0% found this document useful (0 votes)
509 views151 pages

Inforamtion Security

Modulation is the process of converting the digital data of a message into an analog signal suitable for transmission over a communication channel like a wire or wireless system. The correct option is C. Modulation is the process of converting. Question: 2 The full form of TCP is (A) Transmission Control Protocol (B) Transmission Control Port (C) Transmission Control Package (D) None of the above

Uploaded by

imran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
509 views151 pages

Inforamtion Security

Modulation is the process of converting the digital data of a message into an analog signal suitable for transmission over a communication channel like a wire or wireless system. The correct option is C. Modulation is the process of converting. Question: 2 The full form of TCP is (A) Transmission Control Protocol (B) Transmission Control Port (C) Transmission Control Package (D) None of the above

Uploaded by

imran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 151

1.

In The SSL Record Protocol Operation Pad_2 Is -

Is The Byte 0x36 Repeated 40 Times For MD5

Is The Byte 0x5C Repeated 48 Times For MD5

Is The Byte 0x5C Repeated 48 Times For SHA-1

Is The Byte 0x36 Repeated 48 Times For MD5

View Answer

Is The Byte 0x5C Repeated 48 Times For MD5

2. The DSS Signature Uses Which Hash Algorithm?

MD5

SHA-2

SHA-1

Does Not Use Hash Algorithm

VDO.AI

View Answer

SHA-1

3. The Certificate_request Massage Includes Two Parameters, One Of Which Is-

Certificate_extension

Certificate_creation

Certificate_exchange

Certificate_type

View Answer

Certificate_type

4. In The Handshake Protocol Which Is The Message Type First Sent Between Client And Server ?

Server_hello
Client_hello

Hello_request

Certificate_request

View Answer

Client_hello

5. Which Of The Following Is An Independent Malicious Program That Need Not Any Host Program?

Trap Doors

Trojan Horse

Virus

Worm

Download Free : Information Security MCQ PDF

View Answer

Worm

6. Why Would A Hacker Use A Proxy Server?

To Create A Stronger Connection With The Target.

To Create A Ghost Server On The Network.

To Hide Malicious Activity On The Network

To Obtain A Remote Access Connection.

View Answer

To Hide Malicious Activity On The Network

7. Which Of The Following Is Not A Factor In Securing The Environment Against An Attack On Security?

The System Configuration

The Business Strategy Of The Company

The Education Of The Attacker

The Network Architecture


View Answer

The Business Strategy Of The Company

8. To Hide Information Inside A Picture, What Technology Is Used?

Rootkits

Bitmapping

Steganography

Image Rendering

View Answer

Steganography

9. What Type Of Rootkit Will Patch, Hook, Or Replace The Version Of System Call In Order To Hide
Information?

Library Level Rootkits

Kernel Level Rootkits

System Level Rootkits

Application Level Rootkits

View Answer

Library Level Rootkits

10. What Is The Sequence Of A TCP Connection?

SYN-ACK-FIN

SYN-SYN ACK-ACK

SYN-ACK

SYN-SYN-ACK

View Answer

SYN-SYN ACK-ACK

11. What Tool Can Be Used To Perform SNMP Enumeration?

DNSlookup
Whois

Nslookup

IP Network Browser

View Answer

IP Network Browser

12. The First Phase Of Hacking An IT System Is Compromise Of Which Foundation Of Security?

Availability

Confidentiality

Integrity

Authentication

View Answer

Confidentiality

13. What Port Does Telnet Use?

22

80

20

23

View Answer

23

14. Performing Hacking Activities With The Intent On Gaining Visibility For An Unfair Situation Is Called

Cracking

Analysis

Hacktivism

Exploitation

View Answer
Hacktivism

15. What Is The Most Important Activity In System Hacking?

Information Gathering

Cracking Passwords

Escalating Privileges

Covering Tracks

View Answer

Cracking Passwords

16. Phishing Is A Form Of

Impersonation

Spamming

Identify Theft

Scanning

View Answer

Impersonation

17. Enumeration Is Part Of What Phase Of Ethical Hacking?

Reconnaissance

Maintaining Access

Gaining Access

Scanning

View Answer

Gaining Access

18. When A Person Is Harrassed Repeatedly By Being Followed, Called Or Be Written To He/she Is A
Target Of

Bullying

Identity Theft
Phishing

Stalking

View Answer

Stalking

19. Which Of The Following Malicious Program Do Not Replicate Automatically?

Trojan Horse

Virus

Worm

Zombie

View Answer

Trojan Horse

20. Keyloggers Are A Form Of

Spyware

Shoulder Surfing

Trojan

Social Engineering

View Answer

Spyware

21. Which Of The Following Is A Class Of Computer Threat

DoS Attacks

View Answer

DoS Attacks

Question: 1

Firewalls are to protect against

Unauthorized Attacks
Question: 2

The first computer virus is

Creeper

Question: 3

A hard copy would be prepared on a

Printer

Question: 4

The first PC virus was developed in

1986

Question: 5

Joystick allows the movements with

360 degree angle

Question: 1

First boot sector virus is

(A) Computed

(B) Mind

(C) Brain

(D) Elk cloner

Ans: C

Brain

Question: 2

The linking of computers with a communication system is called

(A) Assembling

(B) Interlocking

(C) Pairing
(D) Networking

Ans: D

Networking

Question: 3

The phrase ____ describe viruses, worms, Trojan horse attack

applets and attack scripts.

(A) Spam

(B) Phishing

(C) Malware

(D) Virus

Ans: C

Malware

Question: 4

Abuse messaging systems to send unsolicited is

(A) Phishing

(B) Adware

(C) Firewall

(D) Spam

Ans: D

Spam

Question: 5

A person who uses his or her expertise to gain access to other

people’s computers to get information illegally or do damage is a

(A) Hacker

(B) Analyst
(C) Spammer

(D) Programmer

Ans: A

Hacker

1. Choose the correct example of simplex communication:

TV and Radiocorrect

2. Choose the correct full form of HTTP:

Hyper-Text Transfer Protocolcorrect

3. The loss in signal strength as light travels long through the optical fiber is known as:

Attenuationcorrect

4. In which layer of the OSI network model the router operates:

Network Layercorrect

Transport Layer

5. Choose the correct example of full-duplex communication:

Telephonecorrect

6. In which layer of the OSI model hub is present?

Physical Layercorrect

7. A traditional TV transmitter which provides multiple channels through a single cable uses……………:

FDMcorrect

8. In which layer of the OSI network model the TCP and UDP operates:
Transport Layercorrect

9. …………………….is a seven-layer conceptual model based on networking technologies and services:

ISO-OSIcorrect

10. Choose the correct association of network type:

Internet → WANcorrect

11. In OSI model the dialogue control and token management is the responsibility of which layer:

Session Layercorrect

12. Choose the correct option related to the default port of HTTP:

80correct

13. ………………is a standard system of rules that enable a device to communicate over the network:

Protocolcorrect

14. ………………is the process of converting information into digital form so that the computer can
understand this format:

Digitizationcorrect

15. In ………………layer of the OSI model IP addresses are added during encapsulation:

Network Layercorrect

16. Choose the correct example of half-duplex communication:

Walkie talkiecorrect
17. ……………………..is the physical arrangement of devices connected to a local area network via cables:

Network Topologycorrect

18. Logical subdivision of IP address into two parts one part represent host address and the other
network address is known as:

Subnet Maskcorrect

19. The purpose of domain name server (DNS) is:

Translates domain names into IP addressescorrect

20. Choose the correct example related to broadband communication channel:

All Optionscorrect

21. Which multiplexing technique is used by the optical fibers to mix different wavelengths into a single
light for transmission?

WDMcorrect

22. The first network who implemented the TCP/IP protocols was:

ARPANETcorrect

23. Choose the correct option related to the default port of SMTP:

25correct

24. Which of the following is required to establish a successful connection between two computers?

All Optionscorrect
25. Choose the correct association between a device and its functionality:

Modem → Modulation and Demodulationcorrect

26. In which layer of the OSI network model the hub works:

Physical Layercorrect

27. Choose the correct equivalence between the TCP/IP layer and the OSI model layer:

TCP/IP Host to host Layer = Transport Layer of OSIcorrect

28. In networking a…………………….is a system designed to prevent unauthorized access to a network by


filtering the packets:

Firewallcorrect

29. A……………..is uniquely identified by an IP address and a port number:

Socketcorrect

30. Which of the following expansion card is required to connect to a network?

NIC (Network Interface Card)correct

31. Who developed the Open Systems Interconnection (OSI) model standard?

ISOcorrect

32. Which of the following transmission medium is more secure and fastest in term of data transfer?

Fiber Optic Cablecorrect


33. Who is given the title of “father of the Internet”:

Vint Cerfcorrect

34. In ………………layer of the TCP/IP model port addresses are defined:

Transport Layercorrect

35. Choose the correct option related to VPN:

All Optionscorrect

A private secure network

VPN uses encryption technology

VPN uses Tunneling protocols

36. The first early packet switching network was:

ARPANETcorrect

37. ………………….is the lowest layer of the OSI conceptual network model.

Physical Layercorrect

38. Choose the correct option related to default port of HTTPS:

180

443correct

39. Which kind of transmission is involved between mouse and personal computer?

Simplexcorrect
40. In which layer of the OSI network model the repeater operates:

Physical Layercorrect

41. Choose the full form of TCP/IP:

Transmission Control Protocol and the Internet Protocolcorrect

42. The IPV6 is represented by how many bits:

128 bitscorrect

43. The information is transmitted from one place to another through which of the following option:

Transmission Mediacorrect

44. The lower three layers of the OSI model closely correspond to which standard:

X.25correct

45. There are how many parts involved in HTTP request?

3correct

46. In which layer of the OSI network model the bridge operates:

Data Link Layercorrect

47. Choose the correct association between a technology and its network type:

Bluetooth → Personal Area Network (PAN)correct

48. Which of the following system is used to determine the exact location of an object on the earth?
GPScorrect

49. Choose the correct association between a technology and its network type:

Wi-Fi → WLANcorrect

50. In the OSI conceptual model the routing is performed by the layer:

Session Layer

Network Layercorrect

Question: 1

Modulation is the process of

(A) Echoing every character that is received

(B) Sending a file from one computer to another computer

(C) Converting digital signals to analog signals

(D) Converting analog signals to digital signals

Ans: C

Converting digital signals to analog signals

Question: 2

Many low-shaped channels are interwoven into one high-speed

transmission by

(A) Frequency-division multiplexer

(B) Time-division multiplexer

(C) Both (a) and (b)

(D) None of these

Ans: B

Time-division multiplexer
Question: 3

Which of the following is the difference between a multiplexer

and a statistical multiplexer?

(A) Multiplexer use X.25 protocol, while statistical multiplexers

use the Alpha protocol

(B) Statistical multiplexers need buffers while multiplexers do not

need buffers

(C) Multiplexers often waste the output link capacity while

statistical multiplexers oppose its use

(D) Multiplexers use Time Division multiplexing (TDM) while

statistical multiplexers uses Frequency division multiplexing (FDM)

Ans: B

Statistical multiplexers need buffers while multiplexers do not

need buffers

Question: 4

The synchronous modems are more costly than the asynchronous

modems because

(A) They operate with a larger bandwidth

(B) They produce large volume of data

(C) They contain clock recovery circuits

(D) They transmit the data with stop and start bits

Ans: C

They contain clock recovery circuits

Question: 5

To connect a computer with a device in the same room, you


might be likely to use

(A) A ground station

(B) A dedicated line

(C) A coaxial cable

(D) All of the above

Ans: C

A coaxial cable

Question: 1

The OSI model consists of ___ layers.

(A) Five

(B) Seven

(C) Eight

(D) Nine

Ans: B

Seven

Question: 2

Something which has easily understood instructions is said to be

(A) Information

(B) Icon

(C) Word processing

(D) User friendly

Ans: D

User friendly

Question: 3

Each computer have a/an ____, and some ____


(A) Internet Browsers, Document files

(B) Operating System, Application Programs

(C) Hard Disk, Programming Programs

(D) Operating system, Tally

Ans: B

Operating System, Application Programs

Question: 4

In ____ computers, computation is carried out with physical

quantities such as voltage, length, current, temperature, etc.

(A) Analog

(B) Digital

(C) Hybrid

(D) Micro computer

Ans : A

Analog

Question: 5

In Computer terminology ‘CAD’ is stands for

(A) Computer and Design

(B) Computer and Device

(C) Computer Algorithm in Design

(D) Computer Aided Design

Ans: D

Computer Aided Design

Question: 1

If you use either Telnet or FTP, which is the highest layer you are
using to transmit data?

(A) Application

(B) Session

(C) Presentation

(D) Transport

Ans: C

Presentation

Question: 2

Error detection at the data link level is achieved by

(A) Equalization

(B) Bit stuffing

(C) Hamming codes

(D) Cyclic redundancy codes

Ans: D

Cyclic redundancy codes

Question: 3

Which of the following techniques is used for allocating capacity

on a satellite channel using fixed-assignment FDM?

(A) Frequency-shift keying

(B) Frequency modulation

(C) Frequency-division multiple access

(D) Amplitude modulation

Ans: C

Frequency-division multiple access

Question: 4
The connection between your computer at home and your local

ISP is called _____

(A) The backbone

(B) The home page

(C) The home stretch

(D) The last mile

Ans: B

The home page

Question: 5

Demodulation is the process of

(A) Dividing the high-speed signals into frequency bands

(B) Converting digital signals to analog signals

(C) Converting analog signals to digital signals

(D) Combining many low speed channels into one high speed

channel

Ans: C

Converting analog signals to digital signals

Question: 1

The OSI model consists of ___ layers.

Seven

Question: 2

Something which has easily understood instructions is said to be

User friendly

Question: 3

Each computer have a/an ____, and some ____


Operating System, Application Programs

Question: 4

In ____ computers, computation is carried out with physical

quantities such as voltage, length, current, temperature, etc.

Analog

Question: 5

In Computer terminology ‘CAD’ is stands for

Computer Aided Design

Question: 6

If you use either Telnet or FTP, which is the highest layer you are

using to transmit data?

Presentation

Question: 7

Error detection at the data link level is achieved by

Cyclic redundancy codes

Question: 8

Which of the following techniques is used for allocating capacity

on a satellite channel using fixed-assignment FDM?

Frequency-division multiple access

Question: 9

The connection between your computer at home and your local

ISP is called _____

The home page

Question: 10

Demodulation is the process of


Converting analog signals to digital signals

Question: 6

A ____ is a standard set of rules that determines how computers communicate with each other across
networks.

(A) Protomol

(B) Protochol

(C) Protocool

(D) Protocol

Ans: D

Protocol

Question: 7

The advantage of a LAN is

(A) Saving all your data

(B) Accessing the web


(C) Backing up your data

(D) Sharing peripherals

Ans: C

Backing up your data

Question: 8

IP addresses are converted to

(A) A hexadecimal string

(B) A hierarchy of domain names

(C) Alphanumeric string

(D) A binary string

Ans: B

A hierarchy of domain names


Question: 9

Encryption and Decryption are the functions of ___ layers.

(A) Transport

(B) Session

(C) Presentation

(D) Physical

Ans: C

Presentation

Question: 10

Which layer 4 protocol is used for a Telnet connection?

(A) TCP

(B) IP

(C) UDP
(D) TCP/IP

Ans: A

TCP

exams.

