Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Loading...
Loading...
User Settings
close menu
Welcome to Scribd!
Upload
Read for free
FAQ and support
Language (EN)
Sign in
0 ratings
0% found this document useful (0 votes)
29 views
Cyber Security MCQ
Uploaded by
Biswajit saha
AI-enhanced
Copyright:
© All Rights Reserved
Available Formats
Download
as PDF or read online from Scribd
Download
Save
Save Cyber Security Mcq For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Cyber Security MCQ
Uploaded by
Biswajit saha
0 ratings
0% found this document useful (0 votes)
29 views
10 pages
AI-enhanced title
Document Information
click to expand document information
Original Title
Cyber Security Mcq
Copyright
© © All Rights Reserved
Available Formats
PDF or read online from Scribd
Share this document
Share or Embed Document
Sharing Options
Share on Facebook, opens a new window
Facebook
Share on Twitter, opens a new window
Twitter
Share on LinkedIn, opens a new window
LinkedIn
Share with Email, opens mail client
Email
Copy link
Copy link
Did you find this document useful?
0%
0% found this document useful, Mark this document as useful
0%
0% found this document not useful, Mark this document as not useful
Is this content inappropriate?
Report
Copyright:
© All Rights Reserved
Available Formats
Download
as PDF or read online from Scribd
Download now
Download as pdf
Save
Save Cyber Security Mcq For Later
0 ratings
0% found this document useful (0 votes)
29 views
10 pages
Cyber Security MCQ
Uploaded by
Biswajit saha
AI-enhanced title
Copyright:
© All Rights Reserved
Available Formats
Download
as PDF or read online from Scribd
Save
Save Cyber Security Mcq For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download as pdf
Jump to Page
You are on page 1
of 10
Search inside document
POPULAR PUBLICATIONS INTRODUCTION IN CYBER SECURrTy multiply like viruses but spread from computer to com 4. Programs that MO lt called as: | DEL Que. 2: a) Worms by Vinss 2) Boot q) None Answer: (a) thea 2. Which of the following is a cybercrime? ; [MODEL QuEsp, a) Hacking b) Cyber bulling c) Virus attack d) Allott Answer: (d) lee 3. DLL stands for oo [MODEL q a) Dynamic Link Library b) Digital Link Library VESTioy c) Distributed Link Library d) Domain Link Library Answer: (a) 4. Hackers who release information to the public is ; [MODEL QUEST a) a black hat b) a grey hat c) a white hat da brown Answer: (b) * 5, Which of the following is a social Engineering site? [MODEL QUESTION a) ebay b) facebook ¢) amazon d) CWB Answer: (a) 6. Validation of the source of information is known as [MODEL QUESTION a) Confidentiality b) Authentication c) Non-repudiation — d) Data integrity Answer: (b) 7. The Dos attack is one type of [MODEL QUESTION, a) Active Attack b) Passive Attack c) Brute force attack d) None of these Answer: (a) 8. Traffic analysis is one type of [MODEL QUESTION a) active attack b) passive attack c) brute force attack d) none of these Answer: (b) 9. Chain & Abel is a popular ... .... tool. [MODEL question) a) password cracking b) networking c) security d) messenger Answer: (a) CBS-2CYBER SECURITY ektivism is [MODEL QUESTIO! 0. Pretivism / b) Hacking for a cause = : passive hacking 4) Malicious hacking nse (b) r grabbing is an example of what? 7 1 1.8m ie operating system fingerprinting [MODEL QUESTION] 7 Active operating system fingerprinting Oo) Footprinting : ) Application analysis answer: (2) «1, Whatis the full form of CERTICC? [MODEL QUESTION] a) Computer Engineering Response Team Co-ordination Centre b) Computer Emergency Record Team Co-ordination Centre c) Computer Emergency Response Team Co-ordination Centre d) Computer Engineering Record Team Co-ordination Centre Answer: (C) 43, LDAP stands for a) Lightweight Directory Access protocol b) Lightweight Data Access Protocol c) Lightweight Domain Access Protocol d) Lightweight DNS Access protocol Answer: (a) [MODEL QUESTION] 14. What is enumeration? 