Inforamtion Security
Inforamtion Security
View Answer
MD5
SHA-2
SHA-1
VDO.AI
View Answer
SHA-1
Certificate_extension
Certificate_creation
Certificate_exchange
Certificate_type
View Answer
Certificate_type
4. In The Handshake Protocol Which Is The Message Type First Sent Between Client And Server ?
Server_hello
Client_hello
Hello_request
Certificate_request
View Answer
Client_hello
5. Which Of The Following Is An Independent Malicious Program That Need Not Any Host Program?
Trap Doors
Trojan Horse
Virus
Worm
View Answer
Worm
View Answer
7. Which Of The Following Is Not A Factor In Securing The Environment Against An Attack On Security?
Rootkits
Bitmapping
Steganography
Image Rendering
View Answer
Steganography
9. What Type Of Rootkit Will Patch, Hook, Or Replace The Version Of System Call In Order To Hide
Information?
View Answer
SYN-ACK-FIN
SYN-SYN ACK-ACK
SYN-ACK
SYN-SYN-ACK
View Answer
SYN-SYN ACK-ACK
DNSlookup
Whois
Nslookup
IP Network Browser
View Answer
IP Network Browser
12. The First Phase Of Hacking An IT System Is Compromise Of Which Foundation Of Security?
Availability
Confidentiality
Integrity
Authentication
View Answer
Confidentiality
22
80
20
23
View Answer
23
14. Performing Hacking Activities With The Intent On Gaining Visibility For An Unfair Situation Is Called
Cracking
Analysis
Hacktivism
Exploitation
View Answer
Hacktivism
Information Gathering
Cracking Passwords
Escalating Privileges
Covering Tracks
View Answer
Cracking Passwords
Impersonation
Spamming
Identify Theft
Scanning
View Answer
Impersonation
Reconnaissance
Maintaining Access
Gaining Access
Scanning
View Answer
Gaining Access
18. When A Person Is Harrassed Repeatedly By Being Followed, Called Or Be Written To He/she Is A
Target Of
Bullying
Identity Theft
Phishing
Stalking
View Answer
Stalking
Trojan Horse
Virus
Worm
Zombie
View Answer
Trojan Horse
Spyware
Shoulder Surfing
Trojan
Social Engineering
View Answer
Spyware
DoS Attacks
View Answer
DoS Attacks
Question: 1
Unauthorized Attacks
Question: 2
Creeper
Question: 3
Printer
Question: 4
1986
Question: 5
Question: 1
(A) Computed
(B) Mind
(C) Brain
Ans: C
Brain
Question: 2
(A) Assembling
(B) Interlocking
(C) Pairing
(D) Networking
Ans: D
Networking
Question: 3
(A) Spam
(B) Phishing
(C) Malware
(D) Virus
Ans: C
Malware
Question: 4
(A) Phishing
(B) Adware
(C) Firewall
(D) Spam
Ans: D
Spam
Question: 5
(A) Hacker
(B) Analyst
(C) Spammer
(D) Programmer
Ans: A
Hacker
TV and Radiocorrect
3. The loss in signal strength as light travels long through the optical fiber is known as:
Attenuationcorrect
Network Layercorrect
Transport Layer
Telephonecorrect
Physical Layercorrect
7. A traditional TV transmitter which provides multiple channels through a single cable uses……………:
FDMcorrect
8. In which layer of the OSI network model the TCP and UDP operates:
Transport Layercorrect
ISO-OSIcorrect
Internet → WANcorrect
11. In OSI model the dialogue control and token management is the responsibility of which layer:
Session Layercorrect
12. Choose the correct option related to the default port of HTTP:
80correct
13. ………………is a standard system of rules that enable a device to communicate over the network:
Protocolcorrect
14. ………………is the process of converting information into digital form so that the computer can
understand this format:
Digitizationcorrect
15. In ………………layer of the OSI model IP addresses are added during encapsulation:
Network Layercorrect
Walkie talkiecorrect
17. ……………………..is the physical arrangement of devices connected to a local area network via cables:
Network Topologycorrect
18. Logical subdivision of IP address into two parts one part represent host address and the other
network address is known as:
Subnet Maskcorrect
All Optionscorrect
21. Which multiplexing technique is used by the optical fibers to mix different wavelengths into a single
light for transmission?
WDMcorrect
22. The first network who implemented the TCP/IP protocols was:
ARPANETcorrect
23. Choose the correct option related to the default port of SMTP:
25correct
24. Which of the following is required to establish a successful connection between two computers?
All Optionscorrect
25. Choose the correct association between a device and its functionality:
26. In which layer of the OSI network model the hub works:
Physical Layercorrect
27. Choose the correct equivalence between the TCP/IP layer and the OSI model layer:
Firewallcorrect
Socketcorrect
31. Who developed the Open Systems Interconnection (OSI) model standard?
ISOcorrect
32. Which of the following transmission medium is more secure and fastest in term of data transfer?
Vint Cerfcorrect
Transport Layercorrect
All Optionscorrect
ARPANETcorrect
37. ………………….is the lowest layer of the OSI conceptual network model.
Physical Layercorrect
180
443correct
39. Which kind of transmission is involved between mouse and personal computer?
Simplexcorrect
40. In which layer of the OSI network model the repeater operates:
Physical Layercorrect
128 bitscorrect
43. The information is transmitted from one place to another through which of the following option:
Transmission Mediacorrect
44. The lower three layers of the OSI model closely correspond to which standard:
X.25correct
3correct
46. In which layer of the OSI network model the bridge operates:
47. Choose the correct association between a technology and its network type:
48. Which of the following system is used to determine the exact location of an object on the earth?
GPScorrect
49. Choose the correct association between a technology and its network type:
Wi-Fi → WLANcorrect
50. In the OSI conceptual model the routing is performed by the layer:
Session Layer
Network Layercorrect
Question: 1
Ans: C
Question: 2
transmission by
Ans: B
Time-division multiplexer
Question: 3
need buffers
Ans: B
need buffers
Question: 4
modems because
(D) They transmit the data with stop and start bits
Ans: C
Question: 5
Ans: C
A coaxial cable
Question: 1
(A) Five
(B) Seven
(C) Eight
(D) Nine
Ans: B
Seven
Question: 2
(A) Information
(B) Icon
Ans: D
User friendly
Question: 3
Ans: B
Question: 4
(A) Analog
(B) Digital
(C) Hybrid
Ans : A
Analog
Question: 5
Ans: D
Question: 1
If you use either Telnet or FTP, which is the highest layer you are
using to transmit data?
(A) Application
(B) Session
(C) Presentation
(D) Transport
Ans: C
Presentation
Question: 2
(A) Equalization
Ans: D
Question: 3
Ans: C
Question: 4
The connection between your computer at home and your local
Ans: B
Question: 5
(D) Combining many low speed channels into one high speed
channel
Ans: C
Question: 1
Seven
Question: 2
User friendly
Question: 3
Question: 4
Analog
Question: 5
Question: 6
If you use either Telnet or FTP, which is the highest layer you are
Presentation
Question: 7
Question: 8
Question: 9
Question: 10
Question: 6
A ____ is a standard set of rules that determines how computers communicate with each other across
networks.
(A) Protomol
(B) Protochol
(C) Protocool
(D) Protocol
Ans: D
Protocol
Question: 7
Ans: C
Question: 8
Ans: B
(A) Transport
(B) Session
(C) Presentation
(D) Physical
Ans: C
Presentation
Question: 10
(A) TCP
(B) IP
(C) UDP
(D) TCP/IP
Ans: A
TCP
exams.
To retain a competitive advantage and to meet basic business requirements organizations must:
Access Authorization
Security Awareness
A number of different mechanisms are available for raising security awareness including:
Both A&B
Who is responsible for determining the access rights and access levels
What approvals are needed for access
Logical access controls are one of the primary safeguards for securing software and data within an
information processing facility.
True
Technical exposures are the unauthorized implementation or modification of data and software at the
network, platform, database or application level. They include:
Data diddling involves changing data before or as they are entered into the computer.
Trojan horses involve hiding malicious, fraudulent code in an authorized computer program.
Wire-tapping involves eaves dropping on information being transmitted over telecommunications lines
To protect an organization’s information resources, access control software has become even more
critical in assuring the confidentially, integrity and availability of information resources.
True
False
Both A&B
Log database/ data communications access activities for monitoring access violation
Passwords should allow for a combination of alpha, numeric, upper and lower case and special
characters
The system should not permit previous password(s) to be used after being changed
Both A&B
Biometrics –
Biometric access controls are the best means of authenticating a user identify based on a unique,
measurable attribute or trait fo4 verifying the identity of a human being.
This restricts computer access, based on a physical or behavioral characteristic of the user.
Both A&B
The file directory system, which tracks the location of all computer’s files
Boot and system areas, which are needed to start the computer
Data files
1. _______ is the practice and precautions taken to protect valuable information from unauthorised
access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
View Answer
Answer: c
Explanation: Information Security (abbreviated as InfoSec) is a process or set of processes used for
protecting valuable information for alteration, destruction, deletion or disclosure by unauthorised
users.
2. From the options below, which of them is not a threat to information security?
a) Disaster
b) Eavesdropping
c) Information leakage
View Answer
Answer: d
Explanation: Disaster, eavesdropping and information leakage come under information security
threats whereas not changing the default password of any system, hardware or any software comes
under the category of vulnerabilities that the user may pose to its system.
3. From the options below, which of them is not a vulnerability to information security?
a) flood
View Answer
Answer: a
Explanation: Flood comes under natural disaster which is a threat to any information and not acts
as a vulnerability to any system.
4. _____ platforms are used for safety and protection of information in the cloud.
c) AWS
d) One Drive
View Answer
Answer: a
Explanation: Nowadays data centres support workloads from different geographic locations across
the globe through physical systems, virtual machines, servers, and clouds. Their security can be
managed using Cloud workload protection platforms which manage policies regarding security of
information irrespective of its location.
5. Which of the following information security technology is used for avoiding browser-based
hacking?
a) Anti-malware in browsers
View Answer
Answer: b
advertisement
View Answer
Answer: c
Explanation: It is a collective name for tools that monitor networks & endpoints of systems and
record all the activities for further reporting, analysis & detection in a central database. Analyzing
the reports generated through such EDR tools, loopholes in a system or any internal, as well as
external breaching attempts can be detected.
7. _______ technology is used for analyzing and monitoring traffic in network and information flow.
View Answer
Answer: d
Explanation: Network traffic analysis (NTA) is an approach of information security for supervising
the traffic in any network, a flow of data over the network as well as malicious threats that are
trying to breach the network. This technological solution also helps in triage the events detected by
Network Traffic Analysing tools.
a) Bug
b) Threat
c) Vulnerability
d) Attack
View Answer
Answer: b
Explanation: Threats are anything that may cause damage or harm to a computer system, individual
or any information. Compromising of confidential information means extracting out sensitive data
from a system by illegal manner.
a) Bug
b) Threat
c) Vulnerability
d) Attack
View Answer
Answer: c
Explanation: Access control policies are incorporated to a security system for restricting of
unauthorised access to any logical or physical system. Every security compliance program must
need this as a fundamental component. Those systems which lack this feature is vulnerable.
a) reduced
b) transferred
c) protected
d) ignored
View Answer
Answer: d
a) 4
b) 5
c) 6
d) 7
View Answer
Answer: c
Explanation: According to the standard ethical hacking standards, the entire process of hacking can
be divided into 6 steps or phases. These are: Reconnaissance, Scanning, Gaining Access, Maintaining
Access, Tracks clearing, reporting.
2. ____________ is the information gathering phase in ethical hacking from the target user.
a) Reconnaissance
b) Scanning
c) Gaining access
d) Maintaining access
View Answer
Answer: a
Explanation: Reconnaissance is the phase where the ethical hacker tries to gather different kinds of
information about the target user or the victim’s system.
