Cyber Security

1) in general how many key elements constitute the entire security structure?

Answer Is: (D) 4

Explanation:

No answer description available for this question. Let us discuss.

2) which method of hacking will recod all your keystokes?

Answer Is: (C) keylogging

Explanation:

No answer description available for this question. Let us discuss.

3) cyber-crime can be categorized into ________types.

Answer Is: (C) 2

Explanation:

No answer description available for this question. Let us discuss.

4) the full name of malware is_____

Answer Is: (C) malicious software

Explanation:

No answer description available for this question. Let us discuss.

5) viruses are__________.

Answer Is: (A) man made

Explanation:

No answer description available for this question. Let us discuss.

6) victims of cyber attack might loose_____

Answer Is: (C) both a&b

Explanation:

No answer description available for this question. Let us discuss.

7) __________is a tool which can detect registry issues in an operating system.

Answer Is: (D) languard network security scanner

Explanation:

No answer description available for this question. Let us discuss.

8) stealing of digital files comes under which section of the indian it act.

Answer Is: (C) section66-c

Explanation:

No answer description available for this question. Let us discuss.

9) script___les sent mostly through email attchment to attack host computer are called_____

Answer Is: (D) worms

Explanation:

No answer description available for this question. Let us discuss.

10) all of the following are examples of real security and privacy threats except:

Answer Is: (C) spam

Explanation:

No answer description available for this question. Let us discuss.

11) tailgating is also termed as___________

Answer Is: (A) piggy backing

Explanation:

No answer description available for this question. Let us discuss.

12) which of the following is not a type of peer-to-peer cyber-crime?

Answer Is: (D) credit card details leak in deep web

Explanation:

No answer description available for this question. Let us discuss.

13) ______is the oldest phone hacking techniques used by hackers to make free calls

Answer Is: (C) phreaking

Explanation:

No answer description available for this question. Let us discuss.

14) full name of xss is_____

Answer Is: (C) cross dite scripting

Explanation:

No answer description available for this question. Let us discuss.

15) ________ensures the integrity and security of data that are passing over a network.

Answer Is: (D) network-security protocols

Explanation:

No answer description available for this question. Let us discuss.

16) from where the term'hacker' first came to existence?

Answer Is: (A) mit

Explanation:

No answer description available for this question. Let us discuss.

17) which is a debugger an exploation tool?

Answer Is: (B) netcat

Explanation:

No answer description available for this question. Let us discuss.

18) wireshark is a tool of_______

Answer Is: (C) network protocol analysis

Explanation:

No answer description available for this question. Let us discuss.

19) protecting data from online attacks,deletions,malware,etc.is called___secrity

Answer Is: (B) cyber

Explanation:

No answer description available for this question. Let us discuss.

20) ________are the combination of both white as well as black hat hackers.

Answer Is: (A) grey hat hackers

Explanation:

No answer description available for this question. Let us discuss.

21) protectingthe data divulged by customers from unauthorized access is called_____

Answer Is: (A) privacy protection(B)

Explanation:

No answer description available for this question. Let us discuss.

22) in which year the first popular hacker conference took place?

Answer Is: (B) 1995

Explanation:

No answer description available for this question. Let us discuss.

23) which of the following is not an external threat to a computer or a computer network

Answer Is: (A) ignoranc

Explanation:

No answer description available for this question. Let us discuss.

24) name the who breaks the arpanet systems?

Answer Is: (B) kevin poulsen

Explanation:

No answer description available for this question. Let us discuss.

25) it act was enacted in the year______

Answer Is: (C) 2000

Explanation:

No answer description available for this question. Let us discuss.

26) which of the following is an anti-virus program

Answer Is: (D) all of these

Explanation:

No answer description available for this question. Let us discuss.

27) when interagrity is lacking in a security system,______occurs.

Answer Is: (C) data tampering

Explanation:

No answer description available for this question. Let us discuss.

28) full name ofnmap is_____

Answer Is: (A) network mapper

Explanation:

No answer description available for this question. Let us discuss.

29) which is a popular command-line packet analyzer?

Answer Is: (D) tepdump

Explanation:

No answer description available for this question. Let us discuss.

30) unsolicited commercial email is know as______

Answer Is: (A) spam

Explanation:

No answer description available for this question. Let us discuss.

31) _____meansthe proction of data from modification by unknow users.

Answer Is: (B) integrity

Explanation:

No answer description available for this question. Let us discuss.

32) under which section of itact,stealing any digital asset or infrmation is written a cyber-crime

Answer Is: (A) 65

Explanation:

No answer description available for this question. Let us discuss.

33) it act was anacted in the year______

Answer Is: (C) 2000

Explanation:

No answer description available for this question. Let us discuss.

34) which of the following is not an example of social engineering?

Answer Is: (C) carding

Explanation:

No answer description available for this question. Let us discuss.

35) sdlc in software development stands for:

Answer Is: (B) software development life cycle

Explanation:

No answer description available for this question. Let us discuss.

36) the latest version of tls is_________

Answer Is: (B) version1.2

Explanation:

No answer description available for this question. Let us discuss.

37) under information security,any device having____is classified as a computing devices.

Answer Is: (C) both a&b

Explanation:

No answer description available for this question. Let us discuss.

38) __________is a powerful encryption tool released by philip zimmerman in the year1991.

Answer Is: (D) pgp(pretty good privacy)

Explanation:

No answer description available for this question. Let us discuss.

39) which of the following is a class of computer threat

Answer Is: (C) doS attacks

Explanation:

No answer description available for this question. Let us discuss.

40) which of them do not comes under scanning methodologies?

Answer Is: (D) google dorks

Explanation:

No answer description available for this question. Let us discuss.

41) misuse of digital signatures for fraudlent purpose comes under which section ofit act.

Answer Is: (D) section 72

Explanation:

No answer description available for this question. Let us discuss.

42) procting access to a computer through ________is called access control.

Answer Is: (C) both a&b

Explanation:

No answer description available for this question. Let us discuss.

43) the practice of protecting data from unauthorized access is called_____security.

Answer Is: (D) information

Explanation:

No answer description available for this question. Let us discuss.

44) who coined the term "cyberspace"?

Answer Is: (C) william gibson gibson

Explanation:

No answer description available for this question. Let us discuss.

45) data______is used to ensure confidentiality

Answer Is: (A) encryption

Explanation:

No answer description available for this question. Let us discuss.

46) a single point of access for several networking services is called_____

Answer Is: (A) directory services

Explanation:

No answer description available for this question. Let us discuss.

47) which of the following attach is not used by lc4 to recover windows password?

Answer Is: (C) mitm attack

Explanation:

No answer description available for this question. Let us discuss.

48) which of the following is not a secured mail transferring methodology?

Answer Is: (A) pop3

Explanation:

No answer description available for this question. Let us discuss.

49) full name of tonelo is_________

Answer Is: (C) tone locker

Explanation:

No answer description available for this question. Let us discuss.

50) in which year computer scientists try to integrate encryption technique in tcp/ip protocol?

Answer Is: (A) 1978

Explanation:

No answer description available for this question. Let us discuss.

Comments (0)

Leave your comment

Please enter comment.

Please enter name.
Please enter valid email address.
Please enter valid website URL.

Up