To retain a competitive advantage and to meet basic business requirements organizations must:

All of the above

The key components of an information systems security policy include:

Management support and commitment

Access Authorization

Security Awareness

All of the above

A number of different mechanisms are available for raising security awareness including:

Distribution of a written security policy

Training on a regular basis of new employees, users

Both A&B

Data classification as a control measure should define:

Who has access rights

Who is responsible for determining the access rights and access levels
What approvals are needed for access

Computer crime issues and exposures

All of the above

Threats to businesses include:

Financial loss, Legal repercussions

Loss or credibility or competitive edge

Disclosure of confidential, sensitive or embarrassing information, Industrial espionage

All of the above

Logical access controls are one of the primary safeguards for securing software and data within an
information processing facility.

True

Technical exposures are the unauthorized implementation or modification of data and software at the
network, platform, database or application level. They include:

Data diddling involves changing data before or as they are entered into the computer.

Trojan horses involve hiding malicious, fraudulent code in an authorized computer program.

Wire-tapping involves eaves dropping on information being transmitted over telecommunications lines

All of the above

To protect an organization’s information resources, access control software has become even more
critical in assuring the confidentially, integrity and availability of information resources.

True

False

Operating systems access control functions include:


Apply user identification and authentication mechanisms

Restrict logon IDs to specific terminals/workstations and specific times

Both A&B

Database and Application-level access control functions include:

Create or change data files and data base profiles

Verify user authorization at the application and transaction level

Log database/ data communications access activities for monitoring access violation

All of the above

The password syntax rules include:

Passwords should be five to eight characters in length.

Passwords should allow for a combination of alpha, numeric, upper and lower case and special
characters

The system should not permit previous password(s) to be used after being changed

All of the above

Access restrictions at the file level include:

Read, inquiry or copy only

Write, create, update or delete only and Execute

Both A&B

Biometrics –

Biometric access controls are the best means of authenticating a user identify based on a unique,
measurable attribute or trait fo4 verifying the identity of a human being.

This restricts computer access, based on a physical or behavioral characteristic of the user.
Both A&B

Which parts of the computer viruses generally attack?

Executable program files

The file directory system, which tracks the location of all computer’s files

Boot and system areas, which are needed to start the computer

Data files

All of the above

1. _______ is the practice and precautions taken to protect valuable information from unauthorised
access, recording, disclosure or destruction.

a) Network Security

b) Database Security

c) Information Security

d) Physical Security

View Answer

Answer: c

Explanation: Information Security (abbreviated as InfoSec) is a process or set of processes used for
protecting valuable information for alteration, destruction, deletion or disclosure by unauthorised
users.

2. From the options below, which of them is not a threat to information security?

a) Disaster

b) Eavesdropping

c) Information leakage

d) Unchanged default password

View Answer
Answer: d

Explanation: Disaster, eavesdropping and information leakage come under information security
threats whereas not changing the default password of any system, hardware or any software comes
under the category of vulnerabilities that the user may pose to its system.

3. From the options below, which of them is not a vulnerability to information security?

a) flood

b) without deleting data, disposal of storage media

c) unchanged default password

d) latest patches and updates not done

View Answer

Answer: a

Explanation: Flood comes under natural disaster which is a threat to any information and not acts
as a vulnerability to any system.

4. _____ platforms are used for safety and protection of information in the cloud.

a) Cloud workload protection platforms

b) Cloud security protocols

c) AWS

d) One Drive

View Answer

Answer: a

Explanation: Nowadays data centres support workloads from different geographic locations across
the globe through physical systems, virtual machines, servers, and clouds. Their security can be
managed using Cloud workload protection platforms which manage policies regarding security of
information irrespective of its location.

5. Which of the following information security technology is used for avoiding browser-based
hacking?
a) Anti-malware in browsers

b) Remote browser access

c) Adware remover in browsers

d) Incognito mode in a browser

View Answer

Answer: b

Explanation: Cyber-criminals target browsers for breaching information security. If a user


establishes a remote browsing by isolating the browsing session of end user, cyber-criminals will
not be able to infect the system along with browser with malware, ultimately reducing the attack
surface area.

advertisement

6. The full form of EDR is _______

a) Endpoint Detection and recovery

b) Early detection and response

c) Endpoint Detection and response

d) Endless Detection and Recovery

View Answer

Answer: c

Explanation: It is a collective name for tools that monitor networks & endpoints of systems and
record all the activities for further reporting, analysis & detection in a central database. Analyzing
the reports generated through such EDR tools, loopholes in a system or any internal, as well as
external breaching attempts can be detected.

7. _______ technology is used for analyzing and monitoring traffic in network and information flow.

a) Cloud access security brokers (CASBs)

b) Managed detection and response (MDR)


c) Network Security Firewall

d) Network traffic analysis (NTA)

View Answer

Answer: d

Explanation: Network traffic analysis (NTA) is an approach of information security for supervising
the traffic in any network, a flow of data over the network as well as malicious threats that are
trying to breach the network. This technological solution also helps in triage the events detected by
Network Traffic Analysing tools.

8. Compromising confidential information comes under _________

a) Bug

b) Threat

c) Vulnerability

d) Attack

View Answer

Answer: b

Explanation: Threats are anything that may cause damage or harm to a computer system, individual
or any information. Compromising of confidential information means extracting out sensitive data
from a system by illegal manner.

9. Lack of access control policy is a _____________

a) Bug

b) Threat

c) Vulnerability

d) Attack

View Answer

Answer: c
Explanation: Access control policies are incorporated to a security system for restricting of
unauthorised access to any logical or physical system. Every security compliance program must
need this as a fundamental component. Those systems which lack this feature is vulnerable.

10. Possible threat to any information cannot be ________________

a) reduced

b) transferred

c) protected

d) ignored

View Answer

Answer: d

1. How many basic processes or steps are there in ethical hacking?

a) 4

b) 5

c) 6

d) 7

View Answer

Answer: c

Explanation: According to the standard ethical hacking standards, the entire process of hacking can
be divided into 6 steps or phases. These are: Reconnaissance, Scanning, Gaining Access, Maintaining
Access, Tracks clearing, reporting.

2. ____________ is the information gathering phase in ethical hacking from the target user.

a) Reconnaissance

b) Scanning

c) Gaining access

d) Maintaining access
View Answer

Answer: a

Explanation: Reconnaissance is the phase where the ethical hacker tries to gather different kinds of
information about the target user or the victim’s system.

3. Which of the following is not a reconnaissance tool or technique for information gathering?

a) Hping

b) NMAP

c) Google Dorks

d) Nexpose

View Answer

Answer: d

Explanation: Hping, NMAP & Google Dorks are tools and techniques for reconnaissance. Nexpose is
a tool for scanning the network for vulnerabilities.

4. There are ______ subtypes of reconnaissance.

a) 2

b) 3

c) 4

d) 5

View Answer

Answer: a

Explanation: Reconnaissance can be done in two different ways. 1st, Active Reconnaissance which
involves interacting with the target user or system directly in order to gain information; 2nd,
Passive Reconnaissance, where information gathering from target user is done indirectly without
interacting with the target user or system.

5. Which of the following is an example of active reconnaissance?


a) Searching public records

b) Telephone calls as a help desk or fake customer care person

c) Looking for the target’s details in the database

d) Searching the target’s details in paper files

View Answer

Answer: b

Explanation: As active reconnaissance is all about interacting with target victim directly, hence
telephonic calls as a legitimate customer care person or help desk person, the attacker can get more
information about the target user.

advertisement

6. Which of the following is an example of passive reconnaissance?

a) Telephonic calls to target victim

b) Attacker as a fake person for Help Desk support

c) Talk to the target user in person

d) Search about target records in online people database

View Answer

Answer: d

Explanation: Passive reconnaissance is all about acquiring of information about the target indirectly,
hence searching any information about the target on online people database is an example of
passive reconnaissance.

7. ________ phase in ethical hacking is known as the pre-attack phase.

a) Reconnaissance

b) Scanning

c) Gaining access
d) Maintaining access

View Answer

Answer: b

Explanation: In the scanning phase, the hacker actively scans for the vulnerabilities or specific
information in the network which can be exploited.

8. While looking for a single entry point where penetration testers can test the vulnerability, they
use ______ phase of ethical hacking.

a) Reconnaissance

b) Scanning

c) Gaining access

d) Maintaining access

View Answer

Answer: b

Explanation: Scanning is done to look for entry points in a network or system in order to launch an
attack and check whether the system is penetrable or not.

9. Which of them does not comes under scanning methodologies?

a) Vulnerability scanning

b) Sweeping

c) Port Scanning

d) Google Dorks

View Answer

Answer: d

Explanation: Google dork is used for reconnaissance, which uses special search queries for
narrowing down the search results. The rest three scanning methodologies are used for scanning
ports (logical), and network vulnerabilities.
10. Which of them is not a scanning tool?

a) NMAP

b) Nexpose

c) Maltego

d) Nessus

View Answer

Answer: c

Explanation: NMAP is used for both reconnaissance and scanning purposes. Nepose and Nessus are
fully scanning tool. Maltego is an example of a reconnaissance tool used for acquiring information
about target user.

11. Which of the following comes after scanning phase in ethical hacking?

a) Scanning

b) Maintaining access

c) Reconnaissance

d) Gaining access

View Answer

Answer: d

Explanation: Gaining access is the next step after scanning. Once the scanning tools are used to look
for flaws in a system, it is the next phase where the ethical hackers or penetration testers have to
technically gain access to a network or system.

12. In __________ phase the hacker exploits the network or system vulnerabilities.

a) Scanning

b) Maintaining access

c) Reconnaissance

d) Gaining access

View Answer
Answer: d

Explanation: Penetration testers after scanning the system or network tries to exploit the flaw of the
system or network in “gaining access” phase.

13. Which of the following is not done in gaining access phase?

a) Tunnelling

b) Buffer overflow

c) Session hijacking

d) Password cracking

View Answer

Answer: a

Explanation: Tunnelling is a method that is followed to cover tracks created by attackers and
erasing digital footprints. Buffer overflow, session hijacking and password cracking are examples of
gaining access to test the flaw in system or network.

14. Which of the below-mentioned penetration testing tool is popularly used in gaining access
phase?

a) Maltego

b) NMAP

c) Metasploit

d) Nessus

View Answer

Answer: c

1. A _________ can gain access illegally to a system if the system is not properly tested in scanning and
gaining access phase.

a) security officer
b) malicious hacker

c) security auditor

d) network analyst

View Answer

Answer: b

Explanation: Malicious hackers can gain illegal access at OS level, application level or network level
if the penetration testers or ethical hackers lack in testing and reporting the vulnerabilities in a
system.

2. In which phase, the hackers install backdoors so that his/her ownership with the victim’s system
can be retained later?

a) Scanning

b) Maintaining access

c) Maintaining Access

d) Gaining access

View Answer

Answer: c

Explanation: After gaining access to a system, the hacker needs to keep a path open so that he/she
in future can access the system. Therefore, backdoors are set which will later allow the attacker to
gain access through it easily.

3. _______ is the tool used for this purpose.

a) Powersploit

b) Aircrack – ng

c) Snort

d) Nmap

View Answer
Answer: a

Explanation: The Powersploit is an access maintaining tool used for Windows systems. This tool is
used for gaining re-access to the victim’s system using PowerShell.

4. Which of the following hacking tools and techniques hackers’ do not use for maintaining access in
a system?

a) Rootkits

b) Backdoors

c) Trojans

d) Wireshark

View Answer

Answer: d

Explanation: Wireshark is not a tool for maintaining access because it is used for analysing network
protocols at a microscopic level (very minutely). It is an interactive tool for data traffic analysing on
any computer.

advertisement

5. In _______ phase, the hackers try to hide their footprints.

a) Scanning

b) Tracks clearing

c) Reconnaissance

d) Gaining access

View Answer

Answer: b

Explanation: Tracks clearing or covering tracks is the name of the phase where the hackers delete
logs of their existence & other activity records they do during the hacking process. This step is
actually an unethical one.
6. Which of them is not a track clearing technique?

a) Altering log files

b) Tunnelling

c) Port Scanning

d) Footprint removing

View Answer

Answer: c

Explanation: Port scanning is a method used in the scanning phase. Altering or changing log files,
tunnelling for hiding your identity and removing footprints from different sites are examples of
clearing tracks.

7. __________ is the last phase of ethical hacking process.

a) Scanning

b) Tracks clearing

c) Reconnaissance

d) Reporting

View Answer

Answer: d

Explanation: In the reporting phase, the penetration tester or ethical hacker has to assemble all the
flaws along with the tools and processes used for detecting then and report it to the firm or
organization.

8. Which of the following is not a footprint-scanning tool?

a) SuperScan

b) TcpView

c) Maltego

d) OWASP Zed

View Answer
Answer: c

1. ___________ is a special form of attack using which hackers’ exploit – human psychology.

a) Cross Site Scripting

b) Insecure network

c) Social Engineering

d) Reverse Engineering

View Answer

Answer: c

Explanation: Using social engineering techniques, hackers try to exploit the victim’s mind to gain
valuable information about that person such as his/her phone number, date of birth, pet name etc.

2. Which of the following do not comes under Social Engineering?

a) Tailgating

b) Phishing

c) Pretexting

d) Spamming

View Answer

Answer: d

Explanation: Spamming is the attack technique where the same message is sent indiscriminately
repeatedly in order to overload the inbox or harm the user.

3. _________ involves scams where an individual (usually an attacker) lie to a person (the target
victim) to acquire privilege data.

a) Phishing

b) Pretexting

c) Spamming
d) Vishing

View Answer

Answer: b

Explanation: In the pretexting technique of social engineering, the attacker pretends in need of
legitimate information from the victim for confirming his/her identity.

4. Which of the following is the technique used to look for information in trash or around dustbin
container?

a) Pretexting

b) Baiting

c) Quid Pro Quo

d) Dumpster diving

View Answer

Answer: d

Explanation: In the technology world, where information about a person seems everywhere;
dumpster diving is the name of the technique where the attacker looks for information in dustbins
and trashes. For example, after withdrawing money from ATM, the user usually throw the receipt in
which the total amount and account details are mentioned. These type of information becomes
helpful to a hacker, for which they use dumpster diving.

5. Which of the following is not an example of social engineering?

a) Dumpster diving

b) Shoulder surfing

c) Carding

d) Spear phishing

View Answer

Answer: c

Explanation: Carding is the method of trafficking of bank details, credit cards or other financial
information over the internet. Hence it’s a fraudulent technique used by hackers and does not
comes under social engineering.

advertisement

6. In a phishing, attackers target the ________ technology to so social engineering.

a) Emails

b) WI-FI network

c) Operating systems

d) Surveillance camera

View Answer

Answer: a

Explanation: In a phishing attack, the attacker fraudulently attempts to obtain sensitive data (such
as username & passwords) of the target user and use emails to send fake links which redirect them
to a fake webpage which looks legitimate.

7. Tailgating is also termed as ___________

a) Piggybacking

b) Pretexting

c) Phishing

d) Baiting

View Answer

Answer: a

Explanation: Piggybacking is the technique used for social engineering, as the attacker or
unauthorized person/individual follows behind an authorized person/employee & gets into an
authorized area to observe the system, gain confidential data or for a fraudulent purpose.

8. Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit
organizations.
a) True

b) False

View Answer

Answer: b

Explanation: Physical hacking, like other types of hacking, is possible in any institutions,
organizations, clinics, private firms, banks or any other financial institutions. Hence, the above
statement is false.

9. Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.

a) network security

b) physical security

c) database security

d) wireless security

View Answer

Answer: b

Explanation: When cyber-criminal gain access to an authorized area and steal pen drives and DVDs
which contain sensitive information about an employee or about the organization, then it can be
said that the physical security of the organization is weak.

10. ________ is the ability of an individual to gain physical access to an authorized area.

a) Network accessing

b) Database accessing

c) Remote accessing

d) Physical accessing

View Answer

Answer: d

Explanation: Physical accessing without prior security checking is the ability of a person to gain
access to any authorized area. Physical accessing is done using piggybacking or any other suspicious
means.

11. Which of the following is not considering the adequate measure for physical security?

a) Lock the drawers

b) Keep strong passwords for corporate laptops and mobile phones

c) Keep confidential organization’s document file open in the desk

d) Hide your hand against camera while inserting the PIN code

View Answer

Answer: c

Explanation: Keeping confidential files left open in the desk is not an adequate way of maintaining
physical security; as anyone can pick these up and perform physical hacking.

12. Which of the following is not a physical security measure to protect against physical hacking?

a) Add front desk & restrict unknown access to the back room

b) Create a phishing policy

c) Analyze how employees maintain their physical data and data storage peripheral devices

d) Updating the patches in the software you’re working at your office laptop.

View Answer

Answer: d

Explanation: Updating the patches in your working software does not come under security
measures for physical hacking. Updating the patches will help your software get free from bugs and
flaws in an application as they get a fix when patches are updated.

13. IT security department must periodically check for security logs and entries made during office
hours.

a) True

b) False

View Answer
Answer: a

Explanation: Checking for security logs and entries made by employees and other outsiders who
entered the office can help in identifying whether any suspicious person is getting in and out of the
building or not.

14. Which of them is not an example of physical hacking?

a) Walk-in using piggybacking

b) Sneak-in

c) Break-in and steal

d) Phishing

View Answer

Answer: d

Explanation: Phishing does not come under physical security. Walk-in without proper authorization,
sneaking in through glass windows or other means and breaking in and stealing sensitive
documents are examples of physical hacking.

15. Physical _________ is important to check & test for possible physical breaches.

a) penetration test

b) security check

c) hacking

d) access

View Answer

Answer: a

1. ___________ ensures the integrity and security of data that are passing over a network.

a) Firewall

b) Antivirus
c) Pentesting Tools

d) Network-security protocols

View Answer

Answer: d

Explanation: The methods and processes in securing network data from unauthorized content
extraction are controlled by network-security protocols.

2. Which of the following is not a strong security protocol?

a) HTTPS

b) SSL

c) SMTP

d) SFTP

View Answer

Answer: c

Explanation: SMTP (is abbreviated as Simple Mail Transfer Protocol) is a standard protocol to
transmit electronic mail and is a widely used mail transmitting protocol.

3. Which of the following is not a secured mail transferring methodology?

a) POP3

b) SSMTP

c) Mail using PGP

d) S/MIME

View Answer

Answer: a

Explanation: POP (Post Office Protocol) is a simple protocol which fetches the updated mail stored
for you by the server. S/MIME (Secure/Multipurpose Internet Mail Extensions), SSMTP (Secure-
Simple Mail Transfer Protocol), and PGP (Pretty Good Privacy) are examples of protocols and
methods for secure mailing.

4. __________ is a set of conventions & rules set for communicating two or more devices residing in the
same network?

a) Security policies

b) Protocols

c) Wireless network

d) Network algorithms

View Answer

Answer: b

Explanation: Network protocols are designed with mechanisms for identifying devices and make
connections between them. In addition, some proper rules are defined as to how data packets will
be sent and received.

5. TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based
connection.

a) True

b) False

View Answer

Answer: a

Explanation: TLS which has now become SSL (Secure Socket Layer) is one of the popular
cryptographic protocols developed to provide security to computer network while communication.

advertisement

6. HTTPS is abbreviated as _________

a) Hypertexts Transfer Protocol Secured

b) Secured Hyper Text Transfer Protocol


c) Hyperlinked Text Transfer Protocol Secured

d) Hyper Text Transfer Protocol Secure

View Answer

Answer: d

Explanation: Hyper Text Transfer Protocol Secure (HTTPS) is a security protocol which maintains
security when data is sent from browser to server and vice versa. It denotes that all communication
setup between the browser and the server is encrypted.

7. SSL primarily focuses on _______

a) integrity and authenticity

b) integrity and non-repudiation

c) authenticity and privacy

d) confidentiality and integrity

View Answer

Answer: a

Explanation: SSL primarily focuses on maintaining the integrity of the data. Also, it maintains
authenticity which helps the customers feel secure to communicate over the internet.

8. In SSL, what is used for authenticating a message?

a) MAC (Message Access Code)

b) MAC (Message Authentication Code)

c) MAC (Machine Authentication Code)

d) MAC (Machine Access Code)

View Answer

Answer: b

Explanation: For authenticating in SSL, a short message known as MAC (Message Authentication
Code) is used for authenticating a message; where both the sender & the receiver need to
implement the same key in order to start communicating.

9. __________ is used for encrypting data at network level.

a) IPSec

b) HTTPS

c) SMTP

d) S/MIME

View Answer

Answer: a

Explanation: IPSec (Secure Internet Protocol) is used for securing data at the network level by using
3 different protocols. These are Encapsulating Secure Payload (ESP), Authentication Header, and
Internet Key Exchange (IKE).

10. S/MIME is abbreviated as __________________

a) Secure/Multimedia Internet Mailing Extensions

b) Secure/Multipurpose Internet Mailing Extensions

c) Secure/Multimedia Internet Mail Extensions

d) Secure/Multipurpose Internet Mail Extensions

View Answer

Answer: d

Explanation: Secure/Multipurpose Internet Mail Extensions is the most popular protocol used to
send encrypted messages that are digitally signed. In this protocol, the encryption is done with a
digital sign in them.

11. Users are able to see a pad-lock icon in the address bar of the browser when there is _______
connection.

a) HTTP

b) HTTPS

c) SMTP
d) SFTP

View Answer

Answer: b

Explanation: It is when HTTPS (Hyper Text Transfer Protocol Secure) connection is built an
extended validation certificate is installed in the website for security reasons.

12. Why did SSL certificate require in HTTP?

a) For making security weak

b) For making information move faster

c) For encrypted data sent over HTTP protocol

d) For sending and receiving emails unencrypted

View Answer

Answer: c

Explanation: In the case of HTTP connection, data are sent as plain-text, which is easily readable by
hackers, especially when it is credit card details and personal information. But with the
incorporation of SSL certificate, communication becomes secure and data sent and received are
encrypted.

13. SFTP is abbreviated as ________

a) Secure File Transfer Protocol

b) Secured File Transfer Protocol

c) Secure Folder Transfer Protocol

d) Secure File Transferring Protocol

View Answer

Answer: a

Explanation: It is a secured FTP, where communication is made secured using SSH (Secure Shell)
which helps in secure transferring of files in both local as well as remote systems.
14. PCT is abbreviated as ________

a) Private Connecting Technology

b) Personal Communication Technology

c) Private Communication Technique

d) Private Communication Technology

View Answer

Answer: d

1. Authentication in PCT requires _____ keys.

a) 1

b) 2

c) 3

d) 4

View Answer

Answer: b

Explanation: For message encryption using PCT it requires two separate keys. Moreover, PCT has
more options for data formats and security algorithms.

2. The latest version of TLS is _____

a) version 1.1

b) version 1.2

c) version 2.1

d) version 1.3

View Answer

Answer: b
Explanation: The latest standard version of TLS is version 1.2. Version 1.3 is still in the development
stage.

3. SIP is abbreviated as __________

a) Session Initiation Protocol

b) Secured Initiation Protocol

c) Secure Initiation Protocol

d) Session Integration Protocol

View Answer

Answer: a

Explanation: Session Initiation Protocol is an important protocol used for starting, preserving and
terminating any real time sessions over the internet.

4. In which of the following cases Session Initiation Protocol is not used?

a) Instant Messaging

b) Voice over LTE (VoLTE)

c) Internet telephony

d) Data Transferring

View Answer

Answer: d

Explanation: Session Initiation Protocol is used as real-time session maintaining and is used voice,
video as well as messaging applications for controlling multimedia communication sessions.

advertisement

5. SRTP is abbreviated as ________

a) Secure Relay Transport Protocol


b) Secure Real-time Transferring Protocol

c) Secure Real-time Transport Protocol

d) Secure Real-time Transportation Protocol

View Answer

Answer: c

Explanation: Secure Real-time Transport Protocol is a real-time multimedia delivery protocol with
encryption for message integrity and authentication. It is used mostly in entertainment systems and
streaming media and sites.

6. ESP is abbreviated as ____________

a) Encapsulating Security Payload

b) Encapsulating Secure Protocol

c) Encrypted Secure Payload

d) Encapsulating Secure Payload

View Answer

Answer: d

Explanation: Encapsulating Secure Payload is a special type of protocol used for offering integrity,
authentication, and confidentiality to network packets’ data in IPSec (Secure Internet Protocol).

7. ________ is the entity for issuing digital certificates.

a) Certificate Authority (CA)

b) Cert Authority (CA)

c) Cert Authorization (CA)

d) Certificate Authorization (CA)

View Answer

Answer: a
Explanation: Digital certificates are used for certifying the ownership of a public key and the entity
who issue those certificates is the Certificate Authority.

8. IKE is abbreviated as Internet Key Exchange.

a) True

b) False

View Answer

Answer: a

1. ________ is any action that might compromise cyber-security.

a) Threat

b) Vulnerability

c) Exploit

d) Attack

View Answer

Answer: a

Explanation: Threat can be termed as a possible danger that may lead to breach the cyber security
and may cause possible harm to the system or the network.

2. Existence of weakness in a system or network is called _______

a) Threat

b) Vulnerability

c) Exploit

d) Attack

View Answer

Answer: b
Explanation: Vulnerability is the term used to define weakness in any network or system that can
get exploited by an attacker. Exploiting the weakness can lead to the unexpected & undesirable
event in cyber security.

3. When any IT product, system or network is in need for testing for security reasons, then the term
used is called _________

a) Threat

b) Vulnerability

c) Target of Evaluation

d) Attack

View Answer

Answer: c

Explanation: Target of Evaluation is the term used when any IT infrastructure, system, network
require evaluation for security reasons or for fixing any bugs after being tested by penetration
testers.

4. An/A ________ is an act that violates cyber-security.

a) Threat

b) Vulnerability

c) Exploit

d) Attack

View Answer

Answer: d

Explanation: An “attack” or “cyber-attack” is an attempt taken by attackers to alter, delete, steal or


expose any specific data by gaining unauthorized access.

5. ________ is a way to breach the security by using the vulnerability of that system.

a) Threat

b) Vulnerability

c) Exploit
d) Attack

View Answer

Answer: c

Explanation: An exploit can be any data, piece of code, a program, sequence of commands or any
software that uses the vulnerability or flaw of a system and helps attackers or cyber-criminals cause
unanticipated behaviour.

advertisement

6. _________ is an act of hacking by the means of which a political or social message is conveyed.

a) Hacktivism

b) Whistle-blowing

c) Surveillance

d) Pseudonymization

View Answer

Answer: a

Explanation: Hacktivism is an act of defacing a website, or any network or system. Systems and
networks are compromised with a political or social agenda.

7. _______ is the method of developing or creating a structurally similar yet unauthentic and
illegitimate data of any firm or company.

a) Data copying

b) Data masking

c) Data breaching

d) Data duplicating

View Answer
Answer: b

Explanation: Data masking is the method used for developing or creating a structurally similar
version of data of any organization that is not authentic. These types of unauthentic data are
purposefully created for protecting the actual data.

8. Data masking is also known as _________

a) Data obfuscation

b) Data copying

c) Data breaching

d) Data duplicating

View Answer

Answer: a

Explanation: Data obfuscation is the alternate term used for data masking, that is used for
developing or creating a structurally similar version of data of any organization that is not
authentic. These types of unauthentic data are purposefully created for protecting the actual data.

9. ________ automates an action or attack so that repetitive tasks are done at a faster rate.

a) Auto-bots

b) Cookie-bots

c) Robots

d) Bots

View Answer

Answer: d

Explanation: Bots are a set of codes written which helps to perform repetitive tasks at a much faster
rate than humans.

10. Backdoors are also known as ____________

a) Trap doors

b) Front doors
c) Cover doors

d) Back entry

View Answer

Answer: a

Explanation: Trap-doors are hidden entry points in any already hacked system that is set to bypass
security measures.

11. Adware are pre-chosen _______ developed to display ads.

a) banner

b) software

c) malware

d) shareware

View Answer

Answer: b

Explanation: Adware is software that is displayed on system or web pages for showing pre-chosen
ads.

12. ________ is an attack technique occurs when excess data gets written to a memory block.

a) Over buffering

b) Buffering

c) Buffer overflow

d) Memory full

View Answer

Answer: c

Explanation: Buffer overflow is a flaw that occurs in memory when excessive data is written which
makes the buffer allocated to seize.
13. Finding & publishing any user’s identity with the help of different personal details is called
________

a) Doxing

b) Data breaching

c) Personal data copying

d) Secure File Transferring Protocol

View Answer

Answer: a

Explanation: When an identity of internet user is discovered and published by following his/her
details over the internet is called doxing.

14. In IP address, IP is abbreviated as __________

a) Internet Program

b) Internet Protocol

c) Intuition Programs

d) Internet Pathway

View Answer

Answer: b

Explanation: In IP Address, IP is abbreviated as Internet Protocol. It acts as a unique address or


identifier of any computer or device in the internet.

15. Whaling is the technique used to take deep and _________ information about any individual.

a) sensitive

b) powerful

c) useless

d) casual

View Answer
Answer: a

1. What is the ethics behind training how to hack a system?

a) To think like hackers and know how to defend such attacks

b) To hack a system without the permission

c) To hack a network that is vulnerable

d) To corrupt software or service using malware

View Answer

Answer: a

Explanation: It is important for ethical hackers and security professional to know how the cyber-
criminals think and proceed to target any system or network. This is why ethical hackers and
penetration testers are trained with proper ethics to simulate such a scenario as how the real cyber-
attack takes place.

2. Performing a shoulder surfing in order to check other’s password is ____________ ethical practice.

a) a good

b) not so good

c) very good social engineering practice

d) a bad

View Answer

Answer: d

Explanation: Overlooking or peeping into someone’s system when he/she is entering his/her
password is a bad practice and is against the ethics of conduct for every individual. Shoulder surfing
is a social engineering attack approach used by some cyber-criminals to know your password and
gain access to your system later.

3. ___________ has now evolved to be one of the most popular automated tools for unethical hacking.

a) Automated apps

b) Database software
c) Malware

d) Worms

View Answer

Answer: c

Explanation: Malware is one of the biggest culprits that harm companies because they are
programmed to do the malicious task automatically and help hackers do illicit activities with
sophistication.

4. Leaking your company data to the outside network without prior permission of senior authority
is a crime.

a) True

b) False

View Answer

Answer: a

Explanation: Without prior permission of the senior authority or any senior member, if you’re
leaking or taking our your company’s data outside (and which is confidential), then it’s against the
code of corporate ethics.