3. Which of the following is not a reconnaissance tool or technique for information gathering?
a) Hping
b) NMAP
c) Google Dorks
d) Nexpose
View Answer
Answer: d
Explanation: Hping, NMAP & Google Dorks are tools and techniques for reconnaissance. Nexpose is
a tool for scanning the network for vulnerabilities.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: a
Explanation: Reconnaissance can be done in two different ways. 1st, Active Reconnaissance which
involves interacting with the target user or system directly in order to gain information; 2nd,
Passive Reconnaissance, where information gathering from target user is done indirectly without
interacting with the target user or system.
View Answer
Answer: b
Explanation: As active reconnaissance is all about interacting with target victim directly, hence
telephonic calls as a legitimate customer care person or help desk person, the attacker can get more
information about the target user.
advertisement
View Answer
Answer: d
Explanation: Passive reconnaissance is all about acquiring of information about the target indirectly,
hence searching any information about the target on online people database is an example of
passive reconnaissance.
a) Reconnaissance
b) Scanning
c) Gaining access
d) Maintaining access
View Answer
Answer: b
Explanation: In the scanning phase, the hacker actively scans for the vulnerabilities or specific
information in the network which can be exploited.
8. While looking for a single entry point where penetration testers can test the vulnerability, they
use ______ phase of ethical hacking.
a) Reconnaissance
b) Scanning
c) Gaining access
d) Maintaining access
View Answer
Answer: b
Explanation: Scanning is done to look for entry points in a network or system in order to launch an
attack and check whether the system is penetrable or not.
a) Vulnerability scanning
b) Sweeping
c) Port Scanning
d) Google Dorks
View Answer
Answer: d
Explanation: Google dork is used for reconnaissance, which uses special search queries for
narrowing down the search results. The rest three scanning methodologies are used for scanning
ports (logical), and network vulnerabilities.
10. Which of them is not a scanning tool?
a) NMAP
b) Nexpose
c) Maltego
d) Nessus
View Answer
Answer: c
Explanation: NMAP is used for both reconnaissance and scanning purposes. Nepose and Nessus are
fully scanning tool. Maltego is an example of a reconnaissance tool used for acquiring information
about target user.
11. Which of the following comes after scanning phase in ethical hacking?
a) Scanning
b) Maintaining access
c) Reconnaissance
d) Gaining access
View Answer
Answer: d
Explanation: Gaining access is the next step after scanning. Once the scanning tools are used to look
for flaws in a system, it is the next phase where the ethical hackers or penetration testers have to
technically gain access to a network or system.
12. In __________ phase the hacker exploits the network or system vulnerabilities.
a) Scanning
b) Maintaining access
c) Reconnaissance
d) Gaining access
View Answer
Answer: d
Explanation: Penetration testers after scanning the system or network tries to exploit the flaw of the
system or network in “gaining access” phase.
a) Tunnelling
b) Buffer overflow
c) Session hijacking
d) Password cracking
View Answer
Answer: a
Explanation: Tunnelling is a method that is followed to cover tracks created by attackers and
erasing digital footprints. Buffer overflow, session hijacking and password cracking are examples of
gaining access to test the flaw in system or network.
14. Which of the below-mentioned penetration testing tool is popularly used in gaining access
phase?
a) Maltego
b) NMAP
c) Metasploit
d) Nessus
View Answer
Answer: c
1. A _________ can gain access illegally to a system if the system is not properly tested in scanning and
gaining access phase.
a) security officer
b) malicious hacker
c) security auditor
d) network analyst
View Answer
Answer: b
Explanation: Malicious hackers can gain illegal access at OS level, application level or network level
if the penetration testers or ethical hackers lack in testing and reporting the vulnerabilities in a
system.
2. In which phase, the hackers install backdoors so that his/her ownership with the victim’s system
can be retained later?
a) Scanning
b) Maintaining access
c) Maintaining Access
d) Gaining access
View Answer
Answer: c
Explanation: After gaining access to a system, the hacker needs to keep a path open so that he/she
in future can access the system. Therefore, backdoors are set which will later allow the attacker to
gain access through it easily.
a) Powersploit
b) Aircrack – ng
c) Snort
d) Nmap
View Answer
Answer: a
Explanation: The Powersploit is an access maintaining tool used for Windows systems. This tool is
used for gaining re-access to the victim’s system using PowerShell.
4. Which of the following hacking tools and techniques hackers’ do not use for maintaining access in
a system?
a) Rootkits
b) Backdoors
c) Trojans
d) Wireshark
View Answer
Answer: d
Explanation: Wireshark is not a tool for maintaining access because it is used for analysing network
protocols at a microscopic level (very minutely). It is an interactive tool for data traffic analysing on
any computer.
advertisement
a) Scanning
b) Tracks clearing
c) Reconnaissance
d) Gaining access
View Answer
Answer: b
Explanation: Tracks clearing or covering tracks is the name of the phase where the hackers delete
logs of their existence & other activity records they do during the hacking process. This step is
actually an unethical one.
6. Which of them is not a track clearing technique?
b) Tunnelling
c) Port Scanning
d) Footprint removing
View Answer
Answer: c
Explanation: Port scanning is a method used in the scanning phase. Altering or changing log files,
tunnelling for hiding your identity and removing footprints from different sites are examples of
clearing tracks.
a) Scanning
b) Tracks clearing
c) Reconnaissance
d) Reporting
View Answer
Answer: d
Explanation: In the reporting phase, the penetration tester or ethical hacker has to assemble all the
flaws along with the tools and processes used for detecting then and report it to the firm or
organization.
a) SuperScan
b) TcpView
c) Maltego
d) OWASP Zed
View Answer
Answer: c
1. ___________ is a special form of attack using which hackers’ exploit – human psychology.
b) Insecure network
c) Social Engineering
d) Reverse Engineering
View Answer
Answer: c
Explanation: Using social engineering techniques, hackers try to exploit the victim’s mind to gain
valuable information about that person such as his/her phone number, date of birth, pet name etc.
a) Tailgating
b) Phishing
c) Pretexting
d) Spamming
View Answer
Answer: d
Explanation: Spamming is the attack technique where the same message is sent indiscriminately
repeatedly in order to overload the inbox or harm the user.
3. _________ involves scams where an individual (usually an attacker) lie to a person (the target
victim) to acquire privilege data.
a) Phishing
b) Pretexting
c) Spamming
d) Vishing
View Answer
Answer: b
Explanation: In the pretexting technique of social engineering, the attacker pretends in need of
legitimate information from the victim for confirming his/her identity.
4. Which of the following is the technique used to look for information in trash or around dustbin
container?
a) Pretexting
b) Baiting
d) Dumpster diving
View Answer
Answer: d
Explanation: In the technology world, where information about a person seems everywhere;
dumpster diving is the name of the technique where the attacker looks for information in dustbins
and trashes. For example, after withdrawing money from ATM, the user usually throw the receipt in
which the total amount and account details are mentioned. These type of information becomes
helpful to a hacker, for which they use dumpster diving.
a) Dumpster diving
b) Shoulder surfing
c) Carding
d) Spear phishing
View Answer
Answer: c
Explanation: Carding is the method of trafficking of bank details, credit cards or other financial
information over the internet. Hence it’s a fraudulent technique used by hackers and does not
comes under social engineering.
advertisement
a) Emails
b) WI-FI network
c) Operating systems
d) Surveillance camera
View Answer
Answer: a
Explanation: In a phishing attack, the attacker fraudulently attempts to obtain sensitive data (such
as username & passwords) of the target user and use emails to send fake links which redirect them
to a fake webpage which looks legitimate.
a) Piggybacking
b) Pretexting
c) Phishing
d) Baiting
View Answer
Answer: a
Explanation: Piggybacking is the technique used for social engineering, as the attacker or
unauthorized person/individual follows behind an authorized person/employee & gets into an
authorized area to observe the system, gain confidential data or for a fraudulent purpose.
8. Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit
organizations.
a) True
b) False
View Answer
Answer: b
Explanation: Physical hacking, like other types of hacking, is possible in any institutions,
organizations, clinics, private firms, banks or any other financial institutions. Hence, the above
statement is false.
9. Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.
a) network security
b) physical security
c) database security
d) wireless security
View Answer
Answer: b
Explanation: When cyber-criminal gain access to an authorized area and steal pen drives and DVDs
which contain sensitive information about an employee or about the organization, then it can be
said that the physical security of the organization is weak.
10. ________ is the ability of an individual to gain physical access to an authorized area.
a) Network accessing
b) Database accessing
c) Remote accessing
d) Physical accessing
View Answer
Answer: d
Explanation: Physical accessing without prior security checking is the ability of a person to gain
access to any authorized area. Physical accessing is done using piggybacking or any other suspicious
means.
11. Which of the following is not considering the adequate measure for physical security?
d) Hide your hand against camera while inserting the PIN code
View Answer
Answer: c
Explanation: Keeping confidential files left open in the desk is not an adequate way of maintaining
physical security; as anyone can pick these up and perform physical hacking.
12. Which of the following is not a physical security measure to protect against physical hacking?
a) Add front desk & restrict unknown access to the back room
c) Analyze how employees maintain their physical data and data storage peripheral devices
d) Updating the patches in the software you’re working at your office laptop.
View Answer
Answer: d
Explanation: Updating the patches in your working software does not come under security
measures for physical hacking. Updating the patches will help your software get free from bugs and
flaws in an application as they get a fix when patches are updated.
13. IT security department must periodically check for security logs and entries made during office
hours.
a) True
b) False
View Answer
Answer: a
Explanation: Checking for security logs and entries made by employees and other outsiders who
entered the office can help in identifying whether any suspicious person is getting in and out of the
building or not.
b) Sneak-in
d) Phishing
View Answer
Answer: d
Explanation: Phishing does not come under physical security. Walk-in without proper authorization,
sneaking in through glass windows or other means and breaking in and stealing sensitive
documents are examples of physical hacking.
15. Physical _________ is important to check & test for possible physical breaches.
a) penetration test
b) security check
c) hacking
d) access
View Answer
Answer: a
1. ___________ ensures the integrity and security of data that are passing over a network.
a) Firewall
b) Antivirus
c) Pentesting Tools
d) Network-security protocols
View Answer
Answer: d
Explanation: The methods and processes in securing network data from unauthorized content
extraction are controlled by network-security protocols.
a) HTTPS
b) SSL
c) SMTP
d) SFTP
View Answer
Answer: c
Explanation: SMTP (is abbreviated as Simple Mail Transfer Protocol) is a standard protocol to
transmit electronic mail and is a widely used mail transmitting protocol.
a) POP3
b) SSMTP
d) S/MIME
View Answer
Answer: a
Explanation: POP (Post Office Protocol) is a simple protocol which fetches the updated mail stored
for you by the server. S/MIME (Secure/Multipurpose Internet Mail Extensions), SSMTP (Secure-
Simple Mail Transfer Protocol), and PGP (Pretty Good Privacy) are examples of protocols and
methods for secure mailing.
4. __________ is a set of conventions & rules set for communicating two or more devices residing in the
same network?
a) Security policies
b) Protocols
c) Wireless network
d) Network algorithms
View Answer
Answer: b
Explanation: Network protocols are designed with mechanisms for identifying devices and make
connections between them. In addition, some proper rules are defined as to how data packets will
be sent and received.
5. TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based
connection.
a) True
b) False
View Answer
Answer: a
Explanation: TLS which has now become SSL (Secure Socket Layer) is one of the popular
cryptographic protocols developed to provide security to computer network while communication.
advertisement
View Answer
Answer: d
Explanation: Hyper Text Transfer Protocol Secure (HTTPS) is a security protocol which maintains
security when data is sent from browser to server and vice versa. It denotes that all communication
setup between the browser and the server is encrypted.
View Answer
Answer: a
Explanation: SSL primarily focuses on maintaining the integrity of the data. Also, it maintains
authenticity which helps the customers feel secure to communicate over the internet.