2) Identifying active systems on the network b) Cracking passwords ¢) Identifying users and machine names 4) Identifying routers and firewalls Answer: (c) [MODEL QUESTION] Short Answer e Questions f comparison between a conventional crime and a cyber crime. ves and reasons behind cyber crimes. [MODEL QUESTION) 14) Give a brie! 4) List the moti Answer: Crime is a social and economic phenomenon and is as old as the human society. Crime 1, “82! concept and has the sanction of the law. Crime or an offence is "a legal wrong be followed by criminal proceedings which may result into punishment." ‘ime is the latest and perhaps the most complicated problem in the cyber world. “rime may be. said to be those crime, where either the computer is an object or * of the conduct constituting crime. "Any criminal activity that uses a computer i thie instrumentality, target or a means for perpetuating further crimes comes ‘C ambit of cyber crime." CBS-3CATIONS HACKE ZOeULAR PUBL! RS & CYBERCRIME ice Type Questions Multiple Choi: lectronic means to stalk or harass a, 47h of the Internet OF other elect . Mind) 1. The US individuals, oF af organization is termed: h [MODEL Quesiitt 7) Gyoerspace i) Cyber Stalking c) Pornography 4) None of tga! te Agswer: (0) ‘. [MODEL 2 —_¢ of raw data is known as t QUES: . Caer attack _ b) Data diddling c) Forgery d) Web Sack! Aaswer: (0) i ig a technique used for [MODEL Quesz; * Secs ‘on computer hardware b) attacks on computer software (Oy) c} attacks on operating system d) attacks on wireless network Answer (2) 4 Pharming is used for a) Data hiding c) Hosts of file poisoning Amswer: (0) 5. Skimming means a) Stealing ATM PIN information c) Stealing identity Answer: (2) a system otherwise Answer: (2) 7. The practice of buying ‘domain names’ that have existing [MODEL QUE: b) Data alteration STION] d) File overriding 15 digits / [MODEL QUESTION, b) Stealing telephonic information d) None of these or systems, with the intent to copy, steal, deface or damage parts of or the complete [MODEL QUESTION] b) Techno vandalism business names and [MODEL QUESTION] selling it back to the rightful owner at much higher price is 2) cyterterrorism 6) cybersquatting c) cyberwarfare d) forgery Auswer: (6) 2. Credit card fraud is a cybercrime against [MODEL QUESTION] a) individual b) property c) organization d) society Answer: (6) CBS-16RR eR gps Fe ONE 88 OF elle oroperty tg - MODEL GUESTIONy pases 0) Financial 2) Metical 2) None of these adele a rojg SIR PORE HOY OE a0 inteligent tecatation of the CT into FT ie pn oe 5) Virws ©) Brats force ate aon sgswer |) rey YP 2DhY 8 also town ze (ODE. Questing er Key I ROEraniy 5) seymmeric tey cypagrciy 1) oath (2) & (6) agswer: (2) [ Short Answer Type Guess | ‘te down the Gitferect types of Credit Card foude, © MODEL QUESTION, Saswer: ilies credit card fronds are 2s follows: DS Gimmes Te Sanden ames or Er ceoiine Counterfeit card frend “iS Saad usually involves skimmine The dame 5s ten mesic com 2 Se meoesic CBS-17CYBER SECURITY AHICAL HACKING & SOCIAL ENGINEERING Mult; ple Choice Type Questions ; thics behind training how to h tis the et! ack a system? iit think like