5. _____________ is the technique used in business organizations and firms to protect IT assets.

a) Ethical hacking

b) Unethical hacking

c) Fixing bugs

d) Internal data-breach

View Answer

Answer: a

Explanation: Ethical hacking is that used by business organizations and firms for exploiting
vulnerabilities to secure the firm. Ethical hackers help in increasing the capabilities of any
organization or firm in protecting their IT and information assets.
advertisement

6. The legal risks of ethical hacking include lawsuits due to __________ of personal data.

a) stealing

b) disclosure

c) deleting

d) hacking

View Answer

Answer: b

Explanation: The legal risks of ethical hacking contains lawsuits due to disclosure of personal data
during the penetration testing phase. Such disclosure of confidential data may lead to a legal fight
between the ethical hacker and the organization.

7. Before performing any penetration test, through legal procedure, which key points listed below is
not mandatory?

a) Know the nature of the organization

b) Characteristics of work done in the firm

c) System and network

d) Type of broadband company used by the firm

View Answer

Answer: d

Explanation: Before performing any penetration test, through the legal procedure the key points
that the penetration tester must keep in mind are –

i) Know the nature of the organization

ii) what type of work the organization do and

iii) the system and networks used in various departments and their confidential data that are sent
and received over the network.

8. An ethical hacker must ensure that proprietary information of the firm does not get leaked.

a) True

b) False

View Answer

Answer: a

Explanation: Yes, it is very important for an ethical hacker to make sure that while doing
penetration tests, the confidential data and proprietary information are preserved properly and not
get leaked to the external network.

9. After performing ____________ the ethical hacker should never disclose client information to other
parties.

a) hacking

b) cracking

c) penetration testing

d) exploiting

View Answer

Answer: c

Explanation: It is against the laws and ethics of ethical hackers that after doing penetration tests,
the ethical hacker should never disclose client information to other parties. The protection of client
data is in the hands of the ethical hacker who performed the tests.

10. __________ is the branch of cyber security that deals with morality and provides different theories
and a principle regarding the view-points about what is right and wrong.

a) Social ethics

b) Ethics in cyber-security

c) Corporate ethics

d) Ethics in black hat hacking

View Answer
Answer: d

Explanation: Ethics in cyber-security is the branch of cyber security that deals with morality and
provides different theories and principles’ regarding the view-points about what is right and what
need not to be done.

11. ________ helps to classify arguments and situations, better understand a cyber-crime and helps to
determine appropriate actions.

a) Cyber-ethics

b) Social ethics

c) Cyber-bullying

d) Corporate behaviour

View Answer

Answer: a

Explanation: Cyber-ethics and knowledge of proper ethical aspects while doing penetration tests
helps to classify arguments and situations, better understand a cyber crime and helps to determine
appropriate actions.

12. A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a
firm while evaluating the security postures.

a) privacy and security

b) rules and regulations

c) hacking techniques

d) ethics to talk to seniors

View Answer

Answer: a

1. ___________ is an activity that takes place when cyber-criminals infiltrates any data source and
takes away or alters sensitive information.

a) Data-hack
b) Data-stealing

c) Database altering

d) Data breach

View Answer

Answer: d

Explanation: Data breach an activity that takes place when cyber-criminals infiltrates any data
source and takes away or alters sensitive information. This is either done using a network to steal
all local files or get access physically to a system.

2. Which of these is not a step followed by cyber-criminals in data breaching?

a) Research and info-gathering

b) Attack the system

c) Fixing the bugs

d) Exfiltration

View Answer

Answer: c

Explanation: During a hack, the cyber-criminals first do a research on the victim gathers
information on the victim’s system as well as network. Then perform the attack. Once the attacker
gains access it steals away confidential data.

3. What types of data are stolen by cyber-criminals in most of the cases?

a) Data that will pay once sold

b) Data that has no value

c) Data like username and passwords only

d) Data that is old

View Answer

Answer: a
Explanation: Usually, cyber-criminals steal those data that are confidential and adds value once they
are sold to the dark-market or in different deep web sites. Even these days, different companies buy
customer data at large for analyzing data and gain profit out of it.

4. Which of the companies and organizations do not become the major targets of attackers for data
stealing?

a) Business firms

b) Medical and Healthcare

c) Government and secret agencies

d) NGOs

View Answer

Answer: d

Explanation: Attackers target large organizations and firms that consists of business firms, financial
corporations, medical and healthcare firms, government and secret agencies, banking sectors.
They’ve valuable information which can cost them huge so major targets for hackers focuses such
firms only.

5. ___________ will give you an USB which will contain ___________ that will take control of your system
in the background.

a) Attackers, Trojans

b) White hat hackers, antivirus

c) White hat hackers, Trojans

d) Attackers, antivirus

View Answer

Answer: a

Explanation: To do a security breaching in your system, your friend or anyone whom you deal with
may come up with a USB drive and will give you to take from you some data. But that USB drive may
contain Trojan that will get to your computer once triggered. So try using updated antivirus in your
system.

advertisement
6. An attacker, who is an employee of your firm may ___________ to know your system password.

a) do peeping

b) perform network jamming

c) do shoulder surfing

d) steal your laptop

View Answer

Answer: c

Explanation: An attacker, who is an employee of your firm may do shoulder surfing to know your
system password. Shoulder surfing is a social engineering technique used to secretly peep to gain
knowledge of your confidential information.

7. You may throw some confidential file in a dustbin which contains some of your personal data.
Hackers can take your data from that thrown-away file also, using the technique _________

a) Dumpster diving

b) Shoulder surfing

c) Phishing

d) Spamming

View Answer

Answer: a

Explanation: Dumpster diving is a social engineering technique used by hackers to grab your
personal and confidential data from that thrown-away file also. Using these data attackers may use
password guessing or fraud calls (if they find your personal phone number).

8. ATM Skimmers are used to take your confidential data from your ATM cards.

a) True

b) False
View Answer

Answer: a

Explanation: ATM card skimmers are set up by attackers in ATM machines which look exactly same
but that secretly inserted machine will take information from the magnetic strip of your card and
store it in its memory card or storage chip.

9. _____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt
all the files and unlock the system.

a) Scareware

b) Ransomware

c) Adware

d) Spyware

View Answer

Answer: b

Explanation: Ransomware is special types of malware that will infect your system, compromise all
data by encrypting them and will pop up asking you for a ransom which will be in the form of
Bitcoins (so that the attacker do not get tracked) and once the ransom is paid, it will release all files.

10. ______________ are special malware programs written by elite hackers and black hat hackers to spy
your mobile phones and systems.

a) Scareware

b) Ransomware

c) Adware

d) Spyware

View Answer

Answer: d

Explanation: Spywares are special malware programs written by elite hackers and black hat hackers
to spies your mobile phones and systems. This program secretly spy on the target system or user
and takes their browsing activities, app details and keeps track of their physical locations.

11. The antivirus or PC defender software in a system helps in detecting virus and Trojans.

a) True

b) False

View Answer

Answer: a

Explanation: The antivirus or PC defender software in a system helps in detecting virus and Trojans
provided the antivirus or the defender application needs to be up-to-date.

12. Clicking a link which is there in your email which came from an unknown source can redirect
you to ____________ that automatically installs malware in your system.

a) that vendor’s site

b) security solution site

c) malicious site

d) software downloading site

View Answer

Answer: c

Explanation: Clicking a link which is there in your email which came from an unknown source can
redirect you to a malicious site that will automatically install malware in your system. The mail will
be sent by the attacker.

13. An attacker may use automatic brute forcing tool to compromise your ____________

a) username

b) employee ID

c) system / PC name

d) password

View Answer
Answer: d

Explanation: In most of the cases, the attacker uses automated brute force tools for compromising
your PIN or password. This makes fetching of your password easier by a combination of different
letters as a trial-and-error approach.

14. The attacker will use different bots (zombie PCs) to ping your system and the name of the attack
is _________________

a) Distributed Denial-of-Service (DDoS)

b) Permanent Denial-of-Service (PDoS)

c) Denial-of-Service (DoS)

d) Controlled Denial-of-Service (CDoS)

View Answer

Answer: a

Explanation: Here the attacker uses multiple PCs and floods the bandwidth/resources of the
victim’s system, (usually 1 or many web-servers). The attack uses zombie PCs and each of the PC’s
are remotely controlled by the attacker.

15. Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive,
documents or other components to make their hands dirty on your confidential information.

a) True

b) False

View Answer

Answer: a

1. _____________ is a malicious method used by cyber-criminals to trick a user into clicking on


something different from what the user wants.

a) Click-hacking

b) Click-fraud

c) Clickjacking
d) Using torrent links

View Answer

Answer: c

Explanation: Clickjacking is a malicious method used by cyber-criminals to trick a user into clicking
on something else which is illicit from what the user wants. The single click usually redirects the
employee to a strange site from where infected files get downloaded into the system of the
employee.

2. Through the clickjacking attack, the employee’s confidential ______________ may get leaked or
stolen.

a) information

b) papers

c) hardcopy files

d) media files

View Answer

Answer: a

Explanation: Through clickjacking, the employee’s system may get compromised by an infected
program, trojans or spyware which got downloaded in the background automatically as the user fell
into the trick of an attacker.

3. Which of the following is not a proper aspect of user integration?

a) Employee’s authentication

b) Physical authorization

c) Access control

d) Representing users in the database

View Answer

Answer: b

Explanation: There are 3 main aspects that need to keep in mind when putting together new
employees or users into an application. These are: Representing users in the database, Access
control, and Employee’s authentication.

4. It is very important to block unknown, strange and ______________ within the corporate network.

a) infected sites

b) programs

c) unwanted files

d) important folders

View Answer

Answer: a

Explanation: It is very important to block unknown, strange and infected sites within the corporate
network, by the network administrator so that any employee may not accidentally access those sites
or open infected sites by means of clickjacking or URL-redirection techniques.

5. Every employee of the firm must need to have some basic knowledge of cyber-security and types
of hacking and how they are done.

a) True

b) False

View Answer

Answer: a

Explanation: Every employee of the firm must need to have some basic knowledge of cyber-security
and types of hacking and how they are done. This will make each employee aware of the various
malicious activities and can report to their seniors in this regard.

advertisement

6. Use of _______________ can bring external files and worms and virus along with it to the internal
systems.

a) smart-watch
b) pen drive

c) laptop

d) iPod

View Answer

Answer: b

Explanation: Use of pen drive to bring your work from home tasks to office systems may bring
worms and virus along with it (if your home system is infected with any malware or infected
programs) and may cause harm to your office systems.

7. A ____________ takes over your system’s browser settings and the attack will redirect the websites
you visit some other websites of its preference.

a) MiTM

b) Browser hacking

c) Browser Hijacker

d) Cookie-stealing

View Answer

Answer: c

Explanation: Browser hijacking is a technique that takes over your system’s browser settings and
the attack will redirect the websites you visit some other websites of its preference.

8. ________________ has become a popular attack since last few years, and the attacker target board
members, high-ranked officials and managing committee members of an organization.

a) Spyware

b) Ransomware

c) Adware

d) Shareware

View Answer
Answer: b

Explanation: Ransomware has become a popular attack since last few years, and the attacker target
board members, high-ranked officials and managing committee members of an organization; where
the ransomware compromise the system by encrypting all files and ask for some ransom in order to
unlock or decrypt all files.

9. ________________ important and precious file is a solution to prevent your files from ransomware.

a) Deleting all

b) Keeping backup of

c) Not saving

d) Keeping in pen drive

View Answer

Answer: b

Explanation: Keeping a secured backup of the important and precious file is a solution to prevent
your files from ransomware. The backup should have to be made in some secured cloud storage of
any other location (server) in an encrypted form.

10. ___________ is the technique to obtain permission from a company for using, manufacturing &
selling one or more products within a definite market area.

a) algorithm-licensing

b) code-licensing

c) item licensing

d) product licensing

View Answer

Answer: d

Explanation: Product licensing is the technique to obtain permission from a firm or organization for
using, manufacturing & selling one or more products within a definite market area. This is done by
the company for security reasons and usually takes a royal fee/amount from its users.

11. Which of the following do not comes under security measures for cloud in firms?
a) Firewall

b) Antivirus

c) Load Balancer

d) Encryption

View Answer

Answer: b

Explanation: For keeping cloud service secure and fully working, firewalls, encryption mechanisms
and load-balancers are used but antivirus is not used it could for any security purpose.

12. It is important to limit ____________ to all data and information as well as limit the authority for
installing software.

a) work-load

b) employee access

c) admin permission

d) installing unwanted apps

View Answer

Answer: b

Explanation: It is important to limit employee access to all data and information as well as limit the
authority for installing software. Otherwise, any employee with illicit intention may install
programs that are either pirated version or may cause damage to the internal corporate network.

13. One must isolate payment systems and payment processes from those computers that you think
are used by ____________ or may contain ____________

a) strangers, keyloggers

b) strangers, antivirus

c) unknown, firewalls

d) unknown, antivirus

View Answer
Answer: a

Explanation: One must isolate payment systems and payment processes from those computers that
you think are used by strangers or may contain keyloggers. Otherwise, your card details and PIN
may get compromised.

14. If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking
you to update your security application, you must ignore it.

a) True

b) False

View Answer

Answer: b

1. The ____________ model is 7-layer architecture where each layer is having some specific
functionality to perform.

a) TCP/IP

b) Cloud

c) OSI

d) OIS

View Answer

Answer: c

Explanation: The OSI model is 7-layer architecture where each layer is having some specific
functionality to perform. All these layers work in collaboration for transmitting the data from 1
person to another worldwide.

2. The full form of OSI is OSI model is ______________

a) Open Systems Interconnection

b) Open Software Interconnection

c) Open Systems Internet

d) Open Software Internet


View Answer

Answer: a

Explanation: The OSI model is 7-layer architecture where each layer is having some specific
functionality to perform. All these layers work in collaboration for transmitting the data from 1
person to another worldwide.

3. Which of the following is not physical layer vulnerability?

a) Physical theft of data & hardware

b) Physical damage or destruction of data & hardware

c) Unauthorized network access

d) Keystroke & Other Input Logging

View Answer

Answer: c

Explanation: Unauthorized network access is not an example of physical layer vulnerability. The rest
three – Physical theft of data & hardware, damage or destruction of data & hardware and keystroke
& Other Input Logging are physical layer vulnerabilities.

4. In __________________ layer, vulnerabilities are directly associated with physical access to networks
and hardware.

a) physical

b) data-link

c) network

d) application

View Answer

Answer: a

Explanation: In the physical layer, vulnerabilities are directly associated with physical access to
networks and hardware such as unauthorised network access, damage or destruction of data &
hardware and keystroke & Other Input Logging.
5. Loss of power and unauthorized change in the functional unit of hardware comes under problems
and issues of the physical layer.

a) True

b) False

View Answer

Answer: a

Explanation: Loss of power and unauthorized change in the functional unit of hardware comes
under problems and issues of the physical layer. Other such issues are unauthorised network access,
damage or destruction of data & hardware and keystroke & Other Input Logging.

advertisement

6. Which of the following is not a vulnerability of the data-link layer?

a) MAC Address Spoofing

b) VLAN circumvention

c) Switches may be forced for flooding traffic to all VLAN ports

d) Overloading of transport-layer mechanisms

View Answer

Answer: d

Explanation: MAC Address Spoofing, VLAN circumvention and switches may be forced for flooding
traffic to all VLAN ports are examples of data-link layer vulnerability.

7. ____________ is data-link layer vulnerability where stations are forced to make direct
communication with another station by evading logical controls.

a) VLAN attack

b) VLAN Circumvention

c) VLAN compromisation method


d) Data-link evading

View Answer

Answer: b

Explanation: VLAN Circumvention is data-link layer vulnerability where stations are forced to make
direct communication with another station by evading logical controls implemented using subnets
and firewalls.