View Answer
Answer: b
Explanation: For authenticating in SSL, a short message known as MAC (Message Authentication
Code) is used for authenticating a message; where both the sender & the receiver need to
implement the same key in order to start communicating.
a) IPSec
b) HTTPS
c) SMTP
d) S/MIME
View Answer
Answer: a
Explanation: IPSec (Secure Internet Protocol) is used for securing data at the network level by using
3 different protocols. These are Encapsulating Secure Payload (ESP), Authentication Header, and
Internet Key Exchange (IKE).
View Answer
Answer: d
Explanation: Secure/Multipurpose Internet Mail Extensions is the most popular protocol used to
send encrypted messages that are digitally signed. In this protocol, the encryption is done with a
digital sign in them.
11. Users are able to see a pad-lock icon in the address bar of the browser when there is _______
connection.
a) HTTP
b) HTTPS
c) SMTP
d) SFTP
View Answer
Answer: b
Explanation: It is when HTTPS (Hyper Text Transfer Protocol Secure) connection is built an
extended validation certificate is installed in the website for security reasons.
View Answer
Answer: c
Explanation: In the case of HTTP connection, data are sent as plain-text, which is easily readable by
hackers, especially when it is credit card details and personal information. But with the
incorporation of SSL certificate, communication becomes secure and data sent and received are
encrypted.
View Answer
Answer: a
Explanation: It is a secured FTP, where communication is made secured using SSH (Secure Shell)
which helps in secure transferring of files in both local as well as remote systems.
14. PCT is abbreviated as ________
View Answer
Answer: d
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: b
Explanation: For message encryption using PCT it requires two separate keys. Moreover, PCT has
more options for data formats and security algorithms.
a) version 1.1
b) version 1.2
c) version 2.1
d) version 1.3
View Answer
Answer: b
Explanation: The latest standard version of TLS is version 1.2. Version 1.3 is still in the development
stage.
View Answer
Answer: a
Explanation: Session Initiation Protocol is an important protocol used for starting, preserving and
terminating any real time sessions over the internet.
a) Instant Messaging
c) Internet telephony
d) Data Transferring
View Answer
Answer: d
Explanation: Session Initiation Protocol is used as real-time session maintaining and is used voice,
video as well as messaging applications for controlling multimedia communication sessions.
advertisement
View Answer
Answer: c
Explanation: Secure Real-time Transport Protocol is a real-time multimedia delivery protocol with
encryption for message integrity and authentication. It is used mostly in entertainment systems and
streaming media and sites.
View Answer
Answer: d
Explanation: Encapsulating Secure Payload is a special type of protocol used for offering integrity,
authentication, and confidentiality to network packets’ data in IPSec (Secure Internet Protocol).
View Answer
Answer: a
Explanation: Digital certificates are used for certifying the ownership of a public key and the entity
who issue those certificates is the Certificate Authority.
a) True
b) False
View Answer
Answer: a
a) Threat
b) Vulnerability
c) Exploit
d) Attack
View Answer
Answer: a
Explanation: Threat can be termed as a possible danger that may lead to breach the cyber security
and may cause possible harm to the system or the network.
a) Threat
b) Vulnerability
c) Exploit
d) Attack
View Answer
Answer: b
Explanation: Vulnerability is the term used to define weakness in any network or system that can
get exploited by an attacker. Exploiting the weakness can lead to the unexpected & undesirable
event in cyber security.
3. When any IT product, system or network is in need for testing for security reasons, then the term
used is called _________
a) Threat
b) Vulnerability
c) Target of Evaluation
d) Attack
View Answer
Answer: c
Explanation: Target of Evaluation is the term used when any IT infrastructure, system, network
require evaluation for security reasons or for fixing any bugs after being tested by penetration
testers.
a) Threat
b) Vulnerability
c) Exploit
d) Attack
View Answer
Answer: d
5. ________ is a way to breach the security by using the vulnerability of that system.
a) Threat
b) Vulnerability
c) Exploit
d) Attack
View Answer
Answer: c
Explanation: An exploit can be any data, piece of code, a program, sequence of commands or any
software that uses the vulnerability or flaw of a system and helps attackers or cyber-criminals cause
unanticipated behaviour.
advertisement
6. _________ is an act of hacking by the means of which a political or social message is conveyed.
a) Hacktivism
b) Whistle-blowing
c) Surveillance
d) Pseudonymization
View Answer
Answer: a
Explanation: Hacktivism is an act of defacing a website, or any network or system. Systems and
networks are compromised with a political or social agenda.
7. _______ is the method of developing or creating a structurally similar yet unauthentic and
illegitimate data of any firm or company.
a) Data copying
b) Data masking
c) Data breaching
d) Data duplicating
View Answer
Answer: b
Explanation: Data masking is the method used for developing or creating a structurally similar
version of data of any organization that is not authentic. These types of unauthentic data are
purposefully created for protecting the actual data.
a) Data obfuscation
b) Data copying
c) Data breaching
d) Data duplicating
View Answer
Answer: a
Explanation: Data obfuscation is the alternate term used for data masking, that is used for
developing or creating a structurally similar version of data of any organization that is not
authentic. These types of unauthentic data are purposefully created for protecting the actual data.
9. ________ automates an action or attack so that repetitive tasks are done at a faster rate.
a) Auto-bots
b) Cookie-bots
c) Robots
d) Bots
View Answer
Answer: d
Explanation: Bots are a set of codes written which helps to perform repetitive tasks at a much faster
rate than humans.
a) Trap doors
b) Front doors
c) Cover doors
d) Back entry
View Answer
Answer: a
Explanation: Trap-doors are hidden entry points in any already hacked system that is set to bypass
security measures.
a) banner
b) software
c) malware
d) shareware
View Answer
Answer: b
Explanation: Adware is software that is displayed on system or web pages for showing pre-chosen
ads.
12. ________ is an attack technique occurs when excess data gets written to a memory block.
a) Over buffering
b) Buffering
c) Buffer overflow
d) Memory full
View Answer
Answer: c
Explanation: Buffer overflow is a flaw that occurs in memory when excessive data is written which
makes the buffer allocated to seize.
13. Finding & publishing any user’s identity with the help of different personal details is called
________
a) Doxing
b) Data breaching
View Answer
Answer: a
Explanation: When an identity of internet user is discovered and published by following his/her
details over the internet is called doxing.
a) Internet Program
b) Internet Protocol
c) Intuition Programs
d) Internet Pathway
View Answer
Answer: b
15. Whaling is the technique used to take deep and _________ information about any individual.
a) sensitive
b) powerful
c) useless
d) casual
View Answer
Answer: a
View Answer
Answer: a
Explanation: It is important for ethical hackers and security professional to know how the cyber-
criminals think and proceed to target any system or network. This is why ethical hackers and
penetration testers are trained with proper ethics to simulate such a scenario as how the real cyber-
attack takes place.
2. Performing a shoulder surfing in order to check other’s password is ____________ ethical practice.
a) a good
b) not so good
d) a bad
View Answer
Answer: d
Explanation: Overlooking or peeping into someone’s system when he/she is entering his/her
password is a bad practice and is against the ethics of conduct for every individual. Shoulder surfing
is a social engineering attack approach used by some cyber-criminals to know your password and
gain access to your system later.
3. ___________ has now evolved to be one of the most popular automated tools for unethical hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
View Answer
Answer: c
Explanation: Malware is one of the biggest culprits that harm companies because they are
programmed to do the malicious task automatically and help hackers do illicit activities with
sophistication.
4. Leaking your company data to the outside network without prior permission of senior authority
is a crime.
a) True
b) False
View Answer
Answer: a
Explanation: Without prior permission of the senior authority or any senior member, if you’re
leaking or taking our your company’s data outside (and which is confidential), then it’s against the
code of corporate ethics.
5. _____________ is the technique used in business organizations and firms to protect IT assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach
View Answer
Answer: a
Explanation: Ethical hacking is that used by business organizations and firms for exploiting
vulnerabilities to secure the firm. Ethical hackers help in increasing the capabilities of any
organization or firm in protecting their IT and information assets.
advertisement
6. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
View Answer
Answer: b
Explanation: The legal risks of ethical hacking contains lawsuits due to disclosure of personal data
during the penetration testing phase. Such disclosure of confidential data may lead to a legal fight
between the ethical hacker and the organization.
7. Before performing any penetration test, through legal procedure, which key points listed below is
not mandatory?
View Answer
Answer: d
Explanation: Before performing any penetration test, through the legal procedure the key points
that the penetration tester must keep in mind are –
iii) the system and networks used in various departments and their confidential data that are sent
and received over the network.
8. An ethical hacker must ensure that proprietary information of the firm does not get leaked.
a) True
b) False
View Answer
Answer: a
Explanation: Yes, it is very important for an ethical hacker to make sure that while doing
penetration tests, the confidential data and proprietary information are preserved properly and not
get leaked to the external network.
9. After performing ____________ the ethical hacker should never disclose client information to other
parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
View Answer
Answer: c
Explanation: It is against the laws and ethics of ethical hackers that after doing penetration tests,
the ethical hacker should never disclose client information to other parties. The protection of client
data is in the hands of the ethical hacker who performed the tests.
10. __________ is the branch of cyber security that deals with morality and provides different theories
and a principle regarding the view-points about what is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
View Answer
Answer: d
Explanation: Ethics in cyber-security is the branch of cyber security that deals with morality and
provides different theories and principles’ regarding the view-points about what is right and what
need not to be done.
11. ________ helps to classify arguments and situations, better understand a cyber-crime and helps to
determine appropriate actions.
a) Cyber-ethics
b) Social ethics
c) Cyber-bullying
d) Corporate behaviour
View Answer
Answer: a
Explanation: Cyber-ethics and knowledge of proper ethical aspects while doing penetration tests
helps to classify arguments and situations, better understand a cyber crime and helps to determine
appropriate actions.
12. A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a
firm while evaluating the security postures.
c) hacking techniques
View Answer
Answer: a
1. ___________ is an activity that takes place when cyber-criminals infiltrates any data source and
takes away or alters sensitive information.
a) Data-hack
b) Data-stealing
c) Database altering
d) Data breach
View Answer
Answer: d
Explanation: Data breach an activity that takes place when cyber-criminals infiltrates any data
source and takes away or alters sensitive information. This is either done using a network to steal
all local files or get access physically to a system.
d) Exfiltration
View Answer
Answer: c
Explanation: During a hack, the cyber-criminals first do a research on the victim gathers
information on the victim’s system as well as network. Then perform the attack. Once the attacker
gains access it steals away confidential data.
View Answer
Answer: a
Explanation: Usually, cyber-criminals steal those data that are confidential and adds value once they
are sold to the dark-market or in different deep web sites. Even these days, different companies buy
customer data at large for analyzing data and gain profit out of it.
4. Which of the companies and organizations do not become the major targets of attackers for data
stealing?
a) Business firms
d) NGOs
View Answer
Answer: d
Explanation: Attackers target large organizations and firms that consists of business firms, financial
corporations, medical and healthcare firms, government and secret agencies, banking sectors.
They’ve valuable information which can cost them huge so major targets for hackers focuses such
firms only.
5. ___________ will give you an USB which will contain ___________ that will take control of your system
in the background.
a) Attackers, Trojans
d) Attackers, antivirus
View Answer
Answer: a
Explanation: To do a security breaching in your system, your friend or anyone whom you deal with
may come up with a USB drive and will give you to take from you some data. But that USB drive may
contain Trojan that will get to your computer once triggered. So try using updated antivirus in your
system.
advertisement
6. An attacker, who is an employee of your firm may ___________ to know your system password.
a) do peeping
c) do shoulder surfing
View Answer
Answer: c
Explanation: An attacker, who is an employee of your firm may do shoulder surfing to know your
system password. Shoulder surfing is a social engineering technique used to secretly peep to gain
knowledge of your confidential information.
