MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
ONCE_ACTIVATED,_____________CAN_ENABLE_____________TO_SPY_ON_THE_VICTIM,_STEAL_THEIR_SENSITIVE_INFORMATION_&_GAIN_BACKDOOR_ACCESS_TO_THE_SYSTEM.?$ |
| A. | virus, cyber-criminals |
| B. | malware, penetration testers |
| C. | trojans, cyber-criminals |
| D. | virus, penetration testers |
| Answer» D. virus, penetration testers | |
| 2. |
A _______________ provides malicious users remote control over the targeted computer.$ |
| A. | DDoS-Trojan |
| B. | Backdoor Trojan |
| C. | Trojan-Banker |
| D. | Trojan-Downloader |
| Answer» C. Trojan-Banker | |
| 3. |
Trojans can not ______________$ |
| A. | steal data |
| B. | self-replicate |
| C. | steal financial information |
| D. | steal login credentials |
| Answer» C. steal financial information | |
| 4. |
____________ work in background & keeps on downloading other malicious programs when the system is online. |
| A. | DDoS-Trojan |
| B. | Backdoor Trojan |
| C. | Trojan-Banker |
| D. | Trojan-Downloader |
| Answer» E. | |
| 5. |
Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 6. |
______________ perform automated DoS (Denial of Service) attacks on a targeted web address. |
| A. | DDoS-Trojan |
| B. | Backdoor Trojan |
| C. | Trojan-Banker |
| D. | Trojan-Downloader |
| Answer» B. Backdoor Trojan | |
| 7. |
_______________ programs are specially designed for stealing your account data for online banking systems, e-payment services & credit/debit cards. |
| A. | DDoS-Trojan |
| B. | Backdoor Trojan |
| C. | Trojan-Banker |
| D. | Trojan-Downloader |
| Answer» D. Trojan-Downloader | |
| 8. |
Some Trojans carry ransomware with them to encrypt the data and ask for ransom? |
| A. | True |
| B. | False |
| Answer» B. False | |
| 9. |
Trojans do not do one of the following. What is that? |
| A. | Deleting Data |
| B. | Protecting Data |
| C. | Modifying Data |
| D. | Copying Data |
| Answer» C. Modifying Data | |
| 10. |
Which of the following port is not used by Trojans? |
| A. | UDP |
| B. | TCP |
| C. | SMTP |
| D. | MP |
| Answer» E. | |
| 11. |
Which of them is not a proper way of getting into the system? |
| A. | IM |
| B. | Attachments |
| C. | Official product sites |
| D. | Un-trusted sites, freeware and pirated software |
| Answer» D. Un-trusted sites, freeware and pirated software | |
| 12. |
Trojan creators do not look for _______________ |
| A. | Credit card information |
| B. | Confidential data |
| C. | Important documents |
| D. | Securing systems with such programs |
| Answer» E. | |
| 13. |
By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background. |
| A. | Trojan |
| B. | Virus |
| C. | Antivirus |
| D. | Anti-malware |
| Answer» B. Virus | |
| 14. |
____________ works in background and steals sensitive data. |
| A. | Virus |
| B. | Shareware |
| C. | Trojan |
| D. | Adware |
| Answer» D. Adware | |
| 15. |
A ___________ is a small malicious program that runs hidden on infected system. |
| A. | Virus |
| B. | Trojan |
| C. | Shareware |
| D. | Adware |
| Answer» C. Shareware | |