8. ________________may be forced for flooding traffic to all VLAN ports allowing interception of data
through any device that is connected to a VLAN.

a) Switches

b) Routers

c) Hubs

d) Repeaters

View Answer

Answer: a

Explanation: Switches may be forced for flooding traffic to all VLAN ports allowing interception of
data through any device that are connected to a VLAN. It is a vulnerability of data link layer.

9. Which of the following is not a vulnerability of the network layer?

a) Route spoofing

b) Identity & Resource ID Vulnerability

c) IP Address Spoofing

d) Weak or non-existent authentication

View Answer

Answer: d

Explanation: Weak or non-existent authentication is a vulnerability of the session layer. Route


spoofing, identity & resource ID vulnerability & IP Address Spoofing are examples of network layer
vulnerability.
10. Which of the following is an example of physical layer vulnerability?

a) MAC Address Spoofing

b) Physical Theft of Data

c) Route spoofing

d) Weak or non-existent authentication

View Answer

Answer: b

Explanation: Physical theft of data is an example of physical layer vulnerability. Other such issues
are unauthorized network access, damage or destruction of data & hardware and keystroke & Other
Input Logging.

11. Which of the following is an example of data-link layer vulnerability?

a) MAC Address Spoofing

b) Physical Theft of Data

c) Route spoofing

d) Weak or non-existent authentication

View Answer

Answer: a

Explanation: MAC Address spoofing is an example of data-link layer vulnerability. VLAN


circumvention, as well as switches, may be forced for flooding traffic to all VLAN ports are some
other examples of data-link layer vulnerability.

12. Which of the following is an example of network layer vulnerability?

a) MAC Address Spoofing

b) Physical Theft of Data

c) Route spoofing

d) Weak or non-existent authentication

View Answer
Answer: c

Explanation: Route spoofing is an example of network layer vulnerability. Other examples of


network layer vulnerabilities are IP Address Spoofing and Identity & Resource ID Vulnerability.

13. Which of the following is an example of physical layer vulnerability?

a) MAC Address Spoofing

b) Route spoofing

c) Weak or non-existent authentication

d) Keystroke & Other Input Logging

View Answer

Answer: d

Explanation: Keystroke & other input logging is an example of physical layer vulnerability. Other
such physical layer vulnerabilities are unauthorized network access, damage or destruction of data
& hardware and keystroke & Other Input Logging.

14. Which of the following is an example of data-link layer vulnerability?

a) Physical Theft of Data

b) VLAN circumvention

c) Route spoofing

d) Weak or non-existent authentication

View Answer

Answer: b

1. Which of the following is not a transport layer vulnerability?

a) Mishandling of undefined, poorly defined

b) The Vulnerability that allows “fingerprinting” & other enumeration of host information

c) Overloading of transport-layer mechanisms


d) Unauthorized network access

View Answer

Answer: d

Explanation: The different vulnerabilities of the Transport layer are mishandling of undefined,
poorly defined, Vulnerability that allow “fingerprinting” & other enumeration of host information,
Overloading of transport-layer mechanisms etc. Unauthorized network access is an example of
physical layer vulnerability.

2. Which of the following is not session layer vulnerability?

a) Mishandling of undefined, poorly defined

b) Spoofing and hijacking of data based on failed authentication attempts

c) Passing of session-credentials allowing intercept and unauthorized use

d) Weak or non-existent authentication mechanisms

View Answer

Answer: a

Explanation: Vulnerabilities of session layer of the OSI model are spoofing and hijacking of data
based on failed authentication attempts, weak or non-existent authentication mechanisms, and the
passing of session-credentials allowing intercept and unauthorized use.

3. Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in
which layer of the OSI model?

a) Physical layer

b) Data-link Layer

c) Session layer

d) Presentation layer

View Answer

Answer: c

Explanation: Session identification may be subject to spoofing may lead to data leakage which
depends on failed authentication attempts and allow hackers to allow brute-force attacks on access
credentials.

4. Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.

a) True

b) False

View Answer

Answer: a

Explanation: Transmission mechanisms can be subject to spoofing & attacks based on skilled
modified packets. This type of attacks is done in the transport layer of the OSI model.

5. Which of the following is not an example of presentation layer issues?

a) Poor handling of unexpected input can lead to the execution of arbitrary instructions

b) Unintentional or ill-directed use of superficially supplied input

c) Cryptographic flaws in the system may get exploited to evade privacy

d) Weak or non-existent authentication mechanisms

View Answer

Answer: d

Explanation: Cryptographic flaws may be exploited to circumvent privacy, unintentional or ill-


directed use of superficially supplied input, and poor handling of unexpected input are examples of
presentation layer flaws.

advertisement

6. Which of the following is not a vulnerability of the application layer?

a) Application design bugs may bypass security controls

b) Inadequate security controls force “all-or-nothing” approach

c) Logical bugs in programs may be by chance or on purpose be used for crashing programs
d) Overloading of transport-layer mechanisms

View Answer

Answer: d

Explanation: Application design flaws may bypass security controls, inadequate security controls as
well as logical bugs in programs may be by chance or on purpose be used for crashing programs.
These all are part of application layer vulnerability.

7. Which of the following is an example of Transport layer vulnerability?

a) weak or non-existent mechanisms for authentication

b) overloading of transport-layer mechanisms

c) poor handling of unexpected input

d) highly complex application security controls

View Answer

Answer: b

Explanation: Overloading of transport-layer mechanisms is an example of transport layer


vulnerability. Other examples of Transport layer vulnerability are mishandling of undefined, poorly
defined, Vulnerability that allows “fingerprinting” & other enumeration of host information.

8. Which of the following is an example of session layer vulnerability?

a) weak or non-existent mechanisms for authentication

b) overloading of transport-layer mechanisms

c) poor handling of unexpected input

d) highly complex application security controls

View Answer

Answer: a

Explanation: Weak or non-existent mechanisms for authentication is an example of session layer


vulnerability. Other examples are spoofing and the hijacking of data based on failed-authentication
attempts & passing of session-credentials allowing intercept and unauthorized use.
9. Which of the following is an example of presentation layer vulnerability?

a) weak or non-existent mechanisms for authentication

b) overloading of transport-layer mechanisms

c) highly complex application security controls

d) poor handling of unexpected input

View Answer

Answer: d

Explanation: Poor handling of unexpected input is an example of presentation layer vulnerability.


Cryptographic flaws may be exploited to circumvent privacy, unintentional use of superficially
supplied input are some other examples of presentation layer vulnerability.

10. Which of the following is an example of application layer vulnerability?

a) Cryptographic flaws lead to the privacy issue

b) Very complex application security controls

c) MAC Address Spoofing

d) Weak or non-existent authentication

View Answer

Answer: b

1. TCP/IP is extensively used model for the World Wide Web for providing network
communications which are composed of 4 layers that work together.

a) True

b) False

View Answer

Answer: a

Explanation: TCP/IP is extensively used model for the World Wide Web for providing network
communications which are composed of 4 layers that work together. Each layer is composed of
header and payload.

2. TCP/IP is composed of _______ number of layers.

a) 2

b) 3

c) 4

d) 5

View Answer

Answer: c

Explanation: TCP/IP is extensively used model for the World Wide Web for providing network
communications which are composed of 4 layers that work together. Each layer is composed of
header and payload.

3. Trusted TCP/IP commands have the same needs & go through the identical verification process.
Which of them is not a TCP/IP command?

a) ftp

b) rexec

c) tcpexec

d) telnet

View Answer

Answer: c

Explanation: Trusted TCP/IP commands such as ftp, rexec and telnet have the same needs & go
through the identical verification process. Internet & TCP/IP are often implemented synonymously.

4. Connection authentication is offered for ensuring that the remote host has the likely Internet
Protocol (IP) ___________ & _________

a) address, name

b) address, location

c) network, name
d) network, location

View Answer

Answer: a

Explanation: Connection authentication is offered for ensuring that the remote host has the likely
Internet Protocol (IP)’s address & name. This avoids a remote host to masquerade as an added
remote host.

5. Application layer sends & receives data for particular applications using Hyper Text Transfer
Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).

a) True

b) False

View Answer

Answer: a

Explanation: Application layer sends & receives data for particular applications using HyperText
Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP). Hence, data encryption for
HTTP and SMTP is important.

advertisement

6. TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat.

a) True

b) False

View Answer

Answer: a

Explanation: Return of Bleichenbacher’s Oracle Threat is a transport layer vulnerability that allows
an attacker to get hold of the RSA key essential to decrypt TLS traffic below certain conditions.

7. RoBOT is abbreviated as ___________


a) Return of Bleichenbacher’s Oracle Team

b) Rise of Bleichenbacher’s Oracle Threat

c) Return of Bleichenbacher’s Operational Threat

d) Return of Bleichenbacher’s Oracle Threat

View Answer

Answer: d

Explanation: Return of Bleichenbacher’s Oracle Threat is a transport layer vulnerability that allows
an attacker to get hold of the RSA key essential to decrypt TLS traffic below certain conditions.

8. There are __________ different versions of IP popularly used.

a) 2

b) 3

c) 4

d) 5

View Answer

Answer: a

Explanation: There are two different versions of IPs used popularly over the internet. These are
IPv4 and IPv6. IPv4 is a 32-bits numeric address written in decimal with 4 numbers separated by
dots whereas IPv6 addresses are 128-bits written in hexadecimal & separated by colons.

9. ____________ is an attack where the attacker is able to guess together with the sequence number of
an in progress communication session & the port number.

a) TCP Spoofing

b) TCP Blind Spoofing

c) IP Spoofing

d) IP Blind Spoofing

View Answer
Answer: b

Explanation: TCP Blind Spoofing is an attack where the attacker is able to guess together with the
sequence number of an in progress communication session & the port number.

10. ___________ is an attack technique where numerous SYN packets are spoofed with a bogus source
address which is then sent to an inundated server.

a) SYN flooding attack

b) ACK flooding attack

c) SYN & ACK flooding attack

d) Packet flooding attack

View Answer

Answer: a

Explanation: SYN flooding attack is an attack technique where numerous SYN packets are spoofed
with a bogus source address which is then sent to an inundated server. The SYN & ACK segments
need to begin in a TCP connection.

11. Which of them is not an attack done in the network layer of the TCP/IP model?

a) MITM attack

b) DoS attack

c) Spoofing attack

d) Shoulder surfing

View Answer

Answer: d

Explanation: MITM, Denial of Service (DoS), and spoofing attacks are possible in the network layer
of the TCP/IP model. It is important to secure the network layer as it is the only means to make
certain that your application is not getting flooded with attacks.

12. Which of them is not an appropriate method of router security?

a) Unused ports should be blocked

b) Unused interfaces and services should be disabled


c) Routing protocol needs to be programmed by security experts

d) Packet filtering needs to be enabled

View Answer

Answer: c

Explanation: Unused ports should be blocked, Unused interfaces and services should be disabled,
and Packet filtering needs to be enabled are some of the security measures that need to be taken for
the routers.

13. Which 2 protocols are used in the Transport layer of the TCP/IP model?

a) UDP and HTTP

b) TCP and UDP

c) HTTP and TCP

d) ICMP and HTTP

View Answer

Answer: b

Explanation: The transport layer can voluntarily declare the consistency of communications.
Transmission Control Protocol (TCP) & User Datagram Protocol (UDP) are the most common
transport layer protocols.

14. Which of the protocol is not used in the network layer of the TCP/IP model?

a) ICMP

b) IP

c) IGMP

d) HTTP

View Answer

Answer: d

Explanation: Internet Control Message Protocol (ICMP), Internet Protocol (IP) and Internet Group
Management Protocol (IGMP) are used in the network layer. HTTP is used in application layer of
TCP/IP model.

15. ____________ protocol attack is done in the data-link layer.

a) HTTP

b) DNS

c) TCP/IP

d) POP

View Answer

Answer: b

1. _____________ is the illicit transmission of data from inside an organization or personal system to an
external location or recipient.

a) Database hacking

b) Data leakage

c) Data cracking

d) Data revealing

View Answer

Answer: b

Explanation: Data leakage is the illicit transmission of data from inside an organization or personal
system to an external location or recipient. The phrase is used for describing data that is transferred
electronically or even physically.

2. Data leakage threats do not usually occur from which of the following?

a) Web and email

b) Mobile data storage

c) USB drives and laptops

d) Television

View Answer
Answer: d

Explanation: Data leakage threats are common from web and emails, mobile data storage devices
such as internal or external storage and memory cards, from USB drives and laptops.

3. Data leakage is popularly known as ___________

a) data theft

b) data crack

c) low and slow data theft

d) slow data theft

View Answer

Answer: c

Explanation: Data leakage is also known as ‘low and slow data theft’, which is a massive issue for
data security & the damage caused to any firm is enormous. Every day there is at least one report of
data theft that occurs worldwide.

4. There are __________ major types of data leakage.

a) 2

b) 3

c) 4

d) 5

View Answer

Answer: b

Explanation: There are three major types of data leakage. These are – data breach by accident, data
leak done by ill-intentioned employees and electronic communication with malicious intent.

advertisement
5. “Unauthorized” data leakage doesn’t essentially mean intended or malicious.

a) True

b) False

View Answer

Answer: a

Explanation: “Unauthorized” data leakage doesn’t essentially mean intended or malicious. It has
been found that the majority of data leakage incidents are accidental but the loss occurred are
severe.

6. Unintentional data leakage can still result in the same penalties and reputational damage.

a) True

b) False

View Answer

Answer: a

Explanation: “Unintentional” data leakage doesn’t essentially mean intended or malicious. It has
been found that the majority of data leakage incidents are accidental but it can still result in the
same penalties and reputational damage.

7. When leakage of data is done purposely or because of the lack of employee’s concern toward
confidential data is called ___________ done by employees of an organization.

a) Ill-intentional data leakage

b) Malfunctioned in database

c) A malfunction in online data

d) ill-intension of an outsider

View Answer

Answer: a

Explanation: When leakage of data is done purposely or because of the lack of employee’s concern
toward confidential data is called Ill-intentional data leakage done by employees of an organization.
8. Which of them is not an example of physical data leakage?

a) dumpster diving

b) shoulder surfing

c) printers and photocopiers

d) phishing

View Answer

Answer: d

1. ______________ is the unauthorized movement of data.

a) Data exfiltration

b) Data infiltration

c) Data cracking

d) Database hacking

View Answer

Answer: a

Explanation: Data exfiltration is the unauthorized movement of data. It comprises data exportation,
data extrusion, data leakage, and data theft and all of them come under data hacking.

2. Which of them is an example of physical data leakage?

a) Dumpster diving

b) MiTM

c) DDoS

d) Phishing

View Answer

Answer: a
Explanation: Physical data leakage can be done intentionally by criminal-minded people who can
fetch data from dumpster diving, shoulder surfing, data mentioned in printed papers or taken out of
photocopiers.

3. Which of them is not an example of data leakage done using electronic communication with
malicious intent?

a) Phishing

b) Spoofed Email

c) Attacks using malware

d) Dumpster diving

View Answer

Answer: d

Explanation: Many organizations provide employees right to use the internet, emails as well as
instant messaging as part of their role. But these are prior targets of hackers for data leaking using
techniques such as phishing, spoofing and attacking target victim using malware.