7. You may throw some confidential file in a dustbin which contains some of your personal data.
Hackers can take your data from that thrown-away file also, using the technique _________
a) Dumpster diving
b) Shoulder surfing
c) Phishing
d) Spamming
View Answer
Answer: a
Explanation: Dumpster diving is a social engineering technique used by hackers to grab your
personal and confidential data from that thrown-away file also. Using these data attackers may use
password guessing or fraud calls (if they find your personal phone number).
8. ATM Skimmers are used to take your confidential data from your ATM cards.
a) True
b) False
View Answer
Answer: a
Explanation: ATM card skimmers are set up by attackers in ATM machines which look exactly same
but that secretly inserted machine will take information from the magnetic strip of your card and
store it in its memory card or storage chip.
9. _____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt
all the files and unlock the system.
a) Scareware
b) Ransomware
c) Adware
d) Spyware
View Answer
Answer: b
Explanation: Ransomware is special types of malware that will infect your system, compromise all
data by encrypting them and will pop up asking you for a ransom which will be in the form of
Bitcoins (so that the attacker do not get tracked) and once the ransom is paid, it will release all files.
10. ______________ are special malware programs written by elite hackers and black hat hackers to spy
your mobile phones and systems.
a) Scareware
b) Ransomware
c) Adware
d) Spyware
View Answer
Answer: d
Explanation: Spywares are special malware programs written by elite hackers and black hat hackers
to spies your mobile phones and systems. This program secretly spy on the target system or user
and takes their browsing activities, app details and keeps track of their physical locations.
11. The antivirus or PC defender software in a system helps in detecting virus and Trojans.
a) True
b) False
View Answer
Answer: a
Explanation: The antivirus or PC defender software in a system helps in detecting virus and Trojans
provided the antivirus or the defender application needs to be up-to-date.
12. Clicking a link which is there in your email which came from an unknown source can redirect
you to ____________ that automatically installs malware in your system.
c) malicious site
View Answer
Answer: c
Explanation: Clicking a link which is there in your email which came from an unknown source can
redirect you to a malicious site that will automatically install malware in your system. The mail will
be sent by the attacker.
13. An attacker may use automatic brute forcing tool to compromise your ____________
a) username
b) employee ID
c) system / PC name
d) password
View Answer
Answer: d
Explanation: In most of the cases, the attacker uses automated brute force tools for compromising
your PIN or password. This makes fetching of your password easier by a combination of different
letters as a trial-and-error approach.
14. The attacker will use different bots (zombie PCs) to ping your system and the name of the attack
is _________________
c) Denial-of-Service (DoS)
View Answer
Answer: a
Explanation: Here the attacker uses multiple PCs and floods the bandwidth/resources of the
victim’s system, (usually 1 or many web-servers). The attack uses zombie PCs and each of the PC’s
are remotely controlled by the attacker.
15. Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive,
documents or other components to make their hands dirty on your confidential information.
a) True
b) False
View Answer
Answer: a
a) Click-hacking
b) Click-fraud
c) Clickjacking
d) Using torrent links
View Answer
Answer: c
Explanation: Clickjacking is a malicious method used by cyber-criminals to trick a user into clicking
on something else which is illicit from what the user wants. The single click usually redirects the
employee to a strange site from where infected files get downloaded into the system of the
employee.
2. Through the clickjacking attack, the employee’s confidential ______________ may get leaked or
stolen.
a) information
b) papers
c) hardcopy files
d) media files
View Answer
Answer: a
Explanation: Through clickjacking, the employee’s system may get compromised by an infected
program, trojans or spyware which got downloaded in the background automatically as the user fell
into the trick of an attacker.
a) Employee’s authentication
b) Physical authorization
c) Access control
View Answer
Answer: b
Explanation: There are 3 main aspects that need to keep in mind when putting together new
employees or users into an application. These are: Representing users in the database, Access
control, and Employee’s authentication.
4. It is very important to block unknown, strange and ______________ within the corporate network.
a) infected sites
b) programs
c) unwanted files
d) important folders
View Answer
Answer: a
Explanation: It is very important to block unknown, strange and infected sites within the corporate
network, by the network administrator so that any employee may not accidentally access those sites
or open infected sites by means of clickjacking or URL-redirection techniques.
5. Every employee of the firm must need to have some basic knowledge of cyber-security and types
of hacking and how they are done.
a) True
b) False
View Answer
Answer: a
Explanation: Every employee of the firm must need to have some basic knowledge of cyber-security
and types of hacking and how they are done. This will make each employee aware of the various
malicious activities and can report to their seniors in this regard.
advertisement
6. Use of _______________ can bring external files and worms and virus along with it to the internal
systems.
a) smart-watch
b) pen drive
c) laptop
d) iPod
View Answer
Answer: b
Explanation: Use of pen drive to bring your work from home tasks to office systems may bring
worms and virus along with it (if your home system is infected with any malware or infected
programs) and may cause harm to your office systems.
7. A ____________ takes over your system’s browser settings and the attack will redirect the websites
you visit some other websites of its preference.
a) MiTM
b) Browser hacking
c) Browser Hijacker
d) Cookie-stealing
View Answer
Answer: c
Explanation: Browser hijacking is a technique that takes over your system’s browser settings and
the attack will redirect the websites you visit some other websites of its preference.
8. ________________ has become a popular attack since last few years, and the attacker target board
members, high-ranked officials and managing committee members of an organization.
a) Spyware
b) Ransomware
c) Adware
d) Shareware
View Answer
Answer: b
Explanation: Ransomware has become a popular attack since last few years, and the attacker target
board members, high-ranked officials and managing committee members of an organization; where
the ransomware compromise the system by encrypting all files and ask for some ransom in order to
unlock or decrypt all files.
9. ________________ important and precious file is a solution to prevent your files from ransomware.
a) Deleting all
b) Keeping backup of
c) Not saving
View Answer
Answer: b
Explanation: Keeping a secured backup of the important and precious file is a solution to prevent
your files from ransomware. The backup should have to be made in some secured cloud storage of
any other location (server) in an encrypted form.
10. ___________ is the technique to obtain permission from a company for using, manufacturing &
selling one or more products within a definite market area.
a) algorithm-licensing
b) code-licensing
c) item licensing
d) product licensing
View Answer
Answer: d
Explanation: Product licensing is the technique to obtain permission from a firm or organization for
using, manufacturing & selling one or more products within a definite market area. This is done by
the company for security reasons and usually takes a royal fee/amount from its users.
11. Which of the following do not comes under security measures for cloud in firms?
a) Firewall
b) Antivirus
c) Load Balancer
d) Encryption
View Answer
Answer: b
Explanation: For keeping cloud service secure and fully working, firewalls, encryption mechanisms
and load-balancers are used but antivirus is not used it could for any security purpose.
12. It is important to limit ____________ to all data and information as well as limit the authority for
installing software.
a) work-load
b) employee access
c) admin permission
View Answer
Answer: b
Explanation: It is important to limit employee access to all data and information as well as limit the
authority for installing software. Otherwise, any employee with illicit intention may install
programs that are either pirated version or may cause damage to the internal corporate network.
13. One must isolate payment systems and payment processes from those computers that you think
are used by ____________ or may contain ____________
a) strangers, keyloggers
b) strangers, antivirus
c) unknown, firewalls
d) unknown, antivirus
View Answer
Answer: a
Explanation: One must isolate payment systems and payment processes from those computers that
you think are used by strangers or may contain keyloggers. Otherwise, your card details and PIN
may get compromised.
14. If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking
you to update your security application, you must ignore it.
a) True
b) False
View Answer
Answer: b
1. The ____________ model is 7-layer architecture where each layer is having some specific
functionality to perform.
a) TCP/IP
b) Cloud
c) OSI
d) OIS
View Answer
Answer: c
Explanation: The OSI model is 7-layer architecture where each layer is having some specific
functionality to perform. All these layers work in collaboration for transmitting the data from 1
person to another worldwide.
Answer: a
Explanation: The OSI model is 7-layer architecture where each layer is having some specific
functionality to perform. All these layers work in collaboration for transmitting the data from 1
person to another worldwide.
View Answer
Answer: c
Explanation: Unauthorized network access is not an example of physical layer vulnerability. The rest
three – Physical theft of data & hardware, damage or destruction of data & hardware and keystroke
& Other Input Logging are physical layer vulnerabilities.
4. In __________________ layer, vulnerabilities are directly associated with physical access to networks
and hardware.
a) physical
b) data-link
c) network
d) application
View Answer
Answer: a
Explanation: In the physical layer, vulnerabilities are directly associated with physical access to
networks and hardware such as unauthorised network access, damage or destruction of data &
hardware and keystroke & Other Input Logging.
5. Loss of power and unauthorized change in the functional unit of hardware comes under problems
and issues of the physical layer.
a) True
b) False
View Answer
Answer: a
Explanation: Loss of power and unauthorized change in the functional unit of hardware comes
under problems and issues of the physical layer. Other such issues are unauthorised network access,
damage or destruction of data & hardware and keystroke & Other Input Logging.
advertisement
b) VLAN circumvention
View Answer
Answer: d
Explanation: MAC Address Spoofing, VLAN circumvention and switches may be forced for flooding
traffic to all VLAN ports are examples of data-link layer vulnerability.
7. ____________ is data-link layer vulnerability where stations are forced to make direct
communication with another station by evading logical controls.
a) VLAN attack
b) VLAN Circumvention
View Answer
Answer: b
Explanation: VLAN Circumvention is data-link layer vulnerability where stations are forced to make
direct communication with another station by evading logical controls implemented using subnets
and firewalls.
8. ________________may be forced for flooding traffic to all VLAN ports allowing interception of data
through any device that is connected to a VLAN.
a) Switches
b) Routers
c) Hubs
d) Repeaters
View Answer
Answer: a
Explanation: Switches may be forced for flooding traffic to all VLAN ports allowing interception of
data through any device that are connected to a VLAN. It is a vulnerability of data link layer.
a) Route spoofing
c) IP Address Spoofing
View Answer
Answer: d
c) Route spoofing
View Answer
Answer: b
Explanation: Physical theft of data is an example of physical layer vulnerability. Other such issues
are unauthorized network access, damage or destruction of data & hardware and keystroke & Other
Input Logging.
c) Route spoofing
View Answer
Answer: a
c) Route spoofing
View Answer
Answer: c
b) Route spoofing
View Answer
Answer: d
Explanation: Keystroke & other input logging is an example of physical layer vulnerability. Other
such physical layer vulnerabilities are unauthorized network access, damage or destruction of data
& hardware and keystroke & Other Input Logging.
b) VLAN circumvention
c) Route spoofing
View Answer
Answer: b
b) The Vulnerability that allows “fingerprinting” & other enumeration of host information
View Answer
Answer: d
Explanation: The different vulnerabilities of the Transport layer are mishandling of undefined,
poorly defined, Vulnerability that allow “fingerprinting” & other enumeration of host information,
Overloading of transport-layer mechanisms etc. Unauthorized network access is an example of
physical layer vulnerability.
View Answer
Answer: a
Explanation: Vulnerabilities of session layer of the OSI model are spoofing and hijacking of data
based on failed authentication attempts, weak or non-existent authentication mechanisms, and the
passing of session-credentials allowing intercept and unauthorized use.
3. Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in
which layer of the OSI model?
a) Physical layer
b) Data-link Layer
c) Session layer
d) Presentation layer
View Answer
Answer: c
Explanation: Session identification may be subject to spoofing may lead to data leakage which
depends on failed authentication attempts and allow hackers to allow brute-force attacks on access
credentials.
4. Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.
a) True
b) False
View Answer
Answer: a
Explanation: Transmission mechanisms can be subject to spoofing & attacks based on skilled
modified packets. This type of attacks is done in the transport layer of the OSI model.
a) Poor handling of unexpected input can lead to the execution of arbitrary instructions
View Answer
Answer: d
advertisement
c) Logical bugs in programs may be by chance or on purpose be used for crashing programs
d) Overloading of transport-layer mechanisms
View Answer
Answer: d
Explanation: Application design flaws may bypass security controls, inadequate security controls as
well as logical bugs in programs may be by chance or on purpose be used for crashing programs.
These all are part of application layer vulnerability.
View Answer
Answer: b
View Answer
Answer: a
View Answer
Answer: d
View Answer
Answer: b
1. TCP/IP is extensively used model for the World Wide Web for providing network
communications which are composed of 4 layers that work together.
a) True
b) False
View Answer
Answer: a
Explanation: TCP/IP is extensively used model for the World Wide Web for providing network
communications which are composed of 4 layers that work together. Each layer is composed of
header and payload.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: c
Explanation: TCP/IP is extensively used model for the World Wide Web for providing network
communications which are composed of 4 layers that work together. Each layer is composed of
header and payload.
3. Trusted TCP/IP commands have the same needs & go through the identical verification process.
Which of them is not a TCP/IP command?
a) ftp
b) rexec
c) tcpexec
d) telnet
View Answer
Answer: c
Explanation: Trusted TCP/IP commands such as ftp, rexec and telnet have the same needs & go
through the identical verification process. Internet & TCP/IP are often implemented synonymously.
4. Connection authentication is offered for ensuring that the remote host has the likely Internet
Protocol (IP) ___________ & _________
a) address, name
b) address, location
c) network, name
d) network, location
View Answer
Answer: a
Explanation: Connection authentication is offered for ensuring that the remote host has the likely
Internet Protocol (IP)’s address & name. This avoids a remote host to masquerade as an added
remote host.
5. Application layer sends & receives data for particular applications using Hyper Text Transfer
Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).
a) True
b) False
View Answer
Answer: a
Explanation: Application layer sends & receives data for particular applications using HyperText
Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP). Hence, data encryption for
HTTP and SMTP is important.
advertisement
a) True
b) False
View Answer
Answer: a
Explanation: Return of Bleichenbacher’s Oracle Threat is a transport layer vulnerability that allows
an attacker to get hold of the RSA key essential to decrypt TLS traffic below certain conditions.
View Answer
Answer: d
Explanation: Return of Bleichenbacher’s Oracle Threat is a transport layer vulnerability that allows
an attacker to get hold of the RSA key essential to decrypt TLS traffic below certain conditions.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: a
Explanation: There are two different versions of IPs used popularly over the internet. These are
IPv4 and IPv6. IPv4 is a 32-bits numeric address written in decimal with 4 numbers separated by
dots whereas IPv6 addresses are 128-bits written in hexadecimal & separated by colons.
9. ____________ is an attack where the attacker is able to guess together with the sequence number of
an in progress communication session & the port number.
a) TCP Spoofing
c) IP Spoofing
d) IP Blind Spoofing
View Answer
Answer: b
Explanation: TCP Blind Spoofing is an attack where the attacker is able to guess together with the
sequence number of an in progress communication session & the port number.
10. ___________ is an attack technique where numerous SYN packets are spoofed with a bogus source
address which is then sent to an inundated server.
View Answer
Answer: a
Explanation: SYN flooding attack is an attack technique where numerous SYN packets are spoofed
with a bogus source address which is then sent to an inundated server. The SYN & ACK segments
need to begin in a TCP connection.
11. Which of them is not an attack done in the network layer of the TCP/IP model?
a) MITM attack
b) DoS attack
c) Spoofing attack
d) Shoulder surfing
View Answer
Answer: d
Explanation: MITM, Denial of Service (DoS), and spoofing attacks are possible in the network layer
of the TCP/IP model. It is important to secure the network layer as it is the only means to make
certain that your application is not getting flooded with attacks.
View Answer
Answer: c
Explanation: Unused ports should be blocked, Unused interfaces and services should be disabled,
and Packet filtering needs to be enabled are some of the security measures that need to be taken for
the routers.
13. Which 2 protocols are used in the Transport layer of the TCP/IP model?
View Answer
Answer: b
Explanation: The transport layer can voluntarily declare the consistency of communications.
Transmission Control Protocol (TCP) & User Datagram Protocol (UDP) are the most common
transport layer protocols.
14. Which of the protocol is not used in the network layer of the TCP/IP model?
a) ICMP
b) IP
c) IGMP
d) HTTP
View Answer
Answer: d
Explanation: Internet Control Message Protocol (ICMP), Internet Protocol (IP) and Internet Group
Management Protocol (IGMP) are used in the network layer. HTTP is used in application layer of
TCP/IP model.
a) HTTP
b) DNS
c) TCP/IP
d) POP
View Answer
Answer: b
1. _____________ is the illicit transmission of data from inside an organization or personal system to an
external location or recipient.
a) Database hacking
b) Data leakage
c) Data cracking
d) Data revealing
View Answer
Answer: b
Explanation: Data leakage is the illicit transmission of data from inside an organization or personal
system to an external location or recipient. The phrase is used for describing data that is transferred
electronically or even physically.
2. Data leakage threats do not usually occur from which of the following?
d) Television
View Answer
Answer: d
Explanation: Data leakage threats are common from web and emails, mobile data storage devices
such as internal or external storage and memory cards, from USB drives and laptops.
a) data theft
b) data crack
View Answer
Answer: c
Explanation: Data leakage is also known as ‘low and slow data theft’, which is a massive issue for
data security & the damage caused to any firm is enormous. Every day there is at least one report of
data theft that occurs worldwide.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: b
Explanation: There are three major types of data leakage. These are – data breach by accident, data
leak done by ill-intentioned employees and electronic communication with malicious intent.
advertisement
5. “Unauthorized” data leakage doesn’t essentially mean intended or malicious.
a) True
b) False
View Answer
Answer: a
Explanation: “Unauthorized” data leakage doesn’t essentially mean intended or malicious. It has
been found that the majority of data leakage incidents are accidental but the loss occurred are
severe.
6. Unintentional data leakage can still result in the same penalties and reputational damage.
a) True
b) False
View Answer
Answer: a
Explanation: “Unintentional” data leakage doesn’t essentially mean intended or malicious. It has
been found that the majority of data leakage incidents are accidental but it can still result in the
same penalties and reputational damage.
7. When leakage of data is done purposely or because of the lack of employee’s concern toward
confidential data is called ___________ done by employees of an organization.
b) Malfunctioned in database
d) ill-intension of an outsider
View Answer
Answer: a
Explanation: When leakage of data is done purposely or because of the lack of employee’s concern
toward confidential data is called Ill-intentional data leakage done by employees of an organization.
8. Which of them is not an example of physical data leakage?
a) dumpster diving
b) shoulder surfing
d) phishing
View Answer
Answer: d
a) Data exfiltration
b) Data infiltration
c) Data cracking
d) Database hacking
View Answer
Answer: a
Explanation: Data exfiltration is the unauthorized movement of data. It comprises data exportation,
data extrusion, data leakage, and data theft and all of them come under data hacking.
a) Dumpster diving
b) MiTM
c) DDoS
d) Phishing
View Answer
Answer: a
Explanation: Physical data leakage can be done intentionally by criminal-minded people who can
fetch data from dumpster diving, shoulder surfing, data mentioned in printed papers or taken out of
photocopiers.
3. Which of them is not an example of data leakage done using electronic communication with
malicious intent?
a) Phishing
b) Spoofed Email
d) Dumpster diving
View Answer
Answer: d
Explanation: Many organizations provide employees right to use the internet, emails as well as
instant messaging as part of their role. But these are prior targets of hackers for data leaking using
techniques such as phishing, spoofing and attacking target victim using malware.
4. The three steps of data loss prevention are – Identify, Discover and______________
a) Classify
b) Clarify
c) Deletion
d) Detection
View Answer
Answer: a
Explanation: The three steps of data loss prevention are – Identify, Discover and Classify. First, you
have to identify the systems of records. Then you’ve to classify what comprises of sensitive data on
those systems & discover the data elements which are sensitive depending on those classifications.
advertisement
5. Which of the following is not a step of data-loss prevention?
a) Identify
b) Manage
c) Classify
d) Discover
View Answer
Answer: b
Explanation: The three steps of data loss prevention are – Identify, Discover and Classify. First, you
have to identify the systems of records. Then you’ve to classify what comprises of sensitive data on
those systems & discover the data elements which are sensitive depending on those classifications.
6. Mapping of data-flow in an organization is very useful in understanding the risk better due to
actual & potential data leakage.
a) True
b) False
View Answer
Answer: a
Explanation: Mapping of data-flow in an organization from different systems (to record the
downstream and upstream sources) is very useful in understanding the risk better due to actual &
potential data leakage.
7. Data leakage prevention is based on factors like access controls, persistent, encryption, alerting,
tokenization, blocking dynamic data masking, etc.
a) True
b) False
View Answer
Answer: a
Explanation: Data leakage prevention is based on factors like access controls, persistent, encryption,
alerting, tokenization, blocking dynamic data masking, etc. Like data loss prevention, data leakage
also needs concern and care for data safety.
8. Data leakage threats are done by internal agents. Which of them is not an example of an internal
data leakage threat?
View Answer
Answer: a
Explanation: Data leak by 3rd Party apps is an example of malicious outsider threat that falsely
gained access by masquerading itself. Data leak by business partners, employees or from stolen
credentials are insider’s data-leakage threats.
9. _____________ focuses on the detection & prevention of sensitive data exfiltration and lost data.
View Answer
Answer: a
a) Fingerprinting
b) 3D printing
c) Footprinting
d) Data printing
View Answer
Answer: c
Explanation: Footprinting is a component of the reconnaissance stage that is used to gather possible
information for a target computer system or network. It can be either active or passive footprinting.
a) 5
b) 4
c) 3
d) 2
View Answer
Answer: d
Explanation: Footprinting is a component of the reconnaissance stage that is used to gather possible
information for a target computer system or network. It can be of 2 types: active or passive
footprinting.
a) Fingerprinting
b) 3D printing
c) Footprinting
d) Data printing
View Answer
Answer: c
Explanation: Footprinting is a component of the reconnaissance stage that is used to gather possible
information for a target computer system or network. It can be either active or passive footprinting.
4. A/An ______________ spends 85% of his/her time in profiling an organization and rest amount in
launching the attack.
a) security analyst
b) attacker
c) auditor
d) network engineer
View Answer
Answer: b
Explanation: An attacker spends 85% of his/her time in profiling an organization and rest amount
in launching the attack. Footprinting results in a unique organization profile with respect to the
networks.
a) Fingerprinting
b) 3D printing
c) Footprinting
d) Data printing
View Answer
Answer: c
advertisement
6. Which of the following is not a spot from where attackers seek information?
a) Domain name
b) IP address
c) System enumeration
d) Document files
View Answer
Answer: d
Explanation: Internet is a common medium for gathering information such as from Domain name,
IP address of the target user, enumeration of victim’s system, IDSes running, TCP & UDP services
etc.
7. Which of them is not an information source over the internet for target attackers?
a) Whois
b) YouTube
c) Nslookup
d) Archive sites
View Answer
Answer: b
Explanation: Information can be available free from some sites and databases residing on the
internet. These services and sites are – Whois, Nslookup, Archive Sites, open-source software sites
etc.
8. Footprinting is used to collect information such as namespace, employee info, phone number and
emails, job details.
a) True
b) False
View Answer
Answer: a
Explanation: Footprinting is used to collect information such as namespace, employee info, phone
number and emails, job details, IP address domain name, geo-location, browsing history etc.
b) company details
c) plug-ins used
d) browser details
View Answer
Answer: a
Explanation: Spywares can be used to steal browsing history, browsing habits and other related
searches from the attacker’s browser. Google chrome itself has a search box in the address bar
which the spyware might monitor to take search results as information for the attacker.
