Hide Answer Workspace: A. Phishing B. Bulling C. Stalking D. Identity Theft
Hide Answer Workspace: A. Phishing B. Bulling C. Stalking D. Identity Theft
Hide Answer Workspace: A. Phishing B. Bulling C. Stalking D. Identity Theft
several peoples?
a. Phishing
b. Bulling
c. Stalking
d. Identity theft
Hide Answer Workspace
Answer: c
Explanation: In general, Stalking refers to continuous surveillance on the target (or person)
done by a group of people or by the individual person.
Cyber Stalking is a type of cybercrime in which a person (or victim) is being followed
continuously by another person or group of several people through electronic means to
harass the victim. We can also say that the primary goal of Stalking is to observe or monitor
each victim's actions to get the essential information that can be further used for
threatening, harassing, etc.
2) Which one of the following can be considered as the class of computer threats?
a. Dos Attack
b. Phishing
c. Soliciting
d. Both A and C
Hide Answer Workspace
Answer: a
Explanation: A dos attack refers to the denial of service attack. It is a kind of cyber attack in
which one tries to make a machine (or targeted application, website etc.) unavailable for its
intended users. It is usually accomplished by disturbing the service temporarily or indefinitely
of the target connected to the internet.
History of Java
a. Virus
b. Malware
c. Spam
1
d. All of the above
Hide Answer Workspace
Answer: c
4) Which of the following usually observe each activity on the internet of the victim, gather all
information in the background, and send it to someone else?
a. Malware
b. Spyware
c. Adware
d. All of the above
Hide Answer Workspace
Answer: b
Explanation: It is generally defined as the software designed to enter the target's device or
computer system, gather all information, observe all user activities, and send this information
to a third party. Another important thing about the spyware is that it works in the
background sends all information without your permission.
5) _______ is a type of software designed to help the user's computer detect viruses and avoid them.
a. Malware
b. Adware
c. Antivirus
d. Both B and C
Hide Answer Workspace
Answer: c
Explanation: An antivirus is a kind of software that is specially designed to help the user's
computer to detect the virus as well as to avoid the harmful effect of them. In some cases
where the virus already resides in the user's computer, it can be easily removed by scanning
the entire system with antivirus help.
2
6) Which one of the following is a type of antivirus program?
a. Quick heal
b. Mcafee
c. Kaspersky
d. All of the above
Hide Answer Workspace
Answer: d
Explanation: Antivirus is a kind of software program that helps to detect and remove viruses
form the user's computer and provides a safe environment for users to work on. There are
several kinds of antivirus software are available in the market, such as Kaspersky, Mcafee,
Quick Heal, Norton etc., so the correct answer is D.
7) It can be a software program or a hardware device that filters all data packets coming through the
internet, a network, etc. it is known as the_______:
a. Antivirus
b. Firewall
c. Cookies
d. Malware
Hide Answer Workspace
Answer: b
8) Which of the following refers to stealing one's idea or invention of others and use it for their own
benefits?
a. Piracy
b. Plagiarism
c. Intellectual property rights
3
d. All of the above
Hide Answer Workspace
Answer: d
Explanation: The stealing ideas or the invention of others and using them for their own
profits can also be defined in several different ways, such as piracy, intellectual property
rights, and plagiarism.
9) Read the following statement carefully and find out whether it is correct about the hacking or not?
It can be possible that in some cases, hacking a computer or network can be legal.
Hide Answer Workspace
Answer: b
Explanation: Nowadays, hacking is not just referred to as an illegal task because there are
some good types of hackers are also available, known as an ethical hacker. These types of
hackers do not hack the system for their own purposes, but the organization hires them to
hack their system to find security falls, loop wholes. Once they find the loop whole or
venerability in the system, they get paid, and the organization removes that weak points.
10) Which of the following refers to exploring the appropriate, ethical behaviors related to the online
environment and digital media platform?
a. Cyber low
b. Cyberethics
c. Cybersecurity
d. Cybersafety
Hide Answer Workspace
Answer: b
4
11) Which of the following refers to the violation of the principle if a computer is no more accessible?
a. Access control
b. Confidentiality
c. Availability
d. All of the above
Hide Answer Workspace
Answer: c
12) Which one of the following refers to the technique used for verifying the integrity of the message?
a. Digital signature
b. Decryption algorithm
c. Protocol
d. Message Digest
Hide Answer Workspace
Answer: d
13) Which one of the following usually used in the process of Wi-Fi-hacking?
a. Aircrack-ng
b. Wireshark
c. Norton
d. All of the above
Hide Answer Workspace
Answer: a
5
networks or finding vulnerabilities in the network to capture or monitor the data packets
traveling in the network.
14) Which of the following port and IP address scanner famous among the users?
