MCQOPTIONS
Saved Bookmarks
This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium. |
| A. | Malware |
| B. | Remote Access Trojans |
| C. | Keyloggers |
| D. | Spyware |
| Answer» E. | |
| 2. |
_________ are the special type of programs used for recording and tracking user’s keystroke. |
| A. | Keylogger |
| B. | Trojans |
| C. | Virus |
| D. | Worms |
| Answer» B. Trojans | |
| 3. |
Which method of hacking will record all your keystrokes? |
| A. | Keyhijacking |
| B. | Keyjacking |
| C. | Keylogging |
| D. | Keyboard monitoring |
| Answer» D. Keyboard monitoring | |
| 4. |
Which of them is not a wireless attack? |
| A. | Eavesdropping |
| B. | MAC Spoofing |
| C. | Wireless Hijacking |
| D. | Phishing |
| Answer» E. | |
| 5. |
Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________ |
| A. | Session Hijacking |
| B. | Session Fixation |
| C. | Cookie stuffing |
| D. | Session Spying |
| Answer» B. Session Fixation | |
| 6. |
This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here? |
| A. | SQL injection |
| B. | HTML Injection |
| C. | Cross Site Scripting (XSS) |
| D. | Cross Site Request Forgery (XSRF) |
| Answer» D. Cross Site Request Forgery (XSRF) | |
| 7. |
WHICH_OF_THEM_IS_NOT_A_WIRELESS_ATTACK??$ |
| A. | Eavesdropping |
| B. | MAC Spoofing |
| C. | Wireless Hijacking |
| D. | Phishing |
| Answer» E. | |
| 8. |
Which method of hacking will record all your keystrokes?$ |
| A. | Keyhijacking |
| B. | Keyjacking |
| C. | Keylogging |
| D. | Keyboard monitoring |
| Answer» D. Keyboard monitoring | |
| 9. |
An_attempt_to_harm,_damage_or_cause_threat_to_a_system_or_network_is_broadly_termed_as_______$ |
| A. | Cyber-crime |
| B. | Cyber Attack |
| C. | System hijacking |
| D. | Digital crime |
| Answer» C. System hijacking | |
| 10. |
___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain. |
| A. | Cyber-warfare |
| B. | Cyber campaign |
| C. | Cyber-terrorism |
| D. | Cyber attack |
| Answer» D. Cyber attack | |
| 11. |
Stuxnet is a _________ |
| A. | Worm |
| B. | Virus |
| C. | Trojan |
| D. | Antivirus |
| Answer» B. Virus | |
| 12. |
These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.$ |
| A. | Malware |
| B. | Remote Access Trojans |
| C. | Keyloggers |
| D. | Spyware |
| Answer» E. | |
| 13. |
_________ are the special type of programs used for recording and tracking user’s keystroke.$ |
| A. | Keylogger |
| B. | Trojans |
| C. | Virus |
| D. | Worms |
| Answer» B. Trojans | |
| 14. |
Which of this is an example of physical hacking? |
| A. | Remote Unauthorised access |
| B. | Inserting malware loaded USB to a system |
| C. | SQL Injection on SQL vulnerable site |
| D. | DDoS (Distributed Denial of Service) attack |
| Answer» C. SQL Injection on SQL vulnerable site | |
| 15. |
Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________$ |
| A. | Session Hijacking |
| B. | Session Fixation |
| C. | Cookie stuffing |
| D. | Session Spying |
| Answer» B. Session Fixation | |
| 16. |
When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place. |
| A. | Database crash attack |
| B. | DoS (Denial of Service) attack |
| C. | Data overflow Attack |
| D. | Buffer Overflow attack |
| Answer» E. | |
| 17. |
This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?$ |
| A. | SQL injection |
| B. | HTML Injection |
| C. | Cross Site Scripting (XSS) |
| D. | Cross Site Request Forgery (XSRF) |
| Answer» D. Cross Site Request Forgery (XSRF) | |
| 18. |
XSS is abbreviated as __________ |
| A. | Extreme Secure Scripting |
| B. | Cross Site Security |
| C. | X Site Scripting |
| D. | Cross Site Scripting |
| Answer» E. | |
| 19. |
_____________ is a code injecting method used for attacking the database of a system / website. |
| A. | HTML injection |
| B. | SQL Injection |
| C. | Malicious code injection |
| D. | XML Injection |
| Answer» C. Malicious code injection | |
| 20. |
Who deploy Malwares to a system or network? |
| A. | Criminal organizations, Black hat hackers, malware developers, cyber-terrorists |
| B. | Criminal organizations, White hat hackers, malware developers, cyber-terrorists |
| C. | Criminal organizations, Black hat hackers, software developers, cyber-terrorists |
| D. | Criminal organizations, gray hat hackers, Malware developers, Penetration testers |
| Answer» B. Criminal organizations, White hat hackers, malware developers, cyber-terrorists | |
| 21. |
The full form of Malware is ________ |
| A. | Malfunctioned Software |
| B. | Multipurpose Software |
| C. | Malicious Software |
| D. | Malfunctioning of Security |
| Answer» D. Malfunctioning of Security | |