usually targeted by nature where the emails are exclusively designed to target any exact user. |
A. | Algo-based phishing |
B. | Vishing |
C. | Domain Phishing |
D. | Spear phishing |
Answer» E. | |
73. |
The word “botnet” is a blend of the words _____________ & ___________ |
A. | robot, network |
B. | rocket, network |
C. | bot, network |
D. | bot, internet |
Answer» B. rocket, network | |
74. |
Which of the following is not a bulk emailing tool ? |
A. | Fairlogic Worldcast |
B. | 123 Hidden sender |
C. | YL Mail Man |
D. | NetCut |
Answer» E. | |
75. |
Which of the following is not a feature of IDAPro? |
A. | Instant debugging |
B. | Connect local and remote systems easily |
C. | Explore in-depth binary data |
D. | Convert machine language to high-level code |
Answer» E. | |
76. |
Algorithm-Based Phishing was developed in the year __________ |
A. | 1988 |
B. | 1989 |
C. | 1990 |
D. | 1991 |
Answer» D. 1991 | |
77. |
_______________deals with the protection of an individual’s information which is implemented while using the Internet on any computer or personal device. |
A. | Digital agony |
B. | Digital privacy |
C. | Digital secrecy |
D. | Digital protection |
Answer» C. Digital secrecy | |
78. |
______________ takes advantage if hidden fields that work as the only security measure in some applications. |
A. | Parameter tampering |
B. | Data tampering |
C. | Tampering of network topology |
D. | Protocol tampering |
Answer» B. Data tampering | |
79. |
A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system’s hardware. |
A. | crypter |
B. | virus |
C. | backdoor |
D. | key-logger |
Answer» D. key-logger | |
80. |
The _______________ matches and maps to the user friendly domain name. |
A. | HTTP |
B. | DNS |
C. | WWW |
D. | ISP |
Answer» C. WWW | |
81. |
______________ tool clears the log entries in the IIS log files filtered by an IP address. |
A. | CleanIISLoging |
B. | CleanLogger |
C. | CleanIISLog |
D. | ClearIISLog |
Answer» D. ClearIISLog | |
82. |
If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser. |
A. | passwords |
B. | email ID |
C. | name |
D. | address |
Answer» B. email ID | |
83. |
Which of the following is not a decompiler tool? |
A. | DCC decompiler |
B. | Borol and C |
C. | Boomerang Decompiler |
D. | ExeToC |
Answer» C. Boomerang Decompiler | |
84. |
There are ______ types of DoS attack. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
85. |
The data transferred between your device & the server is securely _____________ if you’re using VPNs. |
A. | locked |
B. | sealed |
C. | packed |
D. | encrypted |
Answer» E. | |
86. |
Application layer DoS attack is also known as _______________ |
A. | Layer4 DoS attack |
B. | Layer5 DoS attack |
C. | Layer6 DoS attack |
D. | Layer7 DoS attack |
Answer» E. | |
87. |
Which of the following browser is used for Privacy purpose? |
A. | Chrome |
B. | Firefox |
C. | Opera |
D. | Tor |
Answer» E. | |
88. |
It is necessary to use ________________ for maintaining searched data privacy. |
A. | Private email services |
B. | Private search engines |
C. | Tor Browser |
D. | Private Browser window |
Answer» C. Tor Browser | |
89. |
The Tor browser protects your privacy by bouncing your connection and links around a distributed network over the globe run by volunteers. It gives three layers of anonymity. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
90. |
____________ or smishing is one of the simplest types of phishing where the target victims may get a fake order detail with a cancellation link. |
A. | Algo-based phishing |
B. | SMS phishing |
C. | Domain Phishing |
D. | Spear phishing |
Answer» C. Domain Phishing | |
91. |
Which of the following is not a bulk emailing tool? |
A. | Wireshark |
B. | Sendblaster |
C. | Direct Sender |
D. | Hotmailer |
Answer» B. Sendblaster | |
92. |
________________ does not attempt to reverse the actions of compiler; rather it transforms the input program repeatedly until HLL code is achieved. |
A. | Debugger |
B. | Hex Editor |
C. | Disassembler |
D. | Decompiler |
Answer» E. | |
93. |
Which of the following type of data, phishers cannot steal from its target victims? |
A. | bank details |
B. | phone number |
C. | passwords |
D. | apps installed in the mobile |
Answer» E. | |
94. |
Which of the following is not a type of application layer DoS? |
A. | HTTP flooding |
B. | Slowloris |
C. | TCP flooding |
D. | DNS query flooding |
Answer» D. DNS query flooding | |
95. |
______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information. |
A. | Phishing attack |
B. | DoS attack |
C. | Website attack |
D. | MiTM attack |
Answer» B. DoS attack | |
96. |
Phishers often develop ______________ websites for tricking users & filling their personal data. |
A. | legitimate |
B. | illegitimate |
C. | genuine |
D. | official |
Answer» C. genuine | |
97. |
In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware. |
A. | URL Redirection |
B. | DoS |
C. | Phishing |
D. | MiTM attack |
Answer» D. MiTM attack | |
98. |
Which of the following term is not a valid terminology and type of adware? |
A. | Mobile adware |
B. | Mac Adware |
C. | Smart-home adware |
D. | Windows adware |
Answer» D. Windows adware | |
99. |
_____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes. |
A. | Ad-based spyware |
B. | System Monitors |
C. | Spy-trojans |
D. | Tracking cookies |
Answer» E. | |
100. |
Which of the following is not an appropriate method of defacing web server ? |
A. | Mail server intrusion |
B. | Web application bugs |
C. | Web shares misconfiguration |
D. | Sessions hijacking |
Answer» E. | |