Hide Answer Workspace
Answer: b
Explanation: Angry IP Scanner is a type of hacking tool that is usually used by both white
hat and black hat types of hackers. It is very famous among the users because it helps to find
the weaknesses in the network devices.
15) In ethical hacking and cyber security, there are _______ types of scanning:
a. 1
b. 2
c. 3
d. 4
Hide Answer Workspace
Answer: c
Explanation: There are usually three types of scanning in ethical hacking and cyber security.
Therefore the correct answer is C.
Hide Answer Workspace
6
Answer: b
Explanation: Among the following-given options, the Cloud Scan is one, and only that is not
a type of scanning.
17) In system hacking, which of the following is the most crucial activity?
a. Information gathering
b. Covering tracks
c. Cracking passwords
d. None of the above
Hide Answer Workspace
Answer: c
Explanation: While trying to hack a system, the most important thing is cracking the
passwords.
Hide Answer Workspace
Answer: a
Explanation: The vulnerability, port, and network scanning are three types of scanning.
19) Which one of the following is actually considered as the first computer virus?
a. Sasser
b. Blaster
c. Creeper
d. Both A and C
Hide Answer Workspace
7
Answer: c
Explanation: The Creeper is called the first computer virus as it replicates itself (or clones
itself) and spread from one system to another. It is created by Bob Thomas at BBN in early
1971 as an experimental computer program.
20) To protect the computer system against the hacker and different kind of viruses, one must always
keep _________ on in the computer system.
a. Antivirus
b. Firewall
c. Vlc player
d. Script
Hide Answer Workspace
Answer: b
Explanation: It is essential to always keep the firewall on in our computer system. It saves
the computer system against hackers, viruses, and installing software form unknown sources.
We can also consider it the first line of defense of the computer system.
a. An Antivirus Program
b. A photo editing software
c. A computer virus
d. A video editing software
Hide Answer Workspace
Answer: c
Explanation: Cod Red is a type of Computer virus that was first discovered on 15 July in
2001 as it attacks the servers of Microsoft. In a couple of next days, it infects almost 300,000
servers.
22) Which of the following can be considered as the elements of cyber security?
a. Application Security
b. Operational Security
8
c. Network Security
d. All of the above
Hide Answer Workspace
Answer: d
Explanation: Application security, operational security, network security all are the main and
unforgettable elements of Cyber Security. Therefore the correct answer is D.
23) Which of the following are famous and common cyber-attacks used by hackers to infiltrate the
user's system?
Hide Answer Workspace
Answer: d
a. Maliciousware
b. Badware
c. Ilegalware
d. Malware
Hide Answer Workspace
Answer: d
25) Hackers usually used the computer virus for ______ purpose.
9
a. To log, monitor each and every user's stroke
b. To gain access the sensitive information like user's Id and Passwords
c. To corrupt the user's data stored in the computer system
d. All of the above
Hide Answer Workspace
Answer: d
Explanation: In general, hackers use computer viruses to perform several different tasks
such as to corrupt the user's data stored in his system, to gain access the important
information, to monitor or log each user's strokes. Therefore the correct answer is D.
a. WPA
b. WPA2
c. WPS
d. Both A and C
Hide Answer Workspace
Answer: b
Explanation: Nowadays, in Wi-Fi Security, the WPA2 is one of the most widely used
protocols because it offers a more secure connection rather than the WPA. It is also known
as the upgraded version of the WPA protocol.
Hide Answer Workspace
Answer: b
Explanation: The term "TCP/IP" stood for Transmission Control Protocol/ internet protocol
and was developed by the US government in the early days of the internet.
10
28) The response time and transit time is used to measure the ____________ of a network.
a. Security
b. Longevity
c. Reliability
d. Performance
Hide Answer Workspace
Answer: d
Explanation: On the basis of response time and transit time, the performance of a network
is measured.
29) Which of the following factor of the network gets hugely impacted when the number of users
exceeds the network's limit?
a. Reliability
b. Performance
c. Security
d. Longevity
Hide Answer Workspace
Answer: d
Explanation: When the numbers of users on a network get increased and exceed the
network's limit, therefore the performance is one of the factors of the network that is hugely
impacted by it.
30) In the computer networks, the encryption techniques are primarily used for improving the ________
a. Security
b. Performance
c. Reliability
d. Longevity
Hide Answer Workspace
Answer: a
Explanation: Encryption techniques are usually used to improve the security of the network.
So the correct answer will be A.
11
31) Which of the following statements is correct about the firewall?
Hide Answer Workspace
Answer: b
Explanation: A firewall can be the type of either a software or the hardware device that
filters each and every data packet coming from the network, internet. It can also be
considered as a device installed at the boundary of an incorporate to protect form
unauthorized access. Sometimes firewall also refers to the first line of defense against
viruses, unauthorized access, malicious software etc.
a. 1970
b. 1971
c. 1972
d. 1969
Hide Answer Workspace
Answer: b
Explanation: In 1970, the world's first computer virus was created by Robert (Bob) Thomas.
