MCQOPTIONS
Saved Bookmarks
This section includes 27 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
________ helps to classify arguments and situations, better understand a cyber-crime and helps to determine appropriate actions. |
| A. | Cyber-ethics |
| B. | Social ethics |
| C. | Cyber-bullying |
| D. | Corporate behaviour |
| Answer» B. Social ethics | |
| 2. |
An ethical hacker must ensure that proprietary information of the firm does not get leaked. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 3. |
__________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. |
| A. | Social ethics |
| B. | Ethics in cyber-security |
| C. | Corporate ethics |
| D. | Ethics in black hat hacking |
| Answer» E. | |
| 4. |
After performing ____________ the ethical hacker should never disclose client information to other parties. |
| A. | hacking |
| B. | cracking |
| C. | penetration testing |
| D. | exploiting |
| Answer» D. exploiting | |
| 5. |
Performing a shoulder surfing in order to check other’s password is ____________ ethical practice. |
| A. | a good |
| B. | not so good |
| C. | very good social engineering practice |
| D. | a bad |
| Answer» E. | |
| 6. |
Role of security auditor is to ____________ |
| A. | secure the network |
| B. | probe for safety and security of organization’s security components and systems |
| C. | detects and prevents cyber attacks and threats to organization |
| D. | does penetration testing on different web applications |
| Answer» C. detects and prevents cyber attacks and threats to organization | |
| 7. |
From where the term ‘hacker’ first came to existence? |
| A. | MIT |
| B. | Stanford University |
| C. | California |
| D. | Bell’s Lab |
| Answer» B. Stanford University | |
| 8. |
What is the name of the first hacker’s conference? |
| A. | DEFCON |
| B. | OSCON |
| C. | DEVCON |
| D. | SECCON |
| Answer» B. OSCON | |
| 9. |
They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? |
| A. | Gray Hat Hackers |
| B. | White Hat Hackers |
| C. | Hactivists |
| D. | Black Hat Hackers |
| Answer» E. | |
| 10. |
A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures. |
| A. | privacy and security |
| B. | rules and regulations |
| C. | hacking techniques |
| D. | ethics to talk to seniors |
| Answer» B. rules and regulations | |
| 11. |
Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ |
| A. | Black Hat hackers |
| B. | White Hat Hackers |
| C. | Grey Hat Hackers |
| D. | Red Hat Hackers |
| Answer» C. Grey Hat Hackers | |
| 12. |
The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ |
| A. | Sponsored Hackers |
| B. | Hactivists |
| C. | Script Kiddies |
| D. | Whistle Blowers |
| Answer» D. Whistle Blowers | |
| 13. |
These types of hackers are the most skilled hackers in the hackers’ community. Who are “they” referred to? |
| A. | White hat Hackers |
| B. | Elite Hackers |
| C. | Licensed Penetration Testers |
| D. | Red Hat Hackers |
| Answer» C. Licensed Penetration Testers | |
| 14. |
Who coined the term “cyberspace”? |
| A. | Andrew Tannenbaum |
| B. | Scott Fahlman |
| C. | William Gibson |
| D. | Richard Stallman |
| Answer» D. Richard Stallman | |
| 15. |
In which year computer scientists try to integrate encryption techniques in TCP/IP protocol? |
| A. | 1978 |
| B. | 1980 |
| C. | 1982 |
| D. | 1984 |
| Answer» B. 1980 | |
| 16. |
AFTER_PERFORMING______________THE_ETHICAL_HACKER_SHOULD_NEVER_DISCLOSE_CLIENT_INFORMATION_TO_OTHER_PARTIES.?$ |
| A. | hacking |
| B. | cracking |
| C. | penetration testing |
| D. | exploiting |
| Answer» D. exploiting | |
| 17. |
________ helps to classify arguments and situations, better understand a cyber-crime and helps to determine appropriate actions.$ |
| A. | Cyber-ethics |
| B. | Social ethics |
| C. | Cyber-bullying |
| D. | Corporate behaviour |
| Answer» B. Social ethics | |
| 18. |
___________is_the_branch_of_cyber_security_that_deals_with_morality_and_provides_different_theories_and_a_principle_regarding_the_view-points_about_what_is_right_and_wrong.$ |
| A. | Social ethics |
| B. | Ethics in cyber-security |
| C. | Corporate ethics |
| D. | Ethics in black hat hacking |
| Answer» E. | |
| 19. |
A_penetration_tester_must_identify_and_keep_in_mind_the_____________&_____________requirements_of_a_firm_while_evaluating_the_security_postures. |
| A. | privacy and security |
| B. | rules and regulations |
| C. | hacking techniques |
| D. | ethics to talk to seniors |
| Answer» B. rules and regulations | |
| 20. |
An ethical hacker must ensure that proprietary information of the firm does not get leaked? |
| A. | True |
| B. | False |
| Answer» B. False | |
| 21. |
Before performing any penetration test, through legal procedure, which key points listed below is not mandatory? |
| A. | Know the nature of the organization |
| B. | Characteristics of work done in the firm |
| C. | System and network |
| D. | Type of broadband company used by the firm |
| Answer» E. | |
| 22. |
The legal risks of ethical hacking include lawsuits due to __________ of personal data. |
| A. | stealing |
| B. | disclosure |
| C. | deleting |
| D. | hacking |
| Answer» C. deleting | |
| 23. |
_____________ is the technique used in business organizations and firms to protect IT assets. |
| A. | Ethical hacking |
| B. | Unethical hacking |
| C. | Fixing bugs |
| D. | Internal data-breach |
| Answer» B. Unethical hacking | |
| 24. |
Leaking your company data to the outside network without prior permission of senior authority is a crime. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 25. |
___________ has now evolved to be one of the most popular automated tools for unethical hacking. |
| A. | Automated apps |
| B. | Database software |
| C. | Malware |
| D. | Worms |
| Answer» D. Worms | |
| 26. |
Performing a shoulder surfing in order to check other’s password is ____________ ethical practice.$ |
| A. | a good |
| B. | not so good |
| C. | very good social engineering practice |
| D. | a bad |
| Answer» E. | |
| 27. |
What is the ethics behind training how to hack a system? |
| A. | To think like hackers and know how to defend such attacks |
| B. | To hack a system without the permission |
| C. | To hack a network that is vulnerable |
| D. | To corrupt software or service using malware |
| Answer» B. To hack a system without the permission | |