Explore topic-wise MCQs in Cyber Security.

This section includes 128 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

51.

Active sniffing is difficult to detect.

A. True
B. False
C. May be True or False
D. Can't say
Answer» C. May be True or False
52.

_____________ = voice + phishing.

A. Algo-based phishing
B. Vishing
C. Domain Phishing
D. Email-based phishing
Answer» C. Domain Phishing
53.

_____________ refers to phishing performed over smart-phone by calling.

A. Algo-based phishing
B. Email-based phishing
C. Domain Phishing
D. Vishing
Answer» E.
54.

There are ____________ that are designed to track your browsing habits & aim ads that are relevant to the user.

A. plug-ins
B. cache
C. cookies
D. history
Answer» D. history
55.

Some Trojans carry ransomware with them to encrypt the data and ask for ransom.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
56.

Which of the following tech-concepts cannot be sniffed ?

A. Cloud sessions
B. FTP passwords
C. Telnet passwords
D. Chat sessions
Answer» B. FTP passwords
57.

In an _________________ attack, an attacker finds an active session & takes over that session.

A. network session hijacking
B. passive session hijacking
C. active session hijacking
D. social-networking session hijacking
Answer» D. social-networking session hijacking
58.

Which of the following is not an anti-spam technique ?

A. Reputation control
B. Sender policy framework
C. DNS-based block-list
D. Domain-based blocking
Answer» E.
59.

De-compilation is not done for _______________

A. Recovery of lost source code
B. Migration of assembly language
C. Determining the existence of malicious code in any app
D. Targeting users with stealing code
Answer» E.
60.

The threat of backdoors started when ____________ & ____________ OSs became widely accepted.

A. single-user, Windows
B. multiuser, networked
C. single-user, UNIX
D. multiuser, UNIX
Answer» C. single-user, UNIX
61.

Nowadays, most botnets rely on existing _______________ networks for communication.

A. server-to-server
B. peer-to-peer
C. client-to-server
D. host-to-server
Answer» C. client-to-server
62.

The bot program allows the bot-herders to perform all operations from a ___________ location.

A. local
B. open
C. corporate
D. remote
Answer» E.
63.

Infected computers and other systems within the botnet are called __________

A. killers
B. vampires
C. zombies
D. gargoyles
Answer» D. gargoyles
64.

Which of the following is a remote Trojan?

A. Troya
B. DaCryptic
C. BankerA
D. Game-Troj
Answer» B. DaCryptic
65.

__________ is a powerful RAT build using the language Delphi 7.

A. Stuxnet
B. T-Bomb
C. Beast
D. Zeus
Answer» D. Zeus
66.

Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.

A. advertisers
B. dark-market
C. antivirus company
D. share market
Answer» B. dark-market
67.

Which of the below-mentioned protocol is not susceptible to sniffing ?

A. NNTP
B. UDP
C. FTP
D. IMAP
Answer» C. FTP
68.

Backdoors are also known as ______________

A. Malware-doors
B. Trojan-backups
C. Front-doors
D. Trapdoors
Answer» E.
69.

Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.

A. virus, cyber-criminals
B. malware, penetration testers
C. trojans, cyber-criminals
D. virus, penetration testers
Answer» D. virus, penetration testers
70.

Which of the following is not an example of web application hacking?

A. Defacing websites
B. Stealing credit card information
C. Reverse engineering PC apps
D. Exploiting server-side scripting
Answer» D. Exploiting server-side scripting
71.

Which of the following scripting language is used for injecting executable malicious code for web-app hacking?

A. C++
B. Tcl
C. Frame-Script
D. JavaScript
Answer» E.
72.

___________________ is usually targeted by nature where the emails are exclusively designed to target any exact user.

A. Algo-based phishing
B. Vishing
C. Domain Phishing
D. Spear phishing
Answer» E.
73.

The word “botnet” is a blend of the words _____________ & ___________

A. robot, network
B. rocket, network
C. bot, network
D. bot, internet
Answer» B. rocket, network
74.

Which of the following is not a bulk emailing tool ?

A. Fairlogic Worldcast
B. 123 Hidden sender
C. YL Mail Man
D. NetCut
Answer» E.
75.

Which of the following is not a feature of IDAPro?