hackers and know how to defend such ee ae a) ka system without the permission To hac : hack a network that is vulnerable 4 To corrupt software or service using malware answer (a) 1 performing a shoulder surfing in order to check other's password is oo ethical practice. [MODEL QUESTION] g) a. good 7 7 . b) not so good c) very good social engineering practice d) a bad answer: (d) —_—— has now evolved to be one of the most popular automated tools for unethical hacking. [MODEL QUESTION] a) Automated apps b) Database software c) Malware d) Worms ‘Angwer: (C) is the technique used in business organizations and firms to [MODEL QUESTION] b) Unethical hacking d) Internal data-breach 4, protect IT assets. a) Ethical hacking c) Fixing bugs Answer: (a) 5. The legal risks of ethical hacking include lawsuits due to of personal data, [MODEL QUESTION] a) stealing b) disclosure c) deleting d) hacking Answer: (b) § Before i i dure, which ke’ . performing an penetration test, through legal procedure, y bins listed below is net mandatory? [MODEL QUESTION] 7 Know the nature of the organization ) Characteristics of work done in the firm a System and network ' ) Type of broadband company used by the firm Uswer: (d) 7. Ate i tient inform pertormi he ethical hacker should never disclose clien "formation to other parties. me [MODEL QUESTION] hacking b) cracking) penetration testing d) exploiting "ewer: (d) CBS-41POPULAR PUBLICATIONS ber security that deals with m, it is the branch of cy | sality a diferent theotee and a principle regarding the view coe about what ig ig, Op ‘tht rey Social ethics = Kthles Eines Secuni, acy c) Corporate ethics ) Ethics in Black h ha Answer: (d) “iy i its and situations, better : ; helps to classify argument ; vnc rstay Sime andes to determine appropriate actions. : _ (MODEL Que! CY bey, Bc rberomice b) Social ethics STloyy ¢) Cyber-bullying d) Corporate behavior Answer: (a) 10.A penetration tester must identify and k eep in mind the requirements of a firm while evalu: — ating the Security Postures —~ : [MODEL gy a) privacy and security ESTion b) rules and regulations ¢) hackin: sechniques 4) ethics to talk to seniors Answer: (a) 11. Which of the following do not comes under Social En, a) Tailgating b) Phishing Answer: (d) gineering? [MODEL QUESTION, c) Pretexting ) Spamming 12. In a Phishing, attackers target the a technology to so social engineering. [MODEL QUESTION] a) Emails. b) WI-FI network c) Operating systems d) Surveillance camera Answer: (a) [MODEL QUESTION] Bs cana diving b) Shoulder surfing ae a d) Spear Phishing 14. Social engineering can be thwarted Te a} Phyehaa! b) Administrative Answer: (a,b,c) 4) Proactive controls i Is? ising what kinds of TENODEL QUESTION! CBS-42CYBER SECURITY jaiengineering preys on many Weakness, including [MODEL QUESTION I i 15.99 hnology b) People 4) Te° c) Human Nature i os (a,b ) d) Physical i ineering can use all the followi social engineer! following exci 65 mobile phones b) Instant Giseasne {MODEL QUESTION] ) Trojan horses d) viruses nse? (¢) i ineering is designed to tt. social eng Y —— MO! ) Manipulate ee behaviour b) Make people Monet nUESTIONI ¢) Infect a SYS d) Gain a physical advantage answer? (2) 48, What is the best option for thwarting social-engineering attacks? Aa) [MODEL QUESTION, 4) Technology b) Training ¢) Policies —_d) Physical controls : Answer: (D) [MODEL QUESTION] 49.In social engineering a proxy is used to a) Assist in scanning b) Perform a scan c) Keep an attacker's origin hidden d) Automate the discovery of vulnerabilities