

MCQOPTIONS
Saved Bookmarks
This section includes 128 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
101. |
Strangers cannot cause much trouble if we connect to them over social media. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» C. May be True or False | |
102. |
Which of the following is not an example of DNS hijacking? |
A. | ISP DNS hijacking |
B. | DNS hijacking for phishing |
C. | DNS hijacking for pharming |
D. | HTTP-based DNS hacking |
Answer» E. | |
103. |
_____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access. |
A. | IM – Trojans |
B. | Backdoor Trojans |
C. | Trojan-Downloader |
D. | Ransom Trojan |
Answer» E. | |
104. |
The __________________ protects your privacy by bouncing your connection and links around a distributed network over the globe run by volunteers. It gives three layers of anonymity. |
A. | Cookie removers |
B. | Private Search Engines |
C. | Tor browser |
D. | VPNs |
Answer» D. VPNs | |
105. |
________________ phishing is that type of phishing where the construction of a fake webpage is done for targeting definite keywords & waiting for the searcher to land on the fake webpage. |
A. | Voice |
B. | SMS |
C. | Search engine |
D. | |
Answer» D. Email | |
106. |
_____________ can be attained by the use of malware or by changing the server’s settings. |
A. | DNS poisoning |
B. | DNS cracking |
C. | DNS hijacking |
D. | DNS redirecting |
Answer» D. DNS redirecting | |
107. |
_____________ will not recreate the original source file created by the compiler. |
A. | Debugger |
B. | Hex Editor |
C. | Decompiler |
D. | Disassembler |
Answer» D. Disassembler | |
108. |
XSS stands for _________________ |
A. | Crack Site Scripting |
B. | Cross Site Server |
C. | Cross Site Scripting |
D. | Crack Server Scripting |
Answer» D. Crack Server Scripting | |
109. |
The ______________ hijacking is implemented on the data flow of protocol shared by all web applications. |
A. | network level |
B. | physical level |
C. | application level |
D. | data level |
Answer» B. physical level | |
110. |
Which of the following is not an example or type of phishing? |
A. | Spear phishing |
B. | Deceptive phishing |
C. | Whaling |
D. | Monkey in the Middle |
Answer» E. | |
111. |
___________ is a type of DoS threats to overload a server as it sends a large number of requests requiring resources for handling & processing. |
A. | Network Layer DoS |
B. | Physical Layer DoS |
C. | Transport Layer DoS |
D. | Application Layer DoS |
Answer» E. | |
112. |
Which of the following is not a sniffing tool? |
A. | Wireshark |
B. | Dude Sniffer |
C. | Maltego |
D. | Look@LAN |
Answer» D. Look@LAN | |
113. |
Which of the following is not an appropriate countermeasure for web server hacking ? |
A. | Using OS or antivirus without updates |
B. | Scan web server applications for vulnerabilities |
C. | Using secure protocols |
D. | Follow strict access control policy |
Answer» B. Scan web server applications for vulnerabilities | |
114. |
Which among the following is not a symptom of your system compromised with adware? |
A. | Website links redirect to sites unlike from what user is intended |
B. | Web browser acts slows to a crawl |
C. | System takes restarts frequently |
D. | The browser might crash frequently |
Answer» D. The browser might crash frequently | |
115. |
A ______________ is essentially a text file residing on the server that hosts different domain containing entries for dissimilar resource records. |
A. | Zone file |
B. | Robot file |
C. | Bot file |
D. | DNS file |
Answer» B. Robot file | |
116. |
The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources of the target website. |
A. | Phishing attack |
B. | DoS attack |
C. | Website attack |
D. | MiTM attack |
Answer» C. Website attack | |
117. |
In _______________ attack, the attacker doesn’t actively take over another user to perform the attack. |
A. | phishing |
B. | spoofing |
C. | hijacking |
D. | vishing |
Answer» C. hijacking | |
118. |
_________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator. |
A. | Ad-based spyware |
B. | System Monitors |
C. | Spy-trojans |
D. | Tracking cookies |
Answer» D. Tracking cookies | |
119. |
Which of the following is not a function or use of disassembler? |
A. | Extracting functions & libraries |
B. | Extracting strings and values |
C. | Assemble medium-level codes |
D. | Dissect binary codes |
Answer» D. Dissect binary codes | |
120. |
A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
121. |
______________ can be defined as the duplication of another creator’s or developer’s product trailing a thorough examination of its production or development. |
A. | Reverse hacking |
B. | Cracking |
C. | Social engineering |
D. | Reverse engineering |
Answer» E. | |
122. |
Creators of _____________ also sell your browsing behaviour & information to 3rd parties. |
A. | Shareware |
B. | Spyware |
C. | URL |
D. | Adware |
Answer» E. | |
123. |
_________________ type of phishing became very popular as if it has been sent from a legitimate source with a legitimate link to its official website. |
A. | Algo-based phishing |
B. | Email-based phishing |
C. | Domain Phishing |
D. | Vishing |
Answer» C. Domain Phishing | |
124. |
Which of the following is not a disassembler tool? |
A. | IDA Pro |
B. | PE Explorer |
C. | Turbo C |
D. | W32DASM |
Answer» D. W32DASM | |
125. |
A _____________ takes executable file as input and tries to generate high level code. |
A. | Debugger |
B. | Decompiler |
C. | Disassembler |
D. | Hex Editor |
Answer» C. Disassembler | |
126. |
Direct Action Virus is also known as ___________ |
A. | Non-resident virus |
B. | Boot Sector Virus |
C. | Polymorphic Virus |
D. | Multipartite Virus |
Answer» B. Boot Sector Virus | |
127. |
________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects. |
A. | Boot Sector Virus |
B. | Direct Action Virus |
C. | Polymorphic Virus |
D. | Multipartite Virus |
Answer» C. Polymorphic Virus | |
128. |
In mid-1981, the 1st virus for Apple computers with the name _________ came into existence. |
A. | Apple I |
B. | Apple II |
C. | Apple III |
D. | Apple Virus |
Answer» C. Apple III | |