10. https://archive.org is a popular site where one can enter a domain name in its search box for
finding out how the site was looking at a given date.
a) True
b) False
View Answer
Answer: a
Explanation: https://archive.org is a popular archive site where one can enter a domain name in its
search box for finding out how the site was looking at a given date. It stores all the details about the
look and working of the site, even when the site got updated.
11. Information about people is available people search sites. Which of them is an example of people
data searching site?
a) people.com
b) indivinfo.org
c) intelius.com
d) peopleinfo.org
View Answer
Answer: c
Explanation: Information about people is available people search sites. https://www.intelius.com/
is an example of such site which holds records of people’s information.
12. You can attain a series of IP addresses allotted to a particular company using __________ site.
a) https://www.ipdata.org/
b) https://www.arin.net/
c) https://www.ipip.com/
d) https://www.goipaddr.net/
View Answer
Answer: b
Explanation: Hackers can attain a series of IP addresses allotted to a particular company using
https://www.arin.net/ site. Hackers can enter the company name in the search box for finding a list
of all the assigned IP addresses.
View Answer
Answer: a
Explanation: ARIN is abbreviated as American Registry for Internet Numbers. Hackers can attain a
series of IP addresses allotted to a particular company using https://www.arin.net/ site. Hackers
can enter the company name in the search box for finding a list of all the assigned IP addresses.
a) active
b) passive
View Answer
Answer: a
15. Collecting freely available information over the internet is an example of ____________ type of
information gathering.
a) active
b) passive
d) non-passive
View Answer
Answer: b
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: b
Explanation: There are a total of three types of scanning in ethical hacking and cyber-security.
These are vulnerability scanning, network scanning & port scanning.
View Answer
Answer: d
Explanation: Detection of the live system running on the network, discovering the IP address of the
target system, & discovering the services running on the target system are some of the objectives of
scanning.
3. For discovering the OS running on the target system, the scanning has a specific term. What is it?
a) Footprinting
b) 3D Printing
c) Fingerprinting
d) screen-printing
View Answer
Answer: c
Explanation: Fingerprinting is the name of that specific type of scanning For discovering the OS
running on the target system in a network which comes under OS scanning technique.
d) Identifying of services
View Answer
Answer: c
Explanation: Check for live systems, open ports and identification of services running on the
systems are some of the steps and methodologies used in scanning.
a) open systems
b) live systems
c) malfunctioned systems
d) broken systems
View Answer
Answer: b
Explanation: Check for live systems, open ports and identification of services running on the
systems are some of the steps and methodologies used in scanning. ICMP scanning is used for
checking live systems.
advertisement
6. In live system scanning, it is checked which hosts are up in the network by pinging the systems in
the network.
a) True
b) False
View Answer
Answer: a
Explanation: Check for live systems, open ports and identification of services running on the
systems are some of the steps and methodologies used in scanning. In live system scanning, it is
checked which hosts are up in the network by pinging the systems in the network.
a) -time
b) -t
c) -p
d) -tout
View Answer
Answer: b
Explanation: -t attribute is used while pinging any system to tweak the ping timeout value. It is an
example of live system scanning, to check which hosts are up in the network by pinging the systems
in the network.
b) Workgroup name
c) MAC address
d) RAM space
View Answer
Answer: d
Explanation: Scanning using IP address simply pings each IP address for checking if it is live or not.
This helps in providing NETBIOS information such as the name of the system, workgroup and MAC
address.
9. A ______________ is a simple network scanning technique used for determining which range of IP
address map to live hosts.
a) scan sweep
b) ping sweep
c) scan ping
d) host ping
View Answer
Answer: b
Explanation: A ping sweep is a simple network scanning technique used for determining which
range of IP address map to live hosts. The ping sweep consists of ICMP ECHO requests.
a) ICMP Sweep
b) ICMP Call
c) IGMP Sweep
d) ICMP pinging
View Answer
Answer: a
Explanation: Ping sweep is also known as ICMP sweep is a simple network scanning technique used
for determining which range of IP address map to live hosts. The ping sweep consists of ICMP ECHO
requests.
11. If any given address is running live, it will return an ICMP ECHO reply.
a) True
b) False
View Answer
Answer: a
Explanation: ICMP sweep is a simple network scanning technique used for determining which range
of IP address map to live hosts. The ping sweep consists of ICMP ECHO requests. If any given
address is running live, it will return an ICMP ECHO reply.
12. __________ scanning is done when a series of messages are sent by someone keeping in mind to
break into a computer.
a) Network
b) Port
c) Vulnerability
d) System
View Answer
Answer: b
Explanation: Scanning is done when a series of messages are sent by someone keeping in mind to
break into a computer to learn about computer network services.
a) Network
b) Port
c) Vulnerability
d) System
View Answer
Answer: a
Explanation: Network scanning is a procedure to identify active hosts on your network. It is done
with the intention to either attack your system or for security purposes by ethical hackers.
14. _____________ scanning is an automatic process for identifying vulnerabilities of the system within
a network.
a) Network
b) Port
c) Vulnerability
d) System
View Answer
Answer: c
a) Network
b) Port
c) Vulnerability
d) System
View Answer
Answer: d
a) 5
b) 7
c) 10
d) 12
View Answer
Answer: c
Explanation: There are a total of 10 types of virus. These are categorized based on their working
and characteristics. These are System or Boot Sector Virus, Direct Action Virus, Resident Virus,
Multipartite Virus, Polymorphic Virus, Overwrite Virus, Space-filler Virus, File infectors, Macro
Virus, Rootkit virus.
a) Boot sector
b) Polymorphic
c) Multipartite
d) Trojans
View Answer
Answer: d
Explanation: Types of viruses are System or Boot Sector Virus, Direct Action Virus, Resident Virus,
Multipartite Virus, Polymorphic Virus, Overwrite Virus, Space-filler Virus, File infectors, Macro
Virus, Rootkit virus. Trojan does not come under types of virus.
3. A computer ________ is a malicious code which self-replicates by copying itself to other programs.
a) program
b) virus
c) application
d) worm
View Answer
Answer: b
Explanation: A computer virus is a malicious code which self-replicates by copying itself to other
programs. The computer virus gets spread by itself into other executable code or documents. The
intention of creating a virus is to infect vulnerable systems.
a) Infected website
b) Emails
d) USBs
View Answer
Answer: c
Explanation: The ideal means of spreading computer virus are through emails, USB drives that are
used portable and injected and ejected in different systems as well as from infected websites.
Antivirus selling vendors do not place a virus in their CDs and DVDs.
a) 1979
b) 1980
c) 1981
d) 1982
View Answer
Answer: c
Explanation: In mid-1981, the 1st virus for Apple computers with the name Apple II came into
existence. It was also called Elk Cloner, which resided in the boot sectors of a 3.3 floppy disk.
advertisement
6. In mid-1981, the 1st virus for Apple computers with the name _________ came into existence.
a) Apple I
b) Apple II
c) Apple III
d) Apple Virus
View Answer
7. The virus hides itself from getting detected by ______ different ways.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: b
Explanation: The virus hides itself from getting detected in three different ways. These are by
encrypting itself, by altering the disk directory with additional virus bytes or it uses stealth
algorithm to redirect disk data.
8. _______________ infects the master boot record and it is challenging and a complex task to remove
this virus.
b) Polymorphic
c) Multipartite
d) Trojans
View Answer
Answer: a
Explanation: Boot Sector Virus infects the master boot record & it is a challenging & a complex task
to remove such virus. Mostly such virus spreads through removable devices.
9. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the
specific type of files which it infects.
c) Polymorphic Virus
d) Multipartite Virus
View Answer
Answer: b
Explanation: Direct Action Virus gets installed & stays hidden in your computer’s memory. Such
type of virus stays involved to the specific type of files which it infects.
a) Non-resident virus
c) Polymorphic Virus
d) Multipartite Virus
View Answer
Answer: a
Explanation: Direct Action Virus is also known as a non-resident virus which gets installed & stays
hidden in your computer’s memory. Such type of virus stays involved to the specific type of files
which it infects.
a) Non-resident virus
c) Polymorphic Virus
d) Multipartite Virus
View Answer
Answer: d
Explanation: Multipartite Virus infects the executables as well as the boot sectors. It infects the
computer or get into any system through multiple mediums and are hard to remove.
12. ______________ are difficult to identify as they keep on changing their type and signature.
a) Non-resident virus
c) Polymorphic Virus
d) Multipartite Virus
View Answer
Answer: c
Explanation: Polymorphic Virus is difficult to identify as they keep on changing their type and
signature. They’re not easily detectable by traditional antivirus. It usually changes the signature
pattern whenever it replicates itself.
a) Non-resident virus
b) Overwrite Virus
c) Polymorphic Virus
d) Multipartite Virus
View Answer
Answer: b
Explanation: Overwrite virus deletes all files that it infects. It can be removed by only deleting those
infected files. Mostly, it gets spread via emails.
a) Non-resident virus
b) Overwrite Virus
c) Polymorphic Virus
d) Space-filler Virus
View Answer
Answer: d
Explanation: Space-fillers are a special type of virus which usually does not cause any serious harm
to the system except it fills up the empty space in memory and codes leading to wastage of memory.
15. Which of the below-mentioned reasons do not satisfy the reason why people create a computer
virus?
a) Research purpose
b) Pranks
c) Identity theft
d) Protection
View Answer
Answer: d
1. A ___________ is a small malicious program that runs hidden on infected system.
a) Virus
b) Trojan
c) Shareware
d) Adware
View Answer
Answer: b
Explanation: A Trojan is a small malicious program that runs hidden on the infected system. They
are created with the intent and they infected the system by misleading the user. It works in the
background and steals sensitive data.
a) Virus
b) Shareware
c) Trojan
d) Adware
View Answer
Answer: c
Explanation: Trojans are malicious files designed to work hidden on the infected system. They are
intended to infect the system by misleading the user. It works in the background and steals sensitive
information about the target user.
3. By gaining access to the Trojaned system the attacker can stage different types of attack using
that ____________ program running in the background.
a) Trojan
b) Virus
c) Antivirus
d) Anti-malware
View Answer
Answer: a
Explanation: By gaining access to the Trojaned system the attacker can stage different types of
attack using that Trojan program running in the background when the infected user’s system goes
online.
b) Confidential data
c) Important documents
View Answer
Answer: d
Explanation: Trojan creators do not look for securing victim’s system with their programs, rather
they create such trojans for stealing credit card and financial details as well as important
documents and files.
a) IM
b) Attachments
View Answer
Answer: c
Explanation: Official product sites such as Microsoft’s site giving the option for downloading their
updates and OS won’t contain any Trojans. Other than that Trojans can access your system by email
attachments, Instant Messaging apps, un-trusted sites & links.
advertisement
6. Which of the following port is not used by Trojans?
a) UDP
b) TCP
c) SMTP
d) MP
View Answer
Answer: d
Explanation: MP is not a valid port name and does not have any port number also. But usually,
Trojans likeBack Orifice, Deep Throat use UDP port; Trojans like Netbus, Master Paradise uses TCP
& SMTP port to gain access to a system.
a) Deleting Data
b) Protecting Data
c) Modifying Data
d) Copying Data
View Answer
Answer: b
Explanation: Trojans perform malicious actions and operations. These are to modify data, copy data
to its creator, delete data from the infected system or blocking data by carrying ransomware or
other malicious programs along with it.
8. Some Trojans carry ransomware with them to encrypt the data and ask for ransom.
a) True
b) False
View Answer
Answer: a
Explanation: Trojans are usually created to carry out the following actions like: modify data, copy
data to its creator, delete data from the infected system or blocking data by carrying ransomware
embedded in it.