Answer: (C) 20, Social engineering can be used to carry out email campaigns known as : [MODEL QUESTION] a) Spamming b) Phishing c) Vishing d) Splashing Answer: (b) 21, Now a days Phishing has become a criminal practice of using social engineering over which of the following? [MODEL QUESTION] a) Social networking sites b) Mobile Phones ¢) E-mail d) Cyber cafes Answer: (b) . Short Answer Type 9 uestions « i int is purpose of ethical hacking? [MODEL QUESTION] r Ethi . fa Hacking is also called a ie or systems to find out t mejor would have exploited an damages to a business. an act of penetrating that system which the financial loss or other 5 penetration Testing. It is hreats and vulnerabilities in d caused the loss of data, CBS-43POPULAR PUBLICATIONS CYBER FORENSICS & AUDITing eee OOS Multiple Choice Type Questions rensics also known as? 4. Computer fo! b) computer orien MODEL QUegy, igital forensic science ; 7 3 Sater forensic science d) computer forensics invest ny Answer: (C) ation, 2. Which method used stochastic properties of the computer system to inv activities lacking digital artifacts? : 7 [MODEL Queetitas a) Steganography b) Stochastic forensics c) Both 4) None on Answer: (b) ete 3. Computer forensics also be used in civil proceedings. [MODEL gy a) Yes b) No c) Can be yes or no d) Can Answer: (a) iy 4. Which of the following techniques are used during computer forensic investigations? ; _ [MODEL QUESTion, a) Cross-drive analysis b) Live analysis c) Deleted files d) All of these Answer: (d) 5. CCFP stands for? [MODEL QUESTION a) Cyber Certified Forensics Professional b) Certified Cyber Forensics Professional ¢) Certified Cyber Forensics Program b) Certified Cyber Forensics Product Answer: (b) 6. How many c's in computer forensics? [MODEL QUESTION a)1 b)2 ce) 3 a4 Answer: (c) Short Answer Type Questions 1. What do you understand by cyber forensics? [MODEL question Answer: Computer forensics, also referred to as computer forensic analysis, electors ee ry, compu electronic evidence discovery, analysis, and computer examin, media (hard disks, diskettes, 1 examiner can result in the reco; digital discovery, data recovery, data discove' ation, is the process of methodically examinils apes, etc.) for evidence. A thorough analysis > * nstruction of the activities of a computer use! «! compe CBS-62CYBER SECURITY CYBER SECURITY CYBER ETHICS & LAWS 4, Many Cyber Crimes comes under Indian Penal Code Which one of the following ig example? - [MODEL QUESTION] is) Sending Threatening message by Email b) Forgery of Electronic Record c) Bogus Website d) All of above Answer: (4) 2. The Information Technology Act 2000 is an Act of Indian Parliament notified on [MODEL QUESTION} a) 27" October 2000 b) 15" December 2000 ¢) 17" November 2000 d) 17" October 2000 Answer: (d) 3. Digital Signature Certificate is requirement under various applications. [MODEL QUESTION] a) Statutory b) Legislative c) Govenmental d) Voluntary Answer: (a) 4, Assessing Computer without prior authorization is a cyber crime that comes under [MODEL QUESTION] a) Section 65 b) Section 66 c) Section 68 d) Section 70 Answer: (b) 5. means a person who has been granted a licence to issue a electronic signature Certificate. [MODEL QUESTION] a) Certifying Authority b) Certifying private key Authority ¢) Certifying system controller d) Appropriate Authority Answer: (a) 6 ___is adata that has been organized or presented in a meaningful manner. [MODEL QUESTION] a) A process b) Software c) Storage d) Information Answer: (d) a -—___is an application of information and communication technology (ICT) for elivering Government Service. [MODEL QUESTION] a) Governance b) Electronic Governance ©) Governance and ethics d) Risk and Governance Answer: (b) CBS-91“1a Kauauind aayaunos ‘suojresado suOUa “AWD paziueI0 ‘uorsers xe1 Surddeupry souoyd 1}99/SIIndwWoD ut “uoneorunun # ‘uLIO} stuOND/9 UT Polly Mou are "219 suu0y me] Cuedwiod “sumyas xeI awoou SuIpn|sUt SUL TIUNLAAON # “aug} oTUOR22f9 U IEP ajqenyes sieip daoy pue syiowueu soindwoo si2yp uodn puadap