4. The three steps of data loss prevention are – Identify, Discover and______________

a) Classify

b) Clarify

c) Deletion

d) Detection

View Answer

Answer: a

Explanation: The three steps of data loss prevention are – Identify, Discover and Classify. First, you
have to identify the systems of records. Then you’ve to classify what comprises of sensitive data on
those systems & discover the data elements which are sensitive depending on those classifications.

advertisement
5. Which of the following is not a step of data-loss prevention?

a) Identify

b) Manage

c) Classify

d) Discover

View Answer

Answer: b

Explanation: The three steps of data loss prevention are – Identify, Discover and Classify. First, you
have to identify the systems of records. Then you’ve to classify what comprises of sensitive data on
those systems & discover the data elements which are sensitive depending on those classifications.

6. Mapping of data-flow in an organization is very useful in understanding the risk better due to
actual & potential data leakage.

a) True

b) False

View Answer

Answer: a

Explanation: Mapping of data-flow in an organization from different systems (to record the
downstream and upstream sources) is very useful in understanding the risk better due to actual &
potential data leakage.

7. Data leakage prevention is based on factors like access controls, persistent, encryption, alerting,
tokenization, blocking dynamic data masking, etc.

a) True

b) False

View Answer

Answer: a

Explanation: Data leakage prevention is based on factors like access controls, persistent, encryption,
alerting, tokenization, blocking dynamic data masking, etc. Like data loss prevention, data leakage
also needs concern and care for data safety.

8. Data leakage threats are done by internal agents. Which of them is not an example of an internal
data leakage threat?

a) Data leak by 3rd Party apps

b) Data leak by partners

c) Data leak by employees

d) Data leak from stolen credentials from the desk

View Answer

Answer: a

Explanation: Data leak by 3rd Party apps is an example of malicious outsider threat that falsely
gained access by masquerading itself. Data leak by business partners, employees or from stolen
credentials are insider’s data-leakage threats.

9. _____________ focuses on the detection & prevention of sensitive data exfiltration and lost data.

a) Data loss prevention

b) Data loss measurement

c) Data stolen software

d) Data leak prevention

View Answer

Answer: a

1. ________________ is a component of the reconnaissance stage that is used to gather possible


information for a target computer system or network.

a) Fingerprinting

b) 3D printing

c) Footprinting

d) Data printing
View Answer

Answer: c

Explanation: Footprinting is a component of the reconnaissance stage that is used to gather possible
information for a target computer system or network. It can be either active or passive footprinting.

2. How many types of footprinting are there?

a) 5

b) 4

c) 3

d) 2

View Answer

Answer: d

Explanation: Footprinting is a component of the reconnaissance stage that is used to gather possible
information for a target computer system or network. It can be of 2 types: active or passive
footprinting.

3. ________________ is one of the 3 pre-attacking phase.

a) Fingerprinting

b) 3D printing

c) Footprinting

d) Data printing

View Answer

Answer: c

Explanation: Footprinting is a component of the reconnaissance stage that is used to gather possible
information for a target computer system or network. It can be either active or passive footprinting.

4. A/An ______________ spends 85% of his/her time in profiling an organization and rest amount in
launching the attack.
a) security analyst

b) attacker

c) auditor

d) network engineer

View Answer

Answer: b

Explanation: An attacker spends 85% of his/her time in profiling an organization and rest amount
in launching the attack. Footprinting results in a unique organization profile with respect to the
networks.

5. _______________ is necessary to methodically & systematically ensure all pieces of information


related to target.

a) Fingerprinting

b) 3D printing

c) Footprinting

d) Data printing

View Answer

Answer: c

Explanation: Footprinting is a component of the reconnaissance stage which is necessary to


methodically & systematically ensure all pieces of information related to the target. It can be either
active or passive footprinting.

advertisement

6. Which of the following is not a spot from where attackers seek information?

a) Domain name

b) IP address
c) System enumeration

d) Document files

View Answer

Answer: d

Explanation: Internet is a common medium for gathering information such as from Domain name,
IP address of the target user, enumeration of victim’s system, IDSes running, TCP & UDP services
etc.

7. Which of them is not an information source over the internet for target attackers?

a) Whois

b) YouTube

c) Nslookup

d) Archive sites

View Answer

Answer: b

Explanation: Information can be available free from some sites and databases residing on the
internet. These services and sites are – Whois, Nslookup, Archive Sites, open-source software sites
etc.

8. Footprinting is used to collect information such as namespace, employee info, phone number and
emails, job details.

a) True

b) False

View Answer

Answer: a

Explanation: Footprinting is used to collect information such as namespace, employee info, phone
number and emails, job details, IP address domain name, geo-location, browsing history etc.

9. Spywares can be used to steal _______________ from the attacker’s browser.


a) browsing history

b) company details

c) plug-ins used

d) browser details

View Answer

Answer: a

Explanation: Spywares can be used to steal browsing history, browsing habits and other related
searches from the attacker’s browser. Google chrome itself has a search box in the address bar
which the spyware might monitor to take search results as information for the attacker.

10. https://archive.org is a popular site where one can enter a domain name in its search box for
finding out how the site was looking at a given date.

a) True

b) False

View Answer

Answer: a

Explanation: https://archive.org is a popular archive site where one can enter a domain name in its
search box for finding out how the site was looking at a given date. It stores all the details about the
look and working of the site, even when the site got updated.

11. Information about people is available people search sites. Which of them is an example of people
data searching site?

a) people.com

b) indivinfo.org

c) intelius.com

d) peopleinfo.org

View Answer

Answer: c
Explanation: Information about people is available people search sites. https://www.intelius.com/
is an example of such site which holds records of people’s information.

12. You can attain a series of IP addresses allotted to a particular company using __________ site.

a) https://www.ipdata.org/

b) https://www.arin.net/

c) https://www.ipip.com/

d) https://www.goipaddr.net/

View Answer

Answer: b

Explanation: Hackers can attain a series of IP addresses allotted to a particular company using
https://www.arin.net/ site. Hackers can enter the company name in the search box for finding a list
of all the assigned IP addresses.

13. ARIN is abbreviated as _____________

a) American Registry for Internet Numbers

b) American Registry for IP Numbers

c) All Registry for Internet Numbers

d) American Registry for IP Numbering

View Answer

Answer: a

Explanation: ARIN is abbreviated as American Registry for Internet Numbers. Hackers can attain a
series of IP addresses allotted to a particular company using https://www.arin.net/ site. Hackers
can enter the company name in the search box for finding a list of all the assigned IP addresses.

14. Using spyware is an example of _________ type of information gathering.

a) active

b) passive

c) active & passive


d) non-passive

View Answer

Answer: a

Explanation: Using spyware is an example of an active information gathering technique. Spywares


can be used to steal browsing history, browsing habits and other related searches from the
attacker’s browser. Google chrome itself has a search box in the address bar which the spyware
might monitor to take search results as information for the attacker.

15. Collecting freely available information over the internet is an example of ____________ type of
information gathering.

a) active

b) passive

c) active & passive

d) non-passive

View Answer

Answer: b

1. There are _______ types of scanning.

a) 2

b) 3

c) 4

d) 5

View Answer

Answer: b

Explanation: There are a total of three types of scanning in ethical hacking and cyber-security.
These are vulnerability scanning, network scanning & port scanning.

2. Which of the following is not an objective of scanning?


a) Detection of the live system running on network

b) Discovering the IP address of the target system

c) Discovering the services running on target system

d) Detection of spyware in a system

View Answer

Answer: d

Explanation: Detection of the live system running on the network, discovering the IP address of the
target system, & discovering the services running on the target system are some of the objectives of
scanning.

3. For discovering the OS running on the target system, the scanning has a specific term. What is it?

a) Footprinting

b) 3D Printing

c) Fingerprinting

d) screen-printing

View Answer

Answer: c

Explanation: Fingerprinting is the name of that specific type of scanning For discovering the OS
running on the target system in a network which comes under OS scanning technique.

4. Which of them is not a scanning methodology?

a) Check for live systems

b) Check for open ports

c) Identifying the malware in the system

d) Identifying of services

View Answer
Answer: c

Explanation: Check for live systems, open ports and identification of services running on the
systems are some of the steps and methodologies used in scanning.

5. ICMP scanning is used to scan _______________

a) open systems

b) live systems

c) malfunctioned systems

d) broken systems

View Answer

Answer: b

Explanation: Check for live systems, open ports and identification of services running on the
systems are some of the steps and methodologies used in scanning. ICMP scanning is used for
checking live systems.

advertisement

6. In live system scanning, it is checked which hosts are up in the network by pinging the systems in
the network.

a) True

b) False

View Answer

Answer: a

Explanation: Check for live systems, open ports and identification of services running on the
systems are some of the steps and methodologies used in scanning. In live system scanning, it is
checked which hosts are up in the network by pinging the systems in the network.

7. ________ attribute is used to tweak the ping timeout value.

a) -time
b) -t

c) -p

d) -tout

View Answer

Answer: b

Explanation: -t attribute is used while pinging any system to tweak the ping timeout value. It is an
example of live system scanning, to check which hosts are up in the network by pinging the systems
in the network.

8. Which of them do not comes under NETBIOS information?

a) Name of the system / PC

b) Workgroup name

c) MAC address

d) RAM space

View Answer

Answer: d

Explanation: Scanning using IP address simply pings each IP address for checking if it is live or not.
This helps in providing NETBIOS information such as the name of the system, workgroup and MAC
address.

9. A ______________ is a simple network scanning technique used for determining which range of IP
address map to live hosts.

a) scan sweep

b) ping sweep

c) scan ping

d) host ping

View Answer
Answer: b

Explanation: A ping sweep is a simple network scanning technique used for determining which
range of IP address map to live hosts. The ping sweep consists of ICMP ECHO requests.

10. Ping sweep is also known as ________________

a) ICMP Sweep

b) ICMP Call

c) IGMP Sweep

d) ICMP pinging

View Answer

Answer: a

Explanation: Ping sweep is also known as ICMP sweep is a simple network scanning technique used
for determining which range of IP address map to live hosts. The ping sweep consists of ICMP ECHO
requests.

11. If any given address is running live, it will return an ICMP ECHO reply.

a) True

b) False

View Answer

Answer: a

Explanation: ICMP sweep is a simple network scanning technique used for determining which range
of IP address map to live hosts. The ping sweep consists of ICMP ECHO requests. If any given
address is running live, it will return an ICMP ECHO reply.

12. __________ scanning is done when a series of messages are sent by someone keeping in mind to
break into a computer.

a) Network

b) Port

c) Vulnerability

d) System
View Answer

Answer: b

Explanation: Scanning is done when a series of messages are sent by someone keeping in mind to
break into a computer to learn about computer network services.

13. ____________ scanning is a procedure to identify active hosts on your network.

a) Network

b) Port

c) Vulnerability

d) System

View Answer

Answer: a

Explanation: Network scanning is a procedure to identify active hosts on your network. It is done
with the intention to either attack your system or for security purposes by ethical hackers.

14. _____________ scanning is an automatic process for identifying vulnerabilities of the system within
a network.

a) Network

b) Port

c) Vulnerability

d) System

View Answer

Answer: c

Explanation: Vulnerability scanning is an automatic process for identifying vulnerabilities of a


computing system within a network. It is one of the popular scanning methodologies.

15. Which of them is not a standard scanning type or terminology?

a) Network
b) Port

c) Vulnerability

d) System

View Answer

Answer: d

1. There are _________ types of computer virus.

a) 5

b) 7

c) 10

d) 12

View Answer

Answer: c

Explanation: There are a total of 10 types of virus. These are categorized based on their working
and characteristics. These are System or Boot Sector Virus, Direct Action Virus, Resident Virus,
Multipartite Virus, Polymorphic Virus, Overwrite Virus, Space-filler Virus, File infectors, Macro
Virus, Rootkit virus.

2. Which of the following is not a type of virus?

a) Boot sector

b) Polymorphic

c) Multipartite

d) Trojans

View Answer

Answer: d
Explanation: Types of viruses are System or Boot Sector Virus, Direct Action Virus, Resident Virus,
Multipartite Virus, Polymorphic Virus, Overwrite Virus, Space-filler Virus, File infectors, Macro
Virus, Rootkit virus. Trojan does not come under types of virus.

3. A computer ________ is a malicious code which self-replicates by copying itself to other programs.

a) program

b) virus

c) application

d) worm

View Answer

Answer: b

Explanation: A computer virus is a malicious code which self-replicates by copying itself to other
programs. The computer virus gets spread by itself into other executable code or documents. The
intention of creating a virus is to infect vulnerable systems.

4. Which of them is not an ideal way of spreading the virus?

a) Infected website

b) Emails

c) Official Antivirus CDs

d) USBs

View Answer

Answer: c

Explanation: The ideal means of spreading computer virus are through emails, USB drives that are
used portable and injected and ejected in different systems as well as from infected websites.
Antivirus selling vendors do not place a virus in their CDs and DVDs.

5. In which year Apple II virus came into existence?

a) 1979

b) 1980

c) 1981
d) 1982

View Answer

Answer: c

Explanation: In mid-1981, the 1st virus for Apple computers with the name Apple II came into
existence. It was also called Elk Cloner, which resided in the boot sectors of a 3.3 floppy disk.

advertisement

6. In mid-1981, the 1st virus for Apple computers with the name _________ came into existence.

a) Apple I

b) Apple II

c) Apple III

d) Apple Virus

View Answer

7. The virus hides itself from getting detected by ______ different ways.

a) 2

b) 3

c) 4

d) 5

View Answer

Answer: b

Explanation: The virus hides itself from getting detected in three different ways. These are by
encrypting itself, by altering the disk directory with additional virus bytes or it uses stealth
algorithm to redirect disk data.
8. _______________ infects the master boot record and it is challenging and a complex task to remove
this virus.

a) Boot Sector Virus

b) Polymorphic

c) Multipartite

d) Trojans

View Answer

Answer: a

Explanation: Boot Sector Virus infects the master boot record & it is a challenging & a complex task
to remove such virus. Mostly such virus spreads through removable devices.

9. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the
specific type of files which it infects.

a) Boot Sector Virus

b) Direct Action Virus

c) Polymorphic Virus

d) Multipartite Virus

View Answer

Answer: b

Explanation: Direct Action Virus gets installed & stays hidden in your computer’s memory. Such
type of virus stays involved to the specific type of files which it infects.

10. Direct Action Virus is also known as ___________

a) Non-resident virus

b) Boot Sector Virus

c) Polymorphic Virus

d) Multipartite Virus

View Answer
Answer: a

Explanation: Direct Action Virus is also known as a non-resident virus which gets installed & stays
hidden in your computer’s memory. Such type of virus stays involved to the specific type of files
which it infects.

11. ______________ infects the executables as well as the boot sectors.

a) Non-resident virus

b) Boot Sector Virus

c) Polymorphic Virus

d) Multipartite Virus

View Answer

Answer: d

Explanation: Multipartite Virus infects the executables as well as the boot sectors. It infects the
computer or get into any system through multiple mediums and are hard to remove.

12. ______________ are difficult to identify as they keep on changing their type and signature.

a) Non-resident virus

b) Boot Sector Virus

c) Polymorphic Virus

d) Multipartite Virus

View Answer

Answer: c

Explanation: Polymorphic Virus is difficult to identify as they keep on changing their type and
signature. They’re not easily detectable by traditional antivirus. It usually changes the signature
pattern whenever it replicates itself.

13. ____________ deletes all the files that it infects.

a) Non-resident virus
b) Overwrite Virus

c) Polymorphic Virus

d) Multipartite Virus

View Answer

Answer: b

Explanation: Overwrite virus deletes all files that it infects. It can be removed by only deleting those
infected files. Mostly, it gets spread via emails.