A. Instant debugging
B. Connect local and remote systems easily
C. Explore in-depth binary data
D. Convert machine language to high-level code
Answer» E.
76.

Algorithm-Based Phishing was developed in the year __________

A. 1988
B. 1989
C. 1990
D. 1991
Answer» D. 1991
77.

_______________deals with the protection of an individual’s information which is implemented while using the Internet on any computer or personal device.

A. Digital agony
B. Digital privacy
C. Digital secrecy
D. Digital protection
Answer» C. Digital secrecy
78.

______________ takes advantage if hidden fields that work as the only security measure in some applications.

A. Parameter tampering
B. Data tampering
C. Tampering of network topology
D. Protocol tampering
Answer» B. Data tampering
79.

A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system’s hardware.

A. crypter
B. virus
C. backdoor
D. key-logger
Answer» D. key-logger
80.

The _______________ matches and maps to the user friendly domain name.

A. HTTP
B. DNS
C. WWW
D. ISP
Answer» C. WWW
81.

______________ tool clears the log entries in the IIS log files filtered by an IP address.

A. CleanIISLoging
B. CleanLogger
C. CleanIISLog
D. ClearIISLog
Answer» D. ClearIISLog
82.

If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.

A. passwords
B. email ID
C. name
D. address
Answer» B. email ID
83.

Which of the following is not a decompiler tool?

A. DCC decompiler
B. Borol and C
C. Boomerang Decompiler
D. ExeToC
Answer» C. Boomerang Decompiler
84.

There are ______ types of DoS attack.

A. 2
B. 3
C. 4
D. 5
Answer» B. 3
85.

The data transferred between your device & the server is securely _____________ if you’re using VPNs.

A. locked
B. sealed
C. packed
D. encrypted
Answer» E.
86.

Application layer DoS attack is also known as _______________

A. Layer4 DoS attack
B. Layer5 DoS attack
C. Layer6 DoS attack
D. Layer7 DoS attack
Answer» E.
87.

Which of the following browser is used for Privacy purpose?

A. Chrome
B. Firefox
C. Opera
D. Tor
Answer» E.
88.

It is necessary to use ________________ for maintaining searched data privacy.

A. Private email services
B. Private search engines
C. Tor Browser
D. Private Browser window
Answer» C. Tor Browser
89.

The Tor browser protects your privacy by bouncing your connection and links around a distributed network over the globe run by volunteers. It gives three layers of anonymity.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
90.

____________ or smishing is one of the simplest types of phishing where the target victims may get a fake order detail with a cancellation link.

A. Algo-based phishing
B. SMS phishing
C. Domain Phishing
D. Spear phishing
Answer» C. Domain Phishing
91.

Which of the following is not a bulk emailing tool?

A. Wireshark
B. Sendblaster
C. Direct Sender
D. Hotmailer
Answer» B. Sendblaster
92.

________________ does not attempt to reverse the actions of compiler; rather it transforms the input program repeatedly until HLL code is achieved.

A. Debugger
B. Hex Editor
C. Disassembler
D. Decompiler
Answer» E.
93.

Which of the following type of data, phishers cannot steal from its target victims?

A. bank details
B. phone number
C. passwords
D. apps installed in the mobile
Answer» E.
94.

Which of the following is not a type of application layer DoS?

A. HTTP flooding
B. Slowloris
C. TCP flooding
D. DNS query flooding
Answer» D. DNS query flooding
95.

______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.

A. Phishing attack
B. DoS attack
C. Website attack
D. MiTM attack
Answer» B. DoS attack
96.

Phishers often develop ______________ websites for tricking users & filling their personal data.

A. legitimate
B. illegitimate
C. genuine
D. official
Answer» C. genuine
97.

In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.

A. URL Redirection
B. DoS
C. Phishing
D. MiTM attack
Answer» D. MiTM attack
98.

Which of the following term is not a valid terminology and type of adware?

A. Mobile adware
B. Mac Adware
C. Smart-home adware
D. Windows adware
Answer» D. Windows adware
99.

_____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes.

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» E.
100.

Which of the following is not an appropriate method of defacing web server ?

A. Mail server intrusion
B. Web application bugs
C. Web shares misconfiguration
D. Sessions hijacking
Answer» E.