Bumoyjo; 24) “Ob (2) Rasay vonesBaqu) (p vogeauipon (2 vonsesuy (q weysks ayowas e uo 2esn jo Gquaps ainss# 0] (® Nouszno 1300W) SL UOREQQUERAY S (g@) Rasay UOIssssdi0s (p sonwou06s3 (9 uogd.Gou3 (q SHuRpang (& WNousano T3a0n) 1 uopun ase saBuey? oyy Ssajun a)gesn jou Si y Jew OS BIEN yO SuUsyY 241 Y SNOMWONSNE BYINOd
You might also like
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
From Everand
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
Mark Manson
Rating: 4 out of 5 stars
4/5 (5896)
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
From Everand
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
Brene Brown
Rating: 4 out of 5 stars
4/5 (1103)
Principles: Life and Work
From Everand
Principles: Life and Work
Ray Dalio
Rating: 4 out of 5 stars
4/5 (617)
Never Split the Difference: Negotiating As If Your Life Depended On It
From Everand
Never Split the Difference: Negotiating As If Your Life Depended On It
Chris Voss
Rating: 4.5 out of 5 stars
4.5/5 (871)
Sing, Unburied, Sing: A Novel
From Everand
Sing, Unburied, Sing: A Novel
Jesmyn Ward
Rating: 4 out of 5 stars
4/5 (1216)
The Glass Castle: A Memoir
From Everand
The Glass Castle: A Memoir
Jeannette Walls
Rating: 4.5 out of 5 stars
4.5/5 (1732)
Grit: The Power of Passion and Perseverance
From Everand
Grit: The Power of Passion and Perseverance
Angela Duckworth
Rating: 4 out of 5 stars
4/5 (597)
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
From Everand
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
Margot Lee Shetterly
Rating: 4 out of 5 stars
4/5 (912)
The Perks of Being a Wallflower
From Everand
The Perks of Being a Wallflower
Stephen Chbosky
Rating: 4.5 out of 5 stars
4.5/5 (2109)
Shoe Dog: A Memoir by the Creator of Nike
From Everand
Shoe Dog: A Memoir by the Creator of Nike
Phil Knight
Rating: 4.5 out of 5 stars
4.5/5 (543)
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
From Everand
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
Ben Horowitz
Rating: 4.5 out of 5 stars
4.5/5 (352)
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
From Everand
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
Ashlee Vance
Rating: 4.5 out of 5 stars
4.5/5 (475)
Her Body and Other Parties: Stories
From Everand
Her Body and Other Parties: Stories
Carmen Maria Machado
Rating: 4 out of 5 stars
4/5 (830)
Bad Feminist: Essays
From Everand
Bad Feminist: Essays
Roxane Gay
Rating: 4 out of 5 stars
4/5 (1044)
The Outsider: A Novel
From Everand
The Outsider: A Novel
Stephen King
Rating: 4 out of 5 stars
4/5 (1920)
The Little Book of Hygge: Danish Secrets to Happy Living
From Everand
The Little Book of Hygge: Danish Secrets to Happy Living
Meik Wiking
Rating: 3.5 out of 5 stars
3.5/5 (418)
The Emperor of All Maladies: A Biography of Cancer
From Everand
The Emperor of All Maladies: A Biography of Cancer
Siddhartha Mukherjee
Rating: 4.5 out of 5 stars
4.5/5 (273)
Steve Jobs
From Everand
Steve Jobs
Walter Isaacson
Rating: 4.5 out of 5 stars
4.5/5 (811)
Angela's Ashes: A Memoir
From Everand
Angela's Ashes: A Memoir