9. Once activated __________ can enable ____________to spy on the victim, steal their sensitive
information & gain backdoor access to the system.
a) virus, cyber-criminals
c) trojans, cyber-criminals
View Answer
Answer: c
Explanation: Once activated, trojans can enable cyber-criminals to spy on the victim, steal their
sensitive information & gain backdoor access to the system.
a) steal data
b) self-replicate
View Answer
Answer: b
Explanation: A Trojan is a malicious program that runs hidden on the infected system. They are
developed with the intent and they infected the system by misleading the user. It works behind the
system and steals sensitive data but cannot self-replicate.
11. A _______________ provides malicious users remote control over the targeted computer.
a) DDoS-Trojan
b) Backdoor Trojan
c) Trojan-Banker
d) Trojan-Downloader
View Answer
Answer: b
Explanation: A Backdoor Trojan provides malicious users remote control over the targeted
computer. These trojans enable the author to perform anything they desire on the infected system
which includes sending, receiving, launching & deleting files.
12. _______________ programs are specially designed for stealing your account data for online banking
systems, e-payment services & credit/debit cards.
a) DDoS-Trojan
b) Backdoor Trojan
c) Trojan-Banker
d) Trojan-Downloader
View Answer
Answer: c
Explanation: Trojan-Banker is programs are specially designed for stealing your account data for
online banking systems, e-payment services & credit/debit cards. They work silently in the back of
the system process to steal such data.
13. ______________ perform automated DoS (Denial of Service) attacks on a targeted web address.
a) DDoS-Trojan
b) Backdoor Trojan
c) Trojan-Banker
d) Trojan-Downloader
View Answer
Answer: a
Explanation: DDoS Trojan performs automated DoS (Denial of Service) attacks on a targeted web
address. By sending multiple requests from your system, it can target different websites which can
lead to a Denial of Service attack.
14. Trojan-Downloader is a special type of trojans which can download & install new versions of
malicious programs.
a) True
b) False
View Answer
Answer: a
Explanation: Trojan-Downloader is another type of trojans that can download & install new
versions of malicious programs. They work secretly & keep on downloading other malicious
programs when the system is online.
15. ____________ work in background & keeps on downloading other malicious programs when the
system is online.
a) DDoS-Trojan
b) Backdoor Trojan
c) Trojan-Banker
d) Trojan-Downloader
View Answer
Answer: d
1. __________ is a naming system given to different computers which adapt to human-readable domain
names.
a) HTTP
b) DNS
c) WWW
d) ISP
View Answer
Answer: b
Explanation: DNS is a naming system given to different computers that adapt to human-readable
domain names. For example, Google.co.in has a computer-readable IP address which is 8.8.8.8 &
8.8.4.4 as the primary & secondary DNS addresses.
View Answer
Answer: c
Explanation: Domain Name System can be compared to the phonebook of the WWW. Users’ access
information over the web through these human readable domain names. For example
www.google.co.in gas computer-readable IP address which is 8.8.8.8 & 8.8.4.4 as the primary &
secondary DNS addresses.
3. Some security issues might exist owing to misconfigured __________________ which can direct to
disclosure of information regarding the domain.
a) DNS names
b) HTTP setup
c) ISP setup
d) FTP-unsecured
View Answer
Answer: a
Explanation: Some security issues might exist owing to misconfigured DNS names which can direct
to disclosure of information regarding the domain. DNS adapts to human readable domain names.
4. ______________ is a form of nasty online attack in which a user gets redirects queries to a DNS
because of override of system’s TCP/IP settings.
a) DNS mal-functioning
b) DNS cracking
c) DNS redirecting
d) DNS hijacking
View Answer
Answer: d
Explanation: Misconfigured DNS names which can direct to disclosure of information regarding the
domain. DNS hijacking is a form of nasty online attack in which a user gets redirects queries to a
DNS because of override of system’s TCP/IP settings.
5. _____________ can be attained by the use of malware or by changing the server’s settings.
a) DNS poisoning
b) DNS cracking
c) DNS hijacking
d) DNS redirecting
View Answer
Answer: c
Explanation: DNS hijacking is a form of nasty online attack in which a user gets redirects queries to
a DNS because of override of system’s TCP/IP settings. It can be attained by the use of malware or
by changing the server’s settings.
advertisement
a) 4
b) 2
c) 3
d) 5
View Answer
Answer: b
Explanation: There are two main types of DNS hijacking. These are by infecting the computer with
malware or DNS trojans and the other type is hacking the target website and changes its DNS
address.
a) True
b) False
View Answer
Answer: a
Explanation: DNS hijacking is a form of nasty online attack in which a user gets redirects queries to
a DNS because of override of system’s TCP/IP settings. There are two main types of DNS hijacking.
These are by infecting the computer with malware or DNS trojans.
8. The _______________ matches and maps to the user friendly domain name.
a) HTTP
b) DNS
c) WWW
d) ISP
View Answer
Answer: b
Explanation: The DNS matches for directing the user-friendly domain name (like google.co.in) to its
equivalent IP address. DNS servers are typically owned by any ISPs or other business organizations.
9. Which of the following is not an example of DNS hijacking?
View Answer
Answer: d
Explanation: DNS hijacking is a form of nasty online attack in which a user gets redirects queries to
a DNS because of override of system’s TCP/IP settings. ISP DNS hijacking, DNS hijacking for
phishing, DNS hijacking for pharming are some of the examples of DNS hijacking attack.
10. A ______________ is essentially a text file residing on the server that hosts different domain
containing entries for dissimilar resource records.
a) Zone file
b) Robot file
c) Bot file
d) DNS file
View Answer
Answer: a
Explanation: A Zone file is essentially a text file residing on the server that hosts different domain
containing entries for dissimilar resource records. It is used in DNS hijacking.
11. ______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based
vulnerabilities for diverting the traffic of the internet.
a) DNS poisoning
b) DNS re-routing
c) DNS cracking
Answer: a
Explanation: DNS cache poisoning which is also termed as DNS spoofing, is a kind of attack which
uses DNS based vulnerabilities for diverting the traffic of the internet away from genuine servers.
12. DNS poisoning is very dangerous because it can extend its reach from one ___________ to another.
a) ISP server
b) DNS server
c) Linux server
d) Domain user
View Answer
Answer: b
Explanation: DNS poisoning which is also termed as DNS spoofing is a kind of attack which uses
DNS based vulnerabilities for diverting the traffic of the internet. DNS poisoning is very dangerous
because it can extend its reach from one DNS server to another.
13. A _________________ can be poisoned if it is having an erroneous entry where the invader gets to
organize the DNS server & change different kinds of information on it.
a) Server data
b) Domain name
c) DNS cache
d) System file
View Answer
Answer: c
Explanation: A DNS cache can be poisoned if it is having an erroneous entry where the invader gets
to organize the DNS server & change different kinds of information on it. DNS poisoning is very
dangerous because it can extend its reach from one DNS server to another.
14. The ____________ Domain Name Server data will get spread to the ISPs & will be cached there.
a) working
b) compromised
c) corrupted
d) poisoned
View Answer
Answer: d
Explanation: DNS cache poisoning is a kind of attack which uses DNS based vulnerabilities for
diverting the traffic of the internet. The poisoned Domain Name Server data will get spread to the
ISPs & will be cached there.
15. The user could be influenced by DNS hijacking if the government of that country uses DNS
redirecting as a mechanism to mask censorship.
a) True
b) False
View Answer
Answer: a
1. A ___________ consists of at least one bot server or controller and one or more client-bots.
a) Virus
b) Trojan
c) Botnet
d) Adware
View Answer
Answer: c
Explanation: The botnet comprises one bot server or controller and one or more client-bots.
Botnets are managed by bot-herders. They have become major threats to security as they are
getting popular in the cyber-crime world.
2. Botnets are managed by ______________
a) Bot-holders
b) Bot-herders
c) Bot-trainers
d) Bot-creators
View Answer
Answer: b
Explanation: A botnet consists of at least one bot server or controller and one or more client-bots.
Botnets are managed by bot-herders. The exact term is bot herders.
a) Trojan
b) Virus
c) Worms
d) Botnet
View Answer
Answer: d
4. _____________ are implemented to carry out distributed DDoS attacks, steal data, send spam
messages & permits the hacker to access various devices & its connection.
a) Trojan
b) Virus
c) Botnet
d) Worms
View Answer
Answer: c
Explanation: Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam
messages & permits the hacker to access various devices & its connection.
a) Perform DDoS
c) Spamming
View Answer
Answer: d
Explanation: Botnets usually are not used for encrypting files for ransom. Botnets are implemented
to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to
access various devices & its connection.
advertisement
6. The owner of botnets can control the botnet using ___________________ software.
a) trojans
c) servers
d) infected servers
View Answer
Answer: b
Explanation: A botnet owner can govern and manage the botnet through command & programs.
Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam messages &
permits the hacker to access various devices & its connection.
View Answer
Answer: a
Explanation: The owner of botnets can control the botnet using command & control (C&C)
software. Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam
messages & permits the hacker to access various devices & its connection.
a) robot, network
b) rocket, network
c) bot, network
d) bot, internet
View Answer
Answer: a
Explanation: The word “botnet” is a blend of the words robot & network. Botnets usually are not
used for encrypting files for ransom. They are implemented to carry out distributed DDoS attacks,
steal data, send spam messages and compromise various services & its connection.
a) Smart-phones
b) IoT devices
c) Computer systems
d) Modems
View Answer
Answer: d
Explanation: Botnets are logical connections of smart-phones, IoT devices, computer systems etc.
They are strong enough to carry out distributed denial of service attacks & permit hackers to access
various devices & its connection.
10. Infected computers and other systems within the botnet are called __________
a) killers
b) vampires
c) zombies
d) gargoyles
View Answer
Answer: c
Explanation: Attackers use the botnet for connecting of smart-phones, IoT devices, computer
systems etc. These infected computers and other systems within the botnet connection are called
zombies or zombie computers.
11. The bot program allows the bot-herders to perform all operations from a ___________ location.
a) local
b) open
c) corporate
d) remote
View Answer
Answer: d
Explanation: Infected computers and other systems within the botnet are called zombies systems
which are controlled by bot programs that allow the bot-herders to perform all operations from a
remote location.
12. Nowadays, most botnets rely on existing _______________ networks for communication.
a) server-to-server
b) peer-to-peer
c) client-to-server
d) host-to-server
View Answer
Answer: b
Explanation: Botnets are compromised connectivity of systems like smart-phones, IoT devices,
computer systems etc. Now-a-days, most botnets rely on existing peer-to-peer networks for
communication.
a) Zeus
b) GameOver
c) ZeroAccess
d) MyDoom
View Answer
Answer: d
Explanation: Examples of some popular botnets are gameover, ZeroAccess, and Zeus. The infect
computers & other systems and turned them into zombies which are also called zombies systems.
a) Zeus
b) ILOVEYOU
c) Storm Worm
d) MyDoom
View Answer
Answer: a
Explanation: Botnets are can compromise any system and turn them into zombie computers.
GameOver, Zeus etc. are examples of some popular botnets programs.
a) Slammer
b) GameOver
c) Stuxnet
d) Anna Kournikova
View Answer
Answer: b
a) Phishing
b) DoS
c) Sniffing
d) MiTM
View Answer
Answer: c
Explanation: Sniffing is data interception method used by hackers. Sniffing is the method used to
monitor & capture all data packets passing through any target network using sniffing tools.
a) network-tapping
b) wiretapping
c) net-tapping
d) wireless-tapping
View Answer
Answer: b
Explanation: Sniffing which is also known as wiretapping is data interception method used by
hackers. It is a technique used for monitoring & capturing all data packets passing through any
target network.
3. _____________ are programs or devices that capture the vital information from the target network or
particular network.
a) Routers
b) Trappers
c) Wireless-crackers
d) Sniffers
View Answer
Answer: d
Explanation: Sniffing is data interception method used by cyber-criminals. Sniffers are programs or
devices that capture vital information from the target network or particular network.
a) Fetching passwords
b) Email texts
View Answer
Answer: d
Explanation: The method used to capture data packets through any target network is called sniffing.