This virus was designed as it creates copies of itself or clones itself and spreads one
computer to another. So the correct answer will be 1970.
33) Which of the following is considered as the world's first antivirus program?
a. Creeper
b. Reaper
c. Tinkered
d. Ray Tomlinson
12
Hide Answer Workspace
Answer: b
34) Which one of the following principles of cyber security refers that the security mechanism must be
as small and simple as possible?
a. Open-Design
b. Economy of the Mechanism
c. Least privilege
d. Fail-safe Defaults
Hide Answer Workspace
Answer: b
Explanation: Economy of the mechanism states that the security mechanism must need to
be simple and small as possible.
35) Which of the following principle of cyber security restricts how privileges are initiated whenever
any object or subject is created?
a. Least privilege
b. Open-Design
c. Fail-safe Defaults
d. None of the above
Hide Answer Workspace
Answer: c
Explanation: The fail-safe Defaults principle of cyber security restricts how privileges are
initiated whenever a subject or object is created. In cases where the privileges, rights, access
or some other security-related attribute is not granted explicitly, it should also not granted
access to the object.
36) Suppose an employee demands the root access to a UNIX system, where you are the
administrator; that right or access should not be given to the employee unless that employee has
13
work that requires certain rights, privileges. It can be considered as a perfect example of which
principle of cyber security?
a. Least privileges
b. Open Design
c. Separation of Privileges
d. Both A & C
Hide Answer Workspace
Answer: a
Explanation: The example given in the above question refers to the least privileges principle
of cyber security. The least privileges principle of cyber security states that no rights, access
to the system should be given to any of the employees of the organization unless he/she
needs those particular rights, access in order to complete the given task. In short, we can say
that its primary work is to restrict or control the assignment of rights to the employees.
37) Which of the following can also consider as the instances of Open Design?
a. CSS
b. DVD Player
c. Only A
d. Both A and B
Hide Answer Workspace
Answer: d
38) Which one of the following principles states that sometimes it is become more desirable to
rescored the details of intrusion that to adopt more efficient measure to avoid it?
Hide Answer Workspace
14
Answer: b
Explanation: The principle called compromise factor states that in some cases, it is more
beneficial to records or document the details of the intrusion that to adopt more efficient
measures to avoid it.
39) The web application like banking websites should ask its users to log-in again after some specific
period of time, let say 30 min. It can be considered as an example of which cybersecurity principle?
a. Compromise recording
b. Psychological acceptability
c. Complete mediation
d. None of the above
Hide Answer Workspace
Answer: c
Explanation: The complete mediation principle of cybersecurity requires that all the access
must be checked to ensure that they are genuinely allowed. However, the example given in
the above question can be considered as an example of Complete Mediation.
40) Which one of the following statements is correct about Email security in the network security
methods?
a. One has to deploy hardware, software, and security procedures to lock those apps
down.
b. One should know about what the normal behavior of a network look likes so that
he/she can spot any changes, breaches in the behavior of the network.
c. Phishing is one of the most commonly used methods that are used by hackers to
gain access to the network
d. All of the above
Hide Answer Workspace
Answer: c
Explanation: In terms of Email Security, phishing is one of the standard methods that are
used by Hackers to gain access to a network. The Email Security Tools can handle several
types of attacks, such as the incoming attacks, and protect the outbound messages
containing sensitive data/information as well.
15
41) Which of the following statements is true about the VPN in Network security?
a. It is a type of device that helps to ensure that communication between a device and a
network is secure.
b. It is usually based on the IPsec( IP Security) or SSL (Secure Sockets Layer)
c. It typically creates a secure, encrypted virtual "tunnel" over the open internet
d. All of the above
Hide Answer Workspace
Answer: d
Explanation: The term VPN stands for Virtual Private Network. It is a type of network
security-enhancing tool that can be either a software program or a hardware device. It
usually authenticates the communication between a device and a network by creating a
secure encrypted virtual "tunnel". In general, the software VPNs are considered as the most
cost-effective, user friendly over the hardware VPNs.
42) Which of the following type of text is transformed with the help of a cipher algorithm?
a. Transformed text
b. Complex text
c. Scalar text
d. Plain text
Hide Answer Workspace
Answer: d
Hide Answer Workspace
16
Answer: c
44) Which type of the following malware does not replicate or clone them self's through infection?
a. Rootkits
b. Trojans
c. Worms
d. Viruses
Hide Answer Workspace
Answer: b
Explanation: The Trojans type of malware does not generate copies of them self's or clone
them. The main reason why these types of viruses are referred to as the Trojans is the
mythological story of the Greeks. In which some top-level accessions were hidden in the big
wooden horse-like structure and given to the enemy as a gift. So that they can enter to the
enemy's palace without come in any sight.
