Cyber Security

1) in general how many key elements constitute the entire security structure?

Answer Is: (D) 4

Explanation:
No answer description available for this question. Let us discuss.

2) which method of hacking will recod all your keystokes?

Answer Is: (C) keylogging

Explanation:
No answer description available for this question. Let us discuss.

3) cyber-crime can be categorized into ________types.

Answer Is: (C) 2

Explanation:
No answer description available for this question. Let us discuss.

4) the full name of malware is_____

Answer Is: (C) malicious software

Explanation:
No answer description available for this question. Let us discuss.

5) viruses are__________.

Answer Is: (A) man made

Explanation:
No answer description available for this question. Let us discuss.

6) victims of cyber attack might loose_____

Answer Is: (C) both a&b

Explanation:
No answer description available for this question. Let us discuss.

7) __________is a tool which can detect registry issues in an operating system.

Answer Is: (D) languard network security scanner

Explanation:
No answer description available for this question. Let us discuss.

8) stealing of digital files comes under which section of the indian it act.

Answer Is: (C) section66-c

Explanation:
No answer description available for this question. Let us discuss.

9) script___les sent mostly through email attchment to attack host computer are called_____

Answer Is: (D) worms

Explanation:
No answer description available for this question. Let us discuss.

10) all of the following are examples of real security and privacy threats except:

Answer Is: (C) spam

Explanation:
No answer description available for this question. Let us discuss.

11) tailgating is also termed as___________

Answer Is: (A) piggy backing

Explanation:
No answer description available for this question. Let us discuss.

12) which of the following is not a type of peer-to-peer cyber-crime?

Answer Is: (D) credit card details leak in deep web

Explanation:
No answer description available for this question. Let us discuss.

13) ______is the oldest phone hacking techniques used by hackers to make free calls

Answer Is: (C) phreaking

Explanation:
No answer description available for this question. Let us discuss.

14) full name of xss is_____

Answer Is: (C) cross dite scripting

Explanation:
No answer description available for this question. Let us discuss.

15) ________ensures the integrity and security of data that are passing over a network.

Answer Is: (D) network-security protocols

Explanation:
No answer description available for this question. Let us discuss.

16) from where the term'hacker' first came to existence?

Answer Is: (A) mit

Explanation:
No answer description available for this question. Let us discuss.

17) which is a debugger an exploation tool?

Answer Is: (B) netcat

Explanation:
No answer description available for this question. Let us discuss.

18) wireshark is a tool of_______

Answer Is: (C) network protocol analysis

Explanation:
No answer description available for this question. Let us discuss.

19) protecting data from online attacks,deletions,malware,etc.is called___secrity

Answer Is: (B) cyber

Explanation:
No answer description available for this question. Let us discuss.

20) ________are the combination of both white as well as black hat hackers.

Answer Is: (A) grey hat hackers

Explanation:
No answer description available for this question. Let us discuss.

21) protectingthe data divulged by customers from unauthorized access is called_____

Answer Is: (A) privacy protection(B)

Explanation:
No answer description available for this question. Let us discuss.

22) in which year the first popular hacker conference took place?

Answer Is: (B) 1995

Explanation:
No answer description available for this question. Let us discuss.

23) which of the following is not an external threat to a computer or a computer network

Answer Is: (A) ignoranc

Explanation:
No answer description available for this question. Let us discuss.

24) name the who breaks the arpanet systems?

Answer Is: (B) kevin poulsen

Explanation:
No answer description available for this question. Let us discuss.

25) it act was enacted in the year______

Answer Is: (C) 2000

Explanation:
No answer description available for this question. Let us discuss.

26) which of the following is an anti-virus program

Answer Is: (D) all of these

Explanation:
No answer description available for this question. Let us discuss.

27) when interagrity is lacking in a security system,______occurs.

Answer Is: (C) data tampering

Explanation:
No answer description available for this question. Let us discuss.

28) full name ofnmap is_____

Answer Is: (A) network mapper

Explanation:
No answer description available for this question. Let us discuss.

29) which is a popular command-line packet analyzer?

Answer Is: (D) tepdump

Explanation:
No answer description available for this question. Let us discuss.

30) unsolicited commercial email is know as______

Answer Is: (A) spam

Explanation:
No answer description available for this question. Let us discuss.

31) _____meansthe proction of data from modification by unknow users.

Answer Is: (B) integrity

Explanation:
No answer description available for this question. Let us discuss.

32) under which section of itact,stealing any digital asset or infrmation is written a cyber-crime

Answer Is: (A) 65

Explanation:
No answer description available for this question. Let us discuss.

33) it act was anacted in the year______

Answer Is: (C) 2000

Explanation:
No answer description available for this question. Let us discuss.

34) which of the following is not an example of social engineering?

Answer Is: (C) carding

Explanation:
No answer description available for this question. Let us discuss.

35) sdlc in software development stands for:

Answer Is: (B) software development life cycle

Explanation:
No answer description available for this question. Let us discuss.

36) the latest version of tls is_________

Answer Is: (B) version1.2

Explanation:
No answer description available for this question. Let us discuss.

37) under information security,any device having____is classified as a computing devices.

Answer Is: (C) both a&b

Explanation:
No answer description available for this question. Let us discuss.

38) __________is a powerful encryption tool released by philip zimmerman in the year1991.

Answer Is: (D) pgp(pretty good privacy)

Explanation:
No answer description available for this question. Let us discuss.

39) which of the following is a class of computer threat

Answer Is: (C) doS attacks

Explanation:
No answer description available for this question. Let us discuss.

40) which of them do not comes under scanning methodologies?

Answer Is: (D) google dorks

Explanation:
No answer description available for this question. Let us discuss.

41) misuse of digital signatures for fraudlent purpose comes under which section ofit act.

Answer Is: (D) section 72

Explanation:
No answer description available for this question. Let us discuss.

42) procting access to a computer through ________is called access control.

Answer Is: (C) both a&b

Explanation:
No answer description available for this question. Let us discuss.

43) the practice of protecting data from unauthorized access is called_____security.

Answer Is: (D) information

Explanation:
No answer description available for this question. Let us discuss.

44) who coined the term "cyberspace"?

Answer Is: (C) william gibson gibson

Explanation:
No answer description available for this question. Let us discuss.

45) data______is used to ensure confidentiality

Answer Is: (A) encryption

Explanation:
No answer description available for this question. Let us discuss.

46) a single point of access for several networking services is called_____

Answer Is: (A) directory services

Explanation:
No answer description available for this question. Let us discuss.

47) which of the following attach is not used by lc4 to recover windows password?

Answer Is: (C) mitm attack

Explanation:
No answer description available for this question. Let us discuss.

48) which of the following is not a secured mail transferring methodology?

Answer Is: (A) pop3

Explanation:
No answer description available for this question. Let us discuss.

49) full name of tonelo is_________

Answer Is: (C) tone locker

Explanation:
No answer description available for this question. Let us discuss.

50) in which year computer scientists try to integrate encryption technique in tcp/ip protocol?

Answer Is: (A) 1978

Explanation:
No answer description available for this question. Let us discuss.

Comments (1)

D
Divanjulu dasupalli 17, Apr 2023

Its very good, thanks

Leave your comment

Please enter comment.

Please enter name.
Please enter valid email address.
Please enter valid website URL.

Up