MCQOPTIONS
Saved Bookmarks
This section includes 39 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location. |
| A. | EventLog Analyser |
| B. | NordVPN |
| C. | Wireshark |
| D. | PacketFilter Analyzer |
| Answer» B. NordVPN | |
| 2. |
_______________ is a popular tool used for network analysis in multiprotocol diverse network. |
| A. | Snort |
| B. | SuperScan |
| C. | Burp Suit |
| D. | EtterPeak |
| Answer» E. | |
| 3. |
Remote exploits is that type of exploits acts over any network to exploit on security vulnerability. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 4. |
Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 5. |
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008. |
| A. | Section 66 |
| B. | Section 67 |
| C. | Section 68 |
| D. | Section 69 |
| Answer» C. Section 68 | |
| 6. |
_____________ helps in protecting corporate data, communications and other assets. |
| A. | Snort |
| B. | CipherCloud |
| C. | Burp Suit |
| D. | Wireshark |
| Answer» C. Burp Suit | |
| 7. |
________________ helps in protecting businesses against data breaches that may make threats to cloud. |
| A. | Centrify |
| B. | Mailbox Exchange Recovery |
| C. | Nessus |
| D. | Dashline |
| Answer» B. Mailbox Exchange Recovery | |
| 8. |
Accessing computer without prior authorization is a cyber-crimes that come under _______ |
| A. | Section 65 |
| B. | Section 66 |
| C. | Section 68 |
| D. | Section 70 |
| Answer» C. Section 68 | |
| 9. |
Nmap is abbreviated as Network Mapper. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 10. |
Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. |
| A. | 65 |
| B. | 65-D |
| C. | 67 |
| D. | 70 |
| Answer» B. 65-D | |
| 11. |
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine. |
| A. | section 67-A |
| B. | section 67-B |
| C. | section 67-C |
| D. | section 67-D |
| Answer» B. section 67-B | |
| 12. |
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act. |
| A. | Section 66 |
| B. | Section 67 |
| C. | Section 68 |
| D. | Section 69 |
| Answer» C. Section 68 | |
| 13. |
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» E. | |
| 14. |
What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means? |
| A. | 6 months of imprisonment and a fine of Rs. 50,000 |
| B. | 1 year of imprisonment and a fine of Rs. 100,000 |
| C. | 2 years of imprisonment and a fine of Rs. 250,000 |
| D. | 3 years of imprisonment and a fine of Rs. 500,000 |
| Answer» E. | |
| 15. |
________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit. |
| A. | Local exploits |
| B. | Remote exploits |
| C. | System exploits |
| D. | Network exploits |
| Answer» B. Remote exploits | |
| 16. |
______________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes. |
| A. | Outlook |
| B. | Nessus |
| C. | Mailbox Exchange Recovery |
| D. | Mail Exchange Recovery toolkit |
| Answer» D. Mail Exchange Recovery toolkit | |
| 17. |
L0phtCrack is formerly known as LC3. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» C. May be True or False | |
| 18. |
____________ scans TCP ports and resolves different hostnames. |
| A. | SuperScan |
| B. | Snort |
| C. | Ettercap |
| D. | QualysGuard |
| Answer» B. Snort | |
| 19. |
___________ is a web application assessment security tool. |
| A. | LC4 |
| B. | WebInspect |
| C. | Ettercap |
| D. | QualysGuard |
| Answer» C. Ettercap | |
| 20. |
Aircrack-ng is used for ____________ |
| A. | Firewall bypassing |
| B. | Wi-Fi attacks |
| C. | Packet filtering |
| D. | System password cracking |
| Answer» C. Packet filtering | |
| 21. |
Which of the following attack-based checks WebInspect cannot do? |
| A. | cross-site scripting |
| B. | directory traversal |
| C. | parameter injection |
| D. | injecting shell code |
| Answer» E. | |
| 22. |
___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems. |
| A. | Exploiting |
| B. | Cracking |
| C. | Hacking |
| D. | Pivoting |
| Answer» E. | |
| 23. |
_____________ is a popular IP address and port scanner. |
| A. | Cain and Abel |
| B. | Snort |
| C. | Angry IP Scanner |
| D. | Ettercap |
| Answer» D. Ettercap | |
| 24. |
________ is a password recovery and auditing tool. |
| A. | LC3 |
| B. | LC4 |
| C. | Network Stumbler |
| D. | Maltego |
| Answer» C. Network Stumbler | |
| 25. |
Which of this Nmap do not check? |
| A. | services different hosts are offering |
| B. | on what OS they are running |
| C. | what kind of firewall is in use |
| D. | what type of antivirus is in use |
| Answer» E. | |
| 26. |
Which of the following deals with network intrusion detection and real-time traffic analysis? |
| A. | John the Ripper |
| B. | L0phtCrack |
| C. | Snort |
| D. | Nessus |
| Answer» D. Nessus | |
| 27. |
Wireshark is a ____________ tool. |
| A. | network protocol analysis |
| B. | network connection security |
| C. | connection analysis |
| D. | defending malicious packet-filtering |
| Answer» B. network connection security | |
| 28. |
____________ is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network. |
| A. | Wireshark |
| B. | Nessus |
| C. | Snort |
| D. | WebInspect |
| Answer» C. Snort | |
| 29. |
__________ is a popular tool used for discovering networks as well as in security auditing. |
| A. | Ettercap |
| B. | Metasploit |
| C. | Nmap |
| D. | Burp Suit |
| Answer» D. Burp Suit | |
| 30. |
A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system. |
| A. | System error |
| B. | Bugged system |
| C. | Security bug |
| D. | System virus |
| Answer» D. System virus | |
| 31. |
Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 32. |
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________ |
| A. | 2 years |
| B. | 3 years |
| C. | 4 years |
| D. | 5 years |
| Answer» C. 4 years | |
| 33. |
__________ is a popular corporate security tool that is used to detect the attack on email with cloud only services. |
| A. | Cain and Abel |
| B. | Proofpoint |
| C. | Angry IP Scanner |
| D. | Ettercap |
| Answer» C. Angry IP Scanner | |
| 34. |
_________ framework made cracking of vulnerabilities easy like point and click. |
| A. | .Net |
| B. | Metasploit |
| C. | Zeus |
| D. | Ettercap |
| Answer» C. Zeus | |
| 35. |
Which of the below-mentioned tool is used for Wi-Fi hacking? |
| A. | Wireshark |
| B. | Nessus |
| C. | Aircrack-ng |
| D. | Snort |
| Answer» D. Snort | |
| 36. |
_____________ is a special type of vulnerability that doesn’t possess risk. |
| A. | Vulnerabilities without risk |
| B. | Vulnerabilities without attacker |
| C. | Vulnerabilities without action |
| D. | Vulnerabilities no one knows |
| Answer» B. Vulnerabilities without attacker | |
| 37. |
In which year India’s IT Act came into existence? |
| A. | 2000 |
| B. | 2001 |
| C. | 2002 |
| D. | 2003 |
| Answer» B. 2001 | |
| 38. |
What is the full form of ITA-2000? |
| A. | Information Tech Act -2000 |
| B. | Indian Technology Act -2000 |
| C. | International Technology Act -2000 |
| D. | Information Technology Act -2000 |
| Answer» E. | |
| 39. |
The Information Technology Act -2000 bill was passed by K. R. Narayanan. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» C. May be True or False | |