14. _____________ is also known as cavity virus.

a) Non-resident virus

b) Overwrite Virus

c) Polymorphic Virus

d) Space-filler Virus

View Answer

Answer: d

Explanation: Space-fillers are a special type of virus which usually does not cause any serious harm
to the system except it fills up the empty space in memory and codes leading to wastage of memory.

15. Which of the below-mentioned reasons do not satisfy the reason why people create a computer
virus?

a) Research purpose

b) Pranks

c) Identity theft

d) Protection

View Answer

Answer: d
1. A ___________ is a small malicious program that runs hidden on infected system.

a) Virus

b) Trojan

c) Shareware

d) Adware

View Answer

Answer: b

Explanation: A Trojan is a small malicious program that runs hidden on the infected system. They
are created with the intent and they infected the system by misleading the user. It works in the
background and steals sensitive data.

2. ____________ works in background and steals sensitive data.

a) Virus

b) Shareware

c) Trojan

d) Adware

View Answer

Answer: c

Explanation: Trojans are malicious files designed to work hidden on the infected system. They are
intended to infect the system by misleading the user. It works in the background and steals sensitive
information about the target user.

3. By gaining access to the Trojaned system the attacker can stage different types of attack using
that ____________ program running in the background.

a) Trojan

b) Virus

c) Antivirus

d) Anti-malware
View Answer

Answer: a

Explanation: By gaining access to the Trojaned system the attacker can stage different types of
attack using that Trojan program running in the background when the infected user’s system goes
online.

4. Trojan creators do not look for _______________

a) Credit card information

b) Confidential data

c) Important documents

d) Securing systems with such programs

View Answer

Answer: d

Explanation: Trojan creators do not look for securing victim’s system with their programs, rather
they create such trojans for stealing credit card and financial details as well as important
documents and files.

5. Which of them is not a proper way of getting into the system?

a) IM

b) Attachments

c) Official product sites

d) Un-trusted sites, freeware and pirated software

View Answer

Answer: c

Explanation: Official product sites such as Microsoft’s site giving the option for downloading their
updates and OS won’t contain any Trojans. Other than that Trojans can access your system by email
attachments, Instant Messaging apps, un-trusted sites & links.

advertisement
6. Which of the following port is not used by Trojans?

a) UDP

b) TCP

c) SMTP

d) MP

View Answer

Answer: d

Explanation: MP is not a valid port name and does not have any port number also. But usually,
Trojans likeBack Orifice, Deep Throat use UDP port; Trojans like Netbus, Master Paradise uses TCP
& SMTP port to gain access to a system.

7. Trojans do not do one of the following. What is that?

a) Deleting Data

b) Protecting Data

c) Modifying Data

d) Copying Data

View Answer

Answer: b

Explanation: Trojans perform malicious actions and operations. These are to modify data, copy data
to its creator, delete data from the infected system or blocking data by carrying ransomware or
other malicious programs along with it.

8. Some Trojans carry ransomware with them to encrypt the data and ask for ransom.

a) True

b) False

View Answer
Answer: a

Explanation: Trojans are usually created to carry out the following actions like: modify data, copy
data to its creator, delete data from the infected system or blocking data by carrying ransomware
embedded in it.

9. Once activated __________ can enable ____________to spy on the victim, steal their sensitive
information & gain backdoor access to the system.

a) virus, cyber-criminals

b) malware, penetration testers

c) trojans, cyber-criminals

d) virus, penetration testers

View Answer

Answer: c

Explanation: Once activated, trojans can enable cyber-criminals to spy on the victim, steal their
sensitive information & gain backdoor access to the system.

10. Trojans can not ______________

a) steal data

b) self-replicate

c) steal financial information

d) steal login credentials

View Answer

Answer: b

Explanation: A Trojan is a malicious program that runs hidden on the infected system. They are
developed with the intent and they infected the system by misleading the user. It works behind the
system and steals sensitive data but cannot self-replicate.

11. A _______________ provides malicious users remote control over the targeted computer.

a) DDoS-Trojan
b) Backdoor Trojan

c) Trojan-Banker

d) Trojan-Downloader

View Answer

Answer: b

Explanation: A Backdoor Trojan provides malicious users remote control over the targeted
computer. These trojans enable the author to perform anything they desire on the infected system
which includes sending, receiving, launching & deleting files.

12. _______________ programs are specially designed for stealing your account data for online banking
systems, e-payment services & credit/debit cards.

a) DDoS-Trojan

b) Backdoor Trojan

c) Trojan-Banker

d) Trojan-Downloader

View Answer

Answer: c

Explanation: Trojan-Banker is programs are specially designed for stealing your account data for
online banking systems, e-payment services & credit/debit cards. They work silently in the back of
the system process to steal such data.

13. ______________ perform automated DoS (Denial of Service) attacks on a targeted web address.

a) DDoS-Trojan

b) Backdoor Trojan

c) Trojan-Banker

d) Trojan-Downloader

View Answer
Answer: a

Explanation: DDoS Trojan performs automated DoS (Denial of Service) attacks on a targeted web
address. By sending multiple requests from your system, it can target different websites which can
lead to a Denial of Service attack.

14. Trojan-Downloader is a special type of trojans which can download & install new versions of
malicious programs.

a) True

b) False

View Answer

Answer: a

Explanation: Trojan-Downloader is another type of trojans that can download & install new
versions of malicious programs. They work secretly & keep on downloading other malicious
programs when the system is online.

15. ____________ work in background & keeps on downloading other malicious programs when the
system is online.

a) DDoS-Trojan

b) Backdoor Trojan

c) Trojan-Banker

d) Trojan-Downloader

View Answer

Answer: d

1. __________ is a naming system given to different computers which adapt to human-readable domain
names.

a) HTTP

b) DNS

c) WWW

d) ISP
View Answer

Answer: b

Explanation: DNS is a naming system given to different computers that adapt to human-readable
domain names. For example, Google.co.in has a computer-readable IP address which is 8.8.8.8 &
8.8.4.4 as the primary & secondary DNS addresses.

2. DNS stands for _____________

a) Data Name System

b) Domain Name Server

c) Domain Name System

d) Domain’s Naming System

View Answer

Answer: c

Explanation: Domain Name System can be compared to the phonebook of the WWW. Users’ access
information over the web through these human readable domain names. For example
www.google.co.in gas computer-readable IP address which is 8.8.8.8 & 8.8.4.4 as the primary &
secondary DNS addresses.

3. Some security issues might exist owing to misconfigured __________________ which can direct to
disclosure of information regarding the domain.

a) DNS names

b) HTTP setup

c) ISP setup

d) FTP-unsecured

View Answer

Answer: a

Explanation: Some security issues might exist owing to misconfigured DNS names which can direct
to disclosure of information regarding the domain. DNS adapts to human readable domain names.
4. ______________ is a form of nasty online attack in which a user gets redirects queries to a DNS
because of override of system’s TCP/IP settings.

a) DNS mal-functioning

b) DNS cracking

c) DNS redirecting

d) DNS hijacking

View Answer

Answer: d

Explanation: Misconfigured DNS names which can direct to disclosure of information regarding the
domain. DNS hijacking is a form of nasty online attack in which a user gets redirects queries to a
DNS because of override of system’s TCP/IP settings.

5. _____________ can be attained by the use of malware or by changing the server’s settings.

a) DNS poisoning

b) DNS cracking

c) DNS hijacking

d) DNS redirecting

View Answer

Answer: c

Explanation: DNS hijacking is a form of nasty online attack in which a user gets redirects queries to
a DNS because of override of system’s TCP/IP settings. It can be attained by the use of malware or
by changing the server’s settings.

advertisement

6. There are _________ main types of DNS hijacking.

a) 4
b) 2

c) 3

d) 5

View Answer

Answer: b

Explanation: There are two main types of DNS hijacking. These are by infecting the computer with
malware or DNS trojans and the other type is hacking the target website and changes its DNS
address.

7. DNS trojans are used for performing a type of DNS hijacking.

a) True

b) False

View Answer

Answer: a

Explanation: DNS hijacking is a form of nasty online attack in which a user gets redirects queries to
a DNS because of override of system’s TCP/IP settings. There are two main types of DNS hijacking.
These are by infecting the computer with malware or DNS trojans.

8. The _______________ matches and maps to the user friendly domain name.

a) HTTP

b) DNS

c) WWW

d) ISP

View Answer

Answer: b

Explanation: The DNS matches for directing the user-friendly domain name (like google.co.in) to its
equivalent IP address. DNS servers are typically owned by any ISPs or other business organizations.
9. Which of the following is not an example of DNS hijacking?

a) ISP DNS hijacking

b) DNS hijacking for phishing

c) DNS hijacking for pharming

d) HTTP-based DNS hacking

View Answer

Answer: d

Explanation: DNS hijacking is a form of nasty online attack in which a user gets redirects queries to
a DNS because of override of system’s TCP/IP settings. ISP DNS hijacking, DNS hijacking for
phishing, DNS hijacking for pharming are some of the examples of DNS hijacking attack.

10. A ______________ is essentially a text file residing on the server that hosts different domain
containing entries for dissimilar resource records.

a) Zone file

b) Robot file

c) Bot file

d) DNS file

View Answer

Answer: a

Explanation: A Zone file is essentially a text file residing on the server that hosts different domain
containing entries for dissimilar resource records. It is used in DNS hijacking.

11. ______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based
vulnerabilities for diverting the traffic of the internet.

a) DNS poisoning

b) DNS re-routing

c) DNS cracking

d) Domain link poisoning


View Answer

Answer: a

Explanation: DNS cache poisoning which is also termed as DNS spoofing, is a kind of attack which
uses DNS based vulnerabilities for diverting the traffic of the internet away from genuine servers.

12. DNS poisoning is very dangerous because it can extend its reach from one ___________ to another.

a) ISP server

b) DNS server

c) Linux server

d) Domain user

View Answer

Answer: b

Explanation: DNS poisoning which is also termed as DNS spoofing is a kind of attack which uses
DNS based vulnerabilities for diverting the traffic of the internet. DNS poisoning is very dangerous
because it can extend its reach from one DNS server to another.

13. A _________________ can be poisoned if it is having an erroneous entry where the invader gets to
organize the DNS server & change different kinds of information on it.

a) Server data

b) Domain name

c) DNS cache

d) System file

View Answer

Answer: c

Explanation: A DNS cache can be poisoned if it is having an erroneous entry where the invader gets
to organize the DNS server & change different kinds of information on it. DNS poisoning is very
dangerous because it can extend its reach from one DNS server to another.

14. The ____________ Domain Name Server data will get spread to the ISPs & will be cached there.
a) working

b) compromised

c) corrupted

d) poisoned

View Answer

Answer: d

Explanation: DNS cache poisoning is a kind of attack which uses DNS based vulnerabilities for
diverting the traffic of the internet. The poisoned Domain Name Server data will get spread to the
ISPs & will be cached there.

15. The user could be influenced by DNS hijacking if the government of that country uses DNS
redirecting as a mechanism to mask censorship.

a) True

b) False

View Answer

Answer: a

1. A ___________ consists of at least one bot server or controller and one or more client-bots.

a) Virus

b) Trojan

c) Botnet

d) Adware

View Answer

Answer: c

Explanation: The botnet comprises one bot server or controller and one or more client-bots.
Botnets are managed by bot-herders. They have become major threats to security as they are
getting popular in the cyber-crime world.
2. Botnets are managed by ______________

a) Bot-holders

b) Bot-herders

c) Bot-trainers

d) Bot-creators

View Answer

Answer: b

Explanation: A botnet consists of at least one bot server or controller and one or more client-bots.
Botnets are managed by bot-herders. The exact term is bot herders.

3. A _____________ is a number of Internet-connected systems, where each of them is running one or


more bots.

a) Trojan

b) Virus

c) Worms

d) Botnet

View Answer

Answer: d

Explanation: A botnet is a number of Internet-connected devices, each of which is running one or


more bots. Botnets are managed by bot-herders. These botnets have become foremost threats to
cyber-security.

4. _____________ are implemented to carry out distributed DDoS attacks, steal data, send spam
messages & permits the hacker to access various devices & its connection.

a) Trojan

b) Virus

c) Botnet

d) Worms
View Answer

Answer: c

Explanation: Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam
messages & permits the hacker to access various devices & its connection.

5. Botnets are not used for ______________

a) Perform DDoS

b) Steal bulk amount of sensitive data

c) Spamming

d) Encrypting for ransom

View Answer

Answer: d

Explanation: Botnets usually are not used for encrypting files for ransom. Botnets are implemented
to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to
access various devices & its connection.

advertisement

6. The owner of botnets can control the botnet using ___________________ software.

a) trojans

b) command and control

c) servers

d) infected servers

View Answer

Answer: b
Explanation: A botnet owner can govern and manage the botnet through command & programs.
Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam messages &
permits the hacker to access various devices & its connection.

7. The full form of C&C is ____________

a) command and control

b) copy and cut

c) command and capture

d) copy and control

View Answer

Answer: a

Explanation: The owner of botnets can control the botnet using command & control (C&C)
software. Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam
messages & permits the hacker to access various devices & its connection.

8. The word “botnet” is a blend of the words _____________ & ___________

a) robot, network

b) rocket, network

c) bot, network

d) bot, internet

View Answer

Answer: a

Explanation: The word “botnet” is a blend of the words robot & network. Botnets usually are not
used for encrypting files for ransom. They are implemented to carry out distributed DDoS attacks,
steal data, send spam messages and compromise various services & its connection.

9. Botnets are not the logical connection of which of the following?

a) Smart-phones

b) IoT devices

c) Computer systems
d) Modems

View Answer

Answer: d

Explanation: Botnets are logical connections of smart-phones, IoT devices, computer systems etc.
They are strong enough to carry out distributed denial of service attacks & permit hackers to access
various devices & its connection.

10. Infected computers and other systems within the botnet are called __________

a) killers

b) vampires

c) zombies

d) gargoyles

View Answer

Answer: c

Explanation: Attackers use the botnet for connecting of smart-phones, IoT devices, computer
systems etc. These infected computers and other systems within the botnet connection are called
zombies or zombie computers.

11. The bot program allows the bot-herders to perform all operations from a ___________ location.

a) local

b) open

c) corporate

d) remote

View Answer

Answer: d

Explanation: Infected computers and other systems within the botnet are called zombies systems
which are controlled by bot programs that allow the bot-herders to perform all operations from a
remote location.
12. Nowadays, most botnets rely on existing _______________ networks for communication.

a) server-to-server

b) peer-to-peer

c) client-to-server

d) host-to-server

View Answer

Answer: b

Explanation: Botnets are compromised connectivity of systems like smart-phones, IoT devices,
computer systems etc. Now-a-days, most botnets rely on existing peer-to-peer networks for
communication.

13. Which of the following is not an example of a botnet program?

a) Zeus

b) GameOver

c) ZeroAccess

d) MyDoom

View Answer

Answer: d

Explanation: Examples of some popular botnets are gameover, ZeroAccess, and Zeus. The infect
computers & other systems and turned them into zombies which are also called zombies systems.

14. Which of the following is an example of Botnet?

a) Zeus

b) ILOVEYOU

c) Storm Worm

d) MyDoom

View Answer
Answer: a

Explanation: Botnets are can compromise any system and turn them into zombie computers.
GameOver, Zeus etc. are examples of some popular botnets programs.