The various objectives of sniffing for hackers are fetching passwords, email texts and the type of
files transferred.
b) ISP details
c) Email Traffic
d) Web Traffic
View Answer
Answer: b
Explanation: Sniffing is data interception method and is not used for sniffing ISP details. It is
particularly used for capturing router configuration, email traffic & web traffic.
advertisement
a) Cloud sessions
b) FTP passwords
c) Telnet passwords
d) Chat sessions
View Answer
Answer: a
Explanation: Sniffing technique is used to monitor packets of target network using sniffer programs.
It cannot sniff cloud sessions. It is used to capture and monitor router configuration, Telnet
passwords, chat sessions etc.
a) HTTP
b) SMTP
c) POP
d) TCP
View Answer
Answer: d
Explanation: The technique used to supervise & confine all data packets through any target network
is called sniffing. HTTP, SMTP, POP are some protocols that are susceptible to sniffing.
a) NNTP
b) UDP
c) FTP
d) IMAP
View Answer
Answer: b
Explanation: NNTP, FTP, POP and IMAP are some protocols that are susceptible to sniffing. UDP
protocol is not susceptible to sniffing attack. Sniffing is mainly used for capturing email traffic,
router’s configuration, & web traffic.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: a
Explanation: Sniffing is data surveillance technique used by hackers and is used to keep an eye on as
well as detain all data packets with the help of sniffing tools. There are two types of sniffing attacks.
These are passive sniffing and active sniffing.
10. Active sniffing is difficult to detect.
a) True
b) False
View Answer
Answer: b
Explanation: Sniffing is like “tapping phone calls” and try to know about any conversation. There are
two types of sniffing. These are passive sniffing and active sniffing. Passive sniffing is difficult to
detect.
a) Wireshark
b) Dude Sniffer
c) Maltego
d) Look@LAN
View Answer
Answer: c
Explanation: Packet sniffers are utility tools which are used since the release of Ethernet. List of
some of these sniffing tools are Wireshark, Dude Sniffer, Look@LAN etc.
12. A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all
your data transmitted on its division.
a) True
b) False
View Answer
Answer: a
Explanation: A sniffer on the whole turns your system’s NIC to the licentious mode so that it can
listen to all your data transmitted on its division. This is how it works to sniff all data packets.
13. A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen
to all your data transmitted on its division.
a) Phishing site
b) Sniffer tool
c) Password cracker
d) NIC cracker
View Answer
Answer: b
Explanation: A sniffer tool turns your machine’s NIC to the dissolute mode so that hackers can listen
to & observe all your data packets. Hence they can know what type of data is being transmitted and
received.
14. In _____________ sniffing, the network traffic is not only supervised & locked but also be can be
altered in different ways to accomplish the attack.
a) passive
b) signal
c) network
d) active
View Answer
Answer: d
Explanation: Sniffing is like tapping the phone calls & over-heard about any discussion. In active
sniffing, the network traffic is not only supervised & locked but also be can be altered in different
ways to accomplish the attack.
15. __________________ are those devices which can be plugged into your network at the hardware level
& it can monitor traffic.
View Answer
Answer: b
1. ________________ are unnecessary software which infiltrates user’s system, spy on user’s activities,
stealing internet usage data & sensitive information of that user.
a) Shareware
b) Spyware
c) Ransomware
d) Freeware
View Answer
Answer: b
Explanation: Spyware is preventable software that spy on user’s activities, stealing internet usage
data & sensitive information of that user. Spyware is categorized as a sub-type of malware intended
to spy & gain access to or damage the system data, without your acquaintance.
2. They spy on our digital habits and spy on which data is more sensitive or useful for its creator.
Who are ‘they’ referring to here?
a) Shareware
b) Ransomware
c) Spyware
d) Freeware
View Answer
Answer: c
Explanation: Here ‘they’ refer to spyware which is an unnecessary software which infiltrates user’s
system, spy on user’s activities, stealing internet usage data & sensitive information of that user.
3. Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
a) advertisers
b) dark-market
c) antivirus company
d) share market
View Answer
Answer: a
Explanation: Spyware is unnecessary software which infiltrates user’s system, spy on the user’s
activities, stealing internet usage data & sensitive information of that user. Spyware collects user’s
personal data & spreads it to advertisers, data-firms, or its creator.
View Answer
Answer: d
Explanation: Spyware are harmful programs intended to spy & gain access to or damage the system
data, without your acquaintance. It captures credit card details, user’s personal identity, sells
internet usage data etc.
View Answer
Answer: c
Explanation: Spyware is harmful software which infiltrates user’s system, spy on user’s activities,
stealing internet usage data & sensitive information of that user. It monitors your internet activity,
track login credentials and spy on user’s sensitive information.
advertisement
6. Spyware is not a powerful & one of the most widespread threats on the internet.
a) True
b) False
View Answer
Answer: b
Explanation: Spyware is one of the most powerful & widespread threats on the internet. Spyware is
categorized as a sub-type of malware intended to spy & gain access to or damage the system data,
without your acquaintance.
a) delete
b) identify
c) modify
d) copy
View Answer
Answer: b
Explanation: The most powerful & widespread threats for users are the spyware. It actually infects
your device easily & makes it hard to detect. Once detected, we need specific tools and antivirus
programs to delete them.
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: c
Explanation: Spyware actually infects your device easily & makes it hard to detect. There are 4
major types of spyware. These are adware, tracking cookies, spy-trojans & system monitoring
spyware.
9. _____________ track the user’s online activities like search queries, history pages & downloads, for
selling purposes.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
View Answer
Answer: d
Explanation: There are 4 major types of spyware. One of them is the tracking cookies which track
the user’s online activities like search queries, history pages & downloads, for selling purposes.
10. _____________ tracks your data and displays those products as ads for promotions.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
View Answer
Answer: a
Explanation: Spyware are of four major types. One of them is adware. Adware or ad-based spyware
tracks your data and displays those products as ads for promotions.
11. _________________ disguises them as legitimate software & appear as Java or Flash Player updates.
They will periodically collect your system data and send it to its creator.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
View Answer
Answer: c
Explanation: There are four major types of spyware. One of them is the spy-trojans which disguise
them as legitimate software & appear as Java or Flash Player updates. They will periodically collect
your system data and send it to its creator.
12. ____________ records all your key-strokes, chat-room dialogs, program run in your system, and
system details.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
View Answer
Answer: b
Explanation: One of the types of spyware is the system monitoring spyware which records all your
key-strokes, chat-room dialogs, a program run in your system, and system details.
13. Which of the following do not lead you to invite spyware into your system?
View Answer
Answer: d
Explanation: Some of the largest possible ways your system can become contaminated with
spyware is when you accept fishy prompts and pop-ups, download apps from unreliable sources or
opening unknown attachments from mailing services.
14. As you sense your device has been infected with spyware, you should run a scan with your
existing security software/AV for making sure it has cleaned up all malicious contents.
a) True
b) False
View Answer
Answer: a
Explanation: As you sense your device has been infected with spyware, you should run a scan with
your existing security software/AV for making sure it has cleaned up all malicious contents. In this
manner, you can protect your system before the spyware takes away all your sensitive data.
d) MS Firewall Defender
View Answer
Answer: d
Explanation: MS Firewall Defender is not used for detecting & removing spyware. MalwareBytes
Anti-Malware tool, SpyBot Search and Destroy & Emsisoft Emergency Kit are some of the anti-
spyware tools.
16. If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take
steps to remove it and proactively change your ________ and delete browsing activities from web
browser.
a) passwords
b) email ID
c) name
d) address
View Answer
Answer: a
1. In general how many key elements constitute the entire security structure?
a) 1
b) 2
c) 3
d) 4
View Answer
Answer: d
Explanation: The 4 key elements that constitute the security are: confidentiality, integrity,
authenticity & availability. Authenticity is not considered as one of the key elements in some other
security models, but the popular CIA Triad eliminates this as authenticity at times comes under
confidentiality & availability.
2. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
a) Confidentiality
b) Integrity
c) Authenticity
d) Availability
View Answer
Answer: c
Explanation: According to the CIA triad the three components that a security need is the
Confidentiality, Integrity, Availability (as in short read as CIA).cyber-security-questions-answers-
elements-security-q2
3. This is the model designed for guiding the policies of Information security within a company, firm
or organization. What is “this” referred to here?
a) Confidentiality
b) Non-repudiation
c) CIA Triad
d) Authenticity
View Answer
Answer: c
Explanation: Various security models were being developed till date. This is by far the most popular
and widely used model which focuses on the information’s confidentiality, integrity as well as
availability and how these key elements can be preserved for a better security in any organization.
View Answer
Answer: b
Explanation: This approach of naming it CIA Triad as AIC (Availability, Integrity, Confidentiality)
Triad because people get confused about this acronym with the abbreviation and the secret agency
name Central Intelligence Agency.
5. When you use the word _____ it means you are protecting your data from getting disclosed.
a) Confidentiality
b) Integrity
c) Authentication
d) Availability
View Answer
Answer: a
Explanation: Confidentiality is what every individual prefer in terms of physical privacy as well as
digital privacy. This term means our information needs to be protected from getting disclose to
unauthorised parties, for which we use different security mechanisms like password protection,
biometric security, OTPs (One Time Passwords) etc.
advertisement
a) Confidentiality
b) Integrity
c) Authentication
d) Non-repudiation
View Answer
Answer: b
Explanation: A information only seems valuable if it is correct and do not get modified during its
journey in the course of arrival. The element integrity makes sure that the data sent or generated
from other end is correct and is not modified by any unauthorised party in between.
a) Database hacking
b) Data deletion
c) Data tampering
d) Data leakage
View Answer
Answer: c
Explanation: The term data tampering is used when integrity is compromised in any security model
and checking its integrity later becomes costlier. Example: let suppose you sent $50 to an
authorised person and in between a Man in the Middle (MiTM) attack takes place and the value has
tampered to $500. This is how integrity is compromised.
8. _______ of information means, only authorised users are capable of accessing the information.
a) Confidentiality
b) Integrity
c) Non-repudiation
d) Availability
View Answer
Answer: d
Explanation: Information seems useful only when right people (authorised users) access it after
going through proper authenticity check. The key element availability ensures that only authorised
users are able to access the information.
9. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered
fundamental?
View Answer
Answer: c
Explanation: The four elements of security viz. confidentiality, integrity, authenticity & availability
helps in better understanding the pillars of security and its different components.
10. This helps in identifying the origin of information and authentic user. This referred to here as
__________
a) Confidentiality
b) Integrity
c) Authenticity
d) Availability
View Answer
Answer: c
Explanation: The key element, authenticity helps in assuring the fact that the information is from
the original source.
a) Encryption
b) Locking
c) Deleting
d) Backup
View Answer
Answer: a
Explanation: Data encryption is the method of converting plain text to cipher-text and only
authorised users can decrypt the message back to plain text. This preserves the confidentiality of
data.
a) Biometric verification
c) 2-factor authentication
d) switching off the phone
View Answer
Answer: d
Explanation: Switching off the phone in the fear of preserving the confidentiality of data is not a
proper solution for data confidentiality. Fingerprint detection, face recognition, password-based
authentication, two-step verifications are some of these.
13. Data integrity gets compromised when _____ and _____ are taken control off.
d) Network, system
View Answer
Answer: c
Explanation: The two key ingredients that need to be kept safe are: access control & file permission
in order to preserve data integrity.
14. ______ is the latest technology that faces an extra challenge because of CIA paradigm.
a) Big data
b) Database systems
c) Cloud storages
d) Smart dust
View Answer
Answer: a
Explanation: Big data has additional challenges that it has to face because of the tremendous
volume of data that needs protection as well as other key elements of the CIA triad, which makes
the entire process costly and time-consuming.
15. One common way to maintain data availability is __________
a) Data clustering
b) Data backup
c) Data recovery
d) Data Altering
View Answer
Answer: b