CYBER SECURITY
1. An attempt to harm, damage or cause threat to a system or networ is broadly termed as
a. Cyber crime
b. Cyber attack
c. System hijacking
d. Digital crime
2. Which of this is an example of physical hacking
a. Remote unauthorized access
b. Inserting malware loaded USB to a system
c. SQL injection on SQL vulnerable site
d. DdoS(Distributed Denial of Service) attack
3.Which of the following refers to exploring the appropriate, ethical behaviors related to the online
environment and digital media platform
a. Cyber low
b. Cyber ethics
c. Cyber security
d. Cyber safety
4. Who deploys malware to a system or network
a. Criminal organizations, Black hat hackers , malware developers, cyber terrorists
b. Criminal organizations, White hat hackers, malware developers, cyber terrorists
c. Criminal organizations, Black hat hackers, software developers, cyber terrorists
d. Criminal organizations, Gray hat hackers, malware developers , penetration testers
5. ...... is the technique used in business organizations and firms to protect IT assets
a. Ethical hacking
b. Unethical hacking
c Fixing bugs
d. Internal data breach
6.When there is an excessive amount of data flow, which the system cannot handle ..... attacks takes
place
a. Database crash attack
b. Dos (Denial of Service) attack
c. Data overflow attack
d. Buffer overflow attack
7. Which of follwing usually observe each activity on the internet of the victim, gather all
information in the background and send it to someone else
a. Malware
b. Spyware
c. Adware
d. All of the above
8. ..... is the branch of cyber security that deals with morality and provides different theories and a
principle regarding the view-points about what is right and wrong
a. Social ethics
b. Ethics in cyber security
c. Corporate ethics
d. Ethics in black hat hacking
9. Which of the following can be considered as the elements of cyber security
a. application security
b. Operational security
c. Network security
d All of the above
10. .....are the special type of programs used for recording and tracking user's keystroke
a. Keylogger
b. Trojans
c. Virus
d. Worms
11. Which of the following are types of scanning?
a. Passive, active and interactive
b. Port, network and services
c. Server, network , client
d. Network, Vulnerability and port
12. Which of the following option is used to protect data and passwords?
a. Authentication
b. Authorization
c. Encryption
d. All of the above
13 During a Dos attack the regular traffic on the target ...... will be either dawdling down or
entirely interrupted
a. Network
b. System
c. Website
d. Router
14.Dos is abbreviated as .....
a. Denial of service
b. Distribution of Service
c. Distribution of Server
d. Denial of server
15. Which of following is not an example or type of phishing
a. Tracking
b. Vishing
c. Smishing
d. Pharming
16. Which of the following is not an appropriate method of defacing web server?
a. Mail Server intrusion
b. Web application bugs
c. Web shares misconfiguration
d. Session hijacking
17. A ...... consists of at least one bot server or controller and one or more client-bots
a. Virus
b. Trojan
c. Botnet
d. Adware
18. Which of the following is not a web server attack type
a. Dos Attack
b. Website Defacement using SQLi
c. Directory Traversal
d. Password guessing
19. ........ phishing is the type of phishing where the construction of a fake webpage is done for
targeting definite keywords and waiting for the searcher to land on the fake webpage
a. Voice
b. SMS
c. Search engine
d Email
20. ...... is an anti malware tool found in newer OS which is designed for protecting computers from
viruses, spyware and other malware
a. Nortan antivirus
b. Windows Defender
c. Anti- Malware
d. Microsoft security Essentials
21. Mobile security is also known as ........
a. OS Security
b. Wireless Security
c. Cloud Security
d. Database Security
22. Which of the following is a countermeasure for a buffer overflow attack
a. Input field length validation
b. Encryption
c. Firewall
d. Use of web forms
23. A password of P@ASSWORD can be cracked using which type of attack
a. Bruteforce
b. Hybrid
c. Dictionary
d. Zero day exploit
24. Which of the following is essential information a hacker performing a session-hijacking attack
a. Session ID
b. Session number
c. Sequence number
d. Source IP address
25. which of the stored procedure is used to test the SQL injection attack
a. xp_write
b. xp_regwrite
c. xp_reg
d. all of the mentioned
26. Which of the following tool is used for Blackjacking
a. BBAttacker
b. BBProxy
c. Blackburried
d. BBJacking
27. which of the following best describes sniffing
a. Gathering packets to locate IP address, in order to initiate a session-hijacking attack
b. Analyzing packets in order to locate the sequence number to start a session hijack
c. Monitoring TCP sessions in order to initiate a session hijacking attack
d. Locating a host susceptible to a session hijack attack
28. ........ is time based SQL injection attack
a. Quick detection
b. Initial Exploitation
c. Blind SQL Injection
d.Inline Comments
29 Which of the following is not a security issue for PDAs
a. Password theft
b. Data theft
c. Reverse engineering
d. Wireless vulnerability
30. What is it called when a hacker inserts programming commands into a web form
a. Form tampering
b. Command injection
c. Buffer overflow
d. Web form attack