45) Which of the following malware's type allows the attacker to access the administrative controls
and enables his/or her to do almost anything he wants to do with the infected computers.
a. RATs
b. Worms
c. Rootkits
d. Botnets
Hide Answer Workspace
Answer: a
17
46) Which of the following statements is true about the Trojans?
Hide Answer Workspace
Answer: a
Explanation: Trojans are a type of malware that will perform any types of actions for those
they are design or programmed. Another important thing about Trojans is that the user may
not know that the malware enters their system until the Trojan starts doing its job for which
they are programmed.
47) Which of the following is just opposite to the Open Design principle?
Hide Answer Workspace
Answer: a
48) Which of the following is a type of independent malicious program that never required any host
program?
a. Trojan Horse
b. Worm
c. Trap Door
d. Virus
Hide Answer Workspace
Answer: b
18
Explanation: Warm is a type of independent malicious program that does not require any
host programs(or attached with some programs). They typically cause damages to the
systems by consuming the bandwidths and overloading the servers. Warms are quite
different from the virus as they are stand-alone programs, whereas viruses need some type
of triggers to activate by their host or required human interaction.
49) Which of the following usually considered as the default port number of apache and several other
web servers?
a. 20
b. 40
c. 80
d. 87
Hide Answer Workspace
Answer: c
Explanation: The default port number used by the apache and several other web servers is
80. So the correct answer will be C.
a. Hex
b. Binary
c. IP
d. URL
Hide Answer Workspace
Answer: d
Explanation: DNS stands for the Domain name system; the main work of a DNS is to
translate the Domain name into an IP address that is understandable to the computers.
51) Which one of the following systems cannot be considered as an example of the operating
systems?
a. Windows 8
b. Red Hat Linux
c. BSD Linux
19
d. Microsoft Office
Hide Answer Workspace
Answer: d
52) In the CIA Triad, which one of the following is not involved?
a. Availability
b. Confidentiality
c. Authenticity
d. Integrity
Hide Answer Workspace
Answer: c
Explanation: CIA refers to Confidentiality, Integrity, and Availability that are also considered
as the CIA triad. However, the CIA triad does not involve Authenticity.
53) In an any organization, company or firm the policies of information security come under__________
a. CIA Triad
b. Confidentiality
c. Authenticity
d. None of the above
Hide Answer Workspace
Answer: a
54) Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the
fundamentals?
20
a. They help in understanding the hacking process
b. These are the main elements for any security breach
c. They help to understand the security and its components in a better manner
d. All of the above
Hide Answer Workspace
Answer: c
55) In order to ensure the security of the data/ information, we need to ____________ the data:
a. Encrypt
b. Decrypt
c. Delete
d. None of the above
Hide Answer Workspace
Answer: a
Explanation: Data encryption is a type of method in which the plain text is converted into
ciphertext, and only the authorized users can decrypt it back to plain text by using the right
key. This preserves the Confidentiality of the Data.
56) Which one of the following is considered as the most secure Linux operating system that also
provides anonymity and the incognito option for securing the user's information?
a. Ubuntu
b. Tails
c. Fedora
d. All of the above
Hide Answer Workspace
Answer: b
21
main reason why the tails operating system is famous among the user is that it is almost
untraceable, which keep your privacy secure.
57) Which type following UNIX account provides all types of privileges and rights which one can
perform administrative functions?
a. Client
b. Guest
c. Root
d. Administrative
Hide Answer Workspace
Answer: d
Explanation: If a user uses the Root account of the UNIX operating system, he can carry out
all types of administrative functions because it provides all necessary privileges and rights to
a user.
a. OSCON
b. DEVON
c. DEFCON
d. SECTION
Hide Answer Workspace
Answer: c
Explanation: DEFCON is one of the most popular and largest Hacker's as well as the security
consultant's conference. It is always held once a year in Las Vegas, Nevada, where hackers of
all types (such as black hats, gray hats, and white hat hackers), government agents as well as
security professionals from around the world attend the conference attends this meeting.
59) Which of the following known as the oldest phone hacking techniques used by hackers to make
free calls?
a. Phreaking
b. Phishing
c. Cracking
22
d. Spraining
Hide Answer Workspace
Answer: a
a. John Draper
b. Kevin Mitnick
c. John von Neumann
d. Kevin Poulsen
Hide Answer Workspace
Answer: d
Explanation: The SIPRNET (or Advanced Research Project Agency Network) system was first
hacked by Kevin Poulsen as he breaks into the Pentagon network.
23