Frank McCourt
Rating: 4.5 out of 5 stars
4.5/5 (443)
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
From Everand
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
Viet Thanh Nguyen
Rating: 4.5 out of 5 stars
4.5/5 (122)
A Man Called Ove: A Novel
From Everand
A Man Called Ove: A Novel
Fredrik Backman
Rating: 4.5 out of 5 stars
4.5/5 (4849)
Brooklyn: A Novel
From Everand
Brooklyn: A Novel
Colm Toibin
Rating: 3.5 out of 5 stars
3.5/5 (1955)
The Yellow House: A Memoir (2019 National Book Award Winner)
From Everand
The Yellow House: A Memoir (2019 National Book Award Winner)
Sarah M. Broom
Rating: 4 out of 5 stars
4/5 (99)
The World Is Flat 3.0: A Brief History of the Twenty-first Century
From Everand
The World Is Flat 3.0: A Brief History of the Twenty-first Century
Thomas L. Friedman
Rating: 3.5 out of 5 stars
3.5/5 (2270)
Yes Please
From Everand
Yes Please
Amy Poehler
Rating: 4 out of 5 stars
4/5 (1921)
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
From Everand
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
Gilbert King
Rating: 4.5 out of 5 stars
4.5/5 (269)
The Art of Racing in the Rain: A Novel
From Everand
The Art of Racing in the Rain: A Novel
Garth Stein
Rating: 4 out of 5 stars
4/5 (4227)
A Tree Grows in Brooklyn
From Everand
A Tree Grows in Brooklyn
Betty Smith
Rating: 4.5 out of 5 stars
4.5/5 (1933)
The Woman in Cabin 10
From Everand
The Woman in Cabin 10
Ruth Ware
Rating: 3.5 out of 5 stars
3.5/5 (2564)
Team of Rivals: The Political Genius of Abraham Lincoln
From Everand
Team of Rivals: The Political Genius of Abraham Lincoln
Doris Kearns Goodwin
Rating: 4.5 out of 5 stars
4.5/5 (235)
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
From Everand
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
Dave Eggers
Rating: 3.5 out of 5 stars
3.5/5 (232)
Wolf Hall: A Novel
From Everand
Wolf Hall: A Novel
Hilary Mantel
Rating: 4 out of 5 stars
4/5 (4002)
Fear: Trump in the White House
From Everand
Fear: Trump in the White House
Bob Woodward
Rating: 3.5 out of 5 stars
3.5/5 (802)
John Adams
From Everand
John Adams
David McCullough
Rating: 4.5 out of 5 stars
4.5/5 (2410)
On Fire: The (Burning) Case for a Green New Deal
From Everand
On Fire: The (Burning) Case for a Green New Deal
Naomi Klein
Rating: 4 out of 5 stars
4/5 (74)
Rise of ISIS: A Threat We Can't Ignore
From Everand
Rise of ISIS: A Threat We Can't Ignore
Jay Sekulow
Rating: 3.5 out of 5 stars
3.5/5 (137)
The Light Between Oceans: A Novel
From Everand
The Light Between Oceans: A Novel
M.L. Stedman
Rating: 4.5 out of 5 stars
4.5/5 (789)
Manhattan Beach: A Novel
From Everand
Manhattan Beach: A Novel
Jennifer Egan
Rating: 3.5 out of 5 stars
3.5/5 (881)
The Constant Gardener: A Novel
From Everand
The Constant Gardener: A Novel
John le Carré
Rating: 3.5 out of 5 stars
3.5/5 (107)
The Unwinding: An Inner History of the New America
From Everand
The Unwinding: An Inner History of the New America
George Packer
Rating: 4 out of 5 stars
4/5 (45)
Reading 01 - Speed Reading LL Concepts and Application - Class Notes - MBA Foundation 2023
Document
43 pages
Reading 01 - Speed Reading LL Concepts and Application - Class Notes - MBA Foundation 2023
Biswajit saha
No ratings yet
HR Organizer 2023
Document
112 pages
HR Organizer 2023
Biswajit saha
No ratings yet
Multimedia Technology MCQ
Document
8 pages
Multimedia Technology MCQ
Biswajit saha
No ratings yet
Multimedia 2022
Document
2 pages
Multimedia 2022
Biswajit saha
No ratings yet
Little Women
From Everand
Little Women
Louisa May Alcott
Rating: 4 out of 5 stars
4/5 (105)