15. Which of the following is an example of a Botnet program?

a) Slammer

b) GameOver

c) Stuxnet

d) Anna Kournikova

View Answer

Answer: b

1. _____________ is data interception method used by hackers.

a) Phishing

b) DoS

c) Sniffing

d) MiTM

View Answer

Answer: c

Explanation: Sniffing is data interception method used by hackers. Sniffing is the method used to
monitor & capture all data packets passing through any target network using sniffing tools.

2. Sniffing is also known as ___________________

a) network-tapping

b) wiretapping

c) net-tapping

d) wireless-tapping
View Answer

Answer: b

Explanation: Sniffing which is also known as wiretapping is data interception method used by
hackers. It is a technique used for monitoring & capturing all data packets passing through any
target network.

3. _____________ are programs or devices that capture the vital information from the target network or
particular network.

a) Routers

b) Trappers

c) Wireless-crackers

d) Sniffers

View Answer

Answer: d

Explanation: Sniffing is data interception method used by cyber-criminals. Sniffers are programs or
devices that capture vital information from the target network or particular network.

4. Which of them is not an objective of sniffing for hackers?

a) Fetching passwords

b) Email texts

c) Types of files transferred

d) Geographic location of a user

View Answer

Answer: d

Explanation: The method used to capture data packets through any target network is called sniffing.
The various objectives of sniffing for hackers are fetching passwords, email texts and the type of
files transferred.

5. Which of the following tech-concepts cannot be sniffed?


a) Router configuration

b) ISP details

c) Email Traffic

d) Web Traffic

View Answer

Answer: b

Explanation: Sniffing is data interception method and is not used for sniffing ISP details. It is
particularly used for capturing router configuration, email traffic & web traffic.

advertisement

6. Which of the following tech-concepts cannot be sniffed?

a) Cloud sessions

b) FTP passwords

c) Telnet passwords

d) Chat sessions

View Answer

Answer: a

Explanation: Sniffing technique is used to monitor packets of target network using sniffer programs.
It cannot sniff cloud sessions. It is used to capture and monitor router configuration, Telnet
passwords, chat sessions etc.

7. Which of the below-mentioned protocol is not susceptible to sniffing?

a) HTTP

b) SMTP

c) POP
d) TCP

View Answer

Answer: d

Explanation: The technique used to supervise & confine all data packets through any target network
is called sniffing. HTTP, SMTP, POP are some protocols that are susceptible to sniffing.

8. Which of the below-mentioned protocol is not susceptible to sniffing?

a) NNTP

b) UDP

c) FTP

d) IMAP

View Answer

Answer: b

Explanation: NNTP, FTP, POP and IMAP are some protocols that are susceptible to sniffing. UDP
protocol is not susceptible to sniffing attack. Sniffing is mainly used for capturing email traffic,
router’s configuration, & web traffic.

9. There are __________ types of sniffing.

a) 2

b) 3

c) 4

d) 5

View Answer

Answer: a

Explanation: Sniffing is data surveillance technique used by hackers and is used to keep an eye on as
well as detain all data packets with the help of sniffing tools. There are two types of sniffing attacks.
These are passive sniffing and active sniffing.
10. Active sniffing is difficult to detect.

a) True

b) False

View Answer

Answer: b

Explanation: Sniffing is like “tapping phone calls” and try to know about any conversation. There are
two types of sniffing. These are passive sniffing and active sniffing. Passive sniffing is difficult to
detect.

11. Which of the following is not a sniffing tool?

a) Wireshark

b) Dude Sniffer

c) Maltego

d) Look@LAN

View Answer

Answer: c

Explanation: Packet sniffers are utility tools which are used since the release of Ethernet. List of
some of these sniffing tools are Wireshark, Dude Sniffer, Look@LAN etc.

12. A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all
your data transmitted on its division.

a) True

b) False

View Answer

Answer: a

Explanation: A sniffer on the whole turns your system’s NIC to the licentious mode so that it can
listen to all your data transmitted on its division. This is how it works to sniff all data packets.
13. A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen
to all your data transmitted on its division.

a) Phishing site

b) Sniffer tool

c) Password cracker

d) NIC cracker

View Answer

Answer: b

Explanation: A sniffer tool turns your machine’s NIC to the dissolute mode so that hackers can listen
to & observe all your data packets. Hence they can know what type of data is being transmitted and
received.

14. In _____________ sniffing, the network traffic is not only supervised & locked but also be can be
altered in different ways to accomplish the attack.

a) passive

b) signal

c) network

d) active

View Answer

Answer: d

Explanation: Sniffing is like tapping the phone calls & over-heard about any discussion. In active
sniffing, the network traffic is not only supervised & locked but also be can be altered in different
ways to accomplish the attack.

15. __________________ are those devices which can be plugged into your network at the hardware level
& it can monitor traffic.

a) Hardware sniffers & analyzers

b) Hardware protocol analyzers

c) Hardware protocol sniffers


d) Hardware traffic sniffers and observers

View Answer

Answer: b

1. ________________ are unnecessary software which infiltrates user’s system, spy on user’s activities,
stealing internet usage data & sensitive information of that user.

a) Shareware

b) Spyware

c) Ransomware

d) Freeware

View Answer

Answer: b

Explanation: Spyware is preventable software that spy on user’s activities, stealing internet usage
data & sensitive information of that user. Spyware is categorized as a sub-type of malware intended
to spy & gain access to or damage the system data, without your acquaintance.

2. They spy on our digital habits and spy on which data is more sensitive or useful for its creator.
Who are ‘they’ referring to here?

a) Shareware

b) Ransomware

c) Spyware

d) Freeware

View Answer

Answer: c

Explanation: Here ‘they’ refer to spyware which is an unnecessary software which infiltrates user’s
system, spy on user’s activities, stealing internet usage data & sensitive information of that user.

3. Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
a) advertisers

b) dark-market

c) antivirus company

d) share market

View Answer

Answer: a

Explanation: Spyware is unnecessary software which infiltrates user’s system, spy on the user’s
activities, stealing internet usage data & sensitive information of that user. Spyware collects user’s
personal data & spreads it to advertisers, data-firms, or its creator.

4. Which of the following activity is not done by spyware?

a) sell internet usage data

b) capture credit card details

c) user’s personal identity

d) steal signature of the different virus

View Answer

Answer: d

Explanation: Spyware are harmful programs intended to spy & gain access to or damage the system
data, without your acquaintance. It captures credit card details, user’s personal identity, sells
internet usage data etc.

5. Which of the following activity is not done by spyware?

a) Monitors your internet activity

b) Track user’s login details and passwords

c) Uninstalls your mobile browser

d) Spy on sensitive information

View Answer
Answer: c

Explanation: Spyware is harmful software which infiltrates user’s system, spy on user’s activities,
stealing internet usage data & sensitive information of that user. It monitors your internet activity,
track login credentials and spy on user’s sensitive information.

advertisement

6. Spyware is not a powerful & one of the most widespread threats on the internet.

a) True

b) False

View Answer

Answer: b

Explanation: Spyware is one of the most powerful & widespread threats on the internet. Spyware is
categorized as a sub-type of malware intended to spy & gain access to or damage the system data,
without your acquaintance.

7. It actually infects your device easily & makes it hard to _____________

a) delete

b) identify

c) modify

d) copy

View Answer

Answer: b

Explanation: The most powerful & widespread threats for users are the spyware. It actually infects
your device easily & makes it hard to detect. Once detected, we need specific tools and antivirus
programs to delete them.

8. There are __________ main types of spyware.

a) 2
b) 3

c) 4

d) 5

View Answer

Answer: c

Explanation: Spyware actually infects your device easily & makes it hard to detect. There are 4
major types of spyware. These are adware, tracking cookies, spy-trojans & system monitoring
spyware.

9. _____________ track the user’s online activities like search queries, history pages & downloads, for
selling purposes.

a) Ad-based spyware

b) System Monitors

c) Spy-trojans

d) Tracking cookies

View Answer

Answer: d

Explanation: There are 4 major types of spyware. One of them is the tracking cookies which track
the user’s online activities like search queries, history pages & downloads, for selling purposes.

10. _____________ tracks your data and displays those products as ads for promotions.

a) Ad-based spyware

b) System Monitors

c) Spy-trojans

d) Tracking cookies

View Answer

Answer: a
Explanation: Spyware are of four major types. One of them is adware. Adware or ad-based spyware
tracks your data and displays those products as ads for promotions.

11. _________________ disguises them as legitimate software & appear as Java or Flash Player updates.
They will periodically collect your system data and send it to its creator.

a) Ad-based spyware

b) System Monitors

c) Spy-trojans

d) Tracking cookies

View Answer

Answer: c

Explanation: There are four major types of spyware. One of them is the spy-trojans which disguise
them as legitimate software & appear as Java or Flash Player updates. They will periodically collect
your system data and send it to its creator.

12. ____________ records all your key-strokes, chat-room dialogs, program run in your system, and
system details.

a) Ad-based spyware

b) System Monitors

c) Spy-trojans

d) Tracking cookies

View Answer

Answer: b

Explanation: One of the types of spyware is the system monitoring spyware which records all your
key-strokes, chat-room dialogs, a program run in your system, and system details.

13. Which of the following do not lead you to invite spyware into your system?

a) Accepting fishy prompt or pop-ups

b) Downloading apps from an unreliable source

c) Opening unknown attachments


d) Installing antivirus patches

View Answer

Answer: d

Explanation: Some of the largest possible ways your system can become contaminated with
spyware is when you accept fishy prompts and pop-ups, download apps from unreliable sources or
opening unknown attachments from mailing services.

14. As you sense your device has been infected with spyware, you should run a scan with your
existing security software/AV for making sure it has cleaned up all malicious contents.

a) True

b) False

View Answer

Answer: a

Explanation: As you sense your device has been infected with spyware, you should run a scan with
your existing security software/AV for making sure it has cleaned up all malicious contents. In this
manner, you can protect your system before the spyware takes away all your sensitive data.

15. Which of the following is not an anti-spyware tool?

a) MalwareBytes Anti-Malware tool

b) SpyBot Search and Destroy

c) Emsisoft Emergency Kit

d) MS Firewall Defender

View Answer

Answer: d

Explanation: MS Firewall Defender is not used for detecting & removing spyware. MalwareBytes
Anti-Malware tool, SpyBot Search and Destroy & Emsisoft Emergency Kit are some of the anti-
spyware tools.

16. If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take
steps to remove it and proactively change your ________ and delete browsing activities from web
browser.

a) passwords

b) email ID

c) name

d) address

View Answer

Answer: a

1. In general how many key elements constitute the entire security structure?

a) 1

b) 2

c) 3

d) 4

View Answer

Answer: d

Explanation: The 4 key elements that constitute the security are: confidentiality, integrity,
authenticity & availability. Authenticity is not considered as one of the key elements in some other
security models, but the popular CIA Triad eliminates this as authenticity at times comes under
confidentiality & availability.

2. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

a) Confidentiality

b) Integrity

c) Authenticity

d) Availability

View Answer
Answer: c

Explanation: According to the CIA triad the three components that a security need is the
Confidentiality, Integrity, Availability (as in short read as CIA).cyber-security-questions-answers-
elements-security-q2

3. This is the model designed for guiding the policies of Information security within a company, firm
or organization. What is “this” referred to here?

a) Confidentiality

b) Non-repudiation

c) CIA Triad

d) Authenticity

View Answer

Answer: c

Explanation: Various security models were being developed till date. This is by far the most popular
and widely used model which focuses on the information’s confidentiality, integrity as well as
availability and how these key elements can be preserved for a better security in any organization.

4. CIA triad is also known as ________

a) NIC (Non-repudiation, Integrity, Confidentiality)

b) AIC (Availability, Integrity, Confidentiality)

c) AIN (Availability, Integrity, Non-repudiation)

d) AIC (Authenticity, Integrity, Confidentiality)

View Answer

Answer: b

Explanation: This approach of naming it CIA Triad as AIC (Availability, Integrity, Confidentiality)
Triad because people get confused about this acronym with the abbreviation and the secret agency
name Central Intelligence Agency.

5. When you use the word _____ it means you are protecting your data from getting disclosed.
a) Confidentiality

b) Integrity

c) Authentication

d) Availability

View Answer

Answer: a

Explanation: Confidentiality is what every individual prefer in terms of physical privacy as well as
digital privacy. This term means our information needs to be protected from getting disclose to
unauthorised parties, for which we use different security mechanisms like password protection,
biometric security, OTPs (One Time Passwords) etc.

advertisement

6. ______ means the protection of data from modification by unknown users.

a) Confidentiality

b) Integrity

c) Authentication

d) Non-repudiation

View Answer

Answer: b

Explanation: A information only seems valuable if it is correct and do not get modified during its
journey in the course of arrival. The element integrity makes sure that the data sent or generated
from other end is correct and is not modified by any unauthorised party in between.

7. When integrity is lacking in a security system, _________ occurs.

a) Database hacking

b) Data deletion
c) Data tampering

d) Data leakage

View Answer

Answer: c

Explanation: The term data tampering is used when integrity is compromised in any security model
and checking its integrity later becomes costlier. Example: let suppose you sent $50 to an
authorised person and in between a Man in the Middle (MiTM) attack takes place and the value has
tampered to $500. This is how integrity is compromised.

8. _______ of information means, only authorised users are capable of accessing the information.

a) Confidentiality

b) Integrity

c) Non-repudiation

d) Availability

View Answer

Answer: d

Explanation: Information seems useful only when right people (authorised users) access it after
going through proper authenticity check. The key element availability ensures that only authorised
users are able to access the information.

9. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered
fundamental?

a) They help understanding hacking better

b) They are key elements to a security breach

c) They help understands security and its components better

d) They help to understand the cyber-crime better

View Answer

Answer: c
Explanation: The four elements of security viz. confidentiality, integrity, authenticity & availability
helps in better understanding the pillars of security and its different components.

10. This helps in identifying the origin of information and authentic user. This referred to here as
__________

a) Confidentiality

b) Integrity

c) Authenticity

d) Availability

View Answer

Answer: c

Explanation: The key element, authenticity helps in assuring the fact that the information is from
the original source.

11. Data ___________ is used to ensure confidentiality.

a) Encryption

b) Locking

c) Deleting

d) Backup

View Answer

Answer: a

Explanation: Data encryption is the method of converting plain text to cipher-text and only
authorised users can decrypt the message back to plain text. This preserves the confidentiality of
data.

12. Which of these is not a proper method of maintaining confidentiality?

a) Biometric verification

b) ID and password based verification

c) 2-factor authentication
d) switching off the phone

View Answer

Answer: d

Explanation: Switching off the phone in the fear of preserving the confidentiality of data is not a
proper solution for data confidentiality. Fingerprint detection, face recognition, password-based
authentication, two-step verifications are some of these.

13. Data integrity gets compromised when _____ and _____ are taken control off.

a) Access control, file deletion

b) Network, file permission

c) Access control, file permission

d) Network, system

View Answer

Answer: c

Explanation: The two key ingredients that need to be kept safe are: access control & file permission
in order to preserve data integrity.

14. ______ is the latest technology that faces an extra challenge because of CIA paradigm.

a) Big data

b) Database systems

c) Cloud storages

d) Smart dust

View Answer

Answer: a

Explanation: Big data has additional challenges that it has to face because of the tremendous
volume of data that needs protection as well as other key elements of the CIA triad, which makes
the entire process costly and time-consuming.
15. One common way to maintain data availability is __________

a) Data clustering

b) Data backup

c) Data recovery

d) Data Altering

View Answer

Answer: b

You might also like