Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

I&cs MCQ Set-2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

MCQ SET - 2

1. Which of them is not a major way of stealing email information?


a) Stealing cookies
b) Reverse Engineering
c) Password Phishing
d) Social Engineering

2. ____________ is the method for keeping sensitive information in email communication & accounts
secure against unofficial access, loss, or compromise.
a) Email security
b) Email hacking
c) Email protection
d) Email safeguarding

3. _____________ is a famous technological medium for the spread of malware, facing problems of spam,
& phishing attacks.
a) Cloud
b) Pen drive
c) Website
d) Email

4. Which of them is not a proper method for email security?


a) Use Strong password
b) Use email Encryption
c) Spam filters and malware scanners
d) Click on unknown links to explore

5. If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the
browser transfers the cookie to that website.
a) True
b) False

6. The stored cookie which contains all your personal data about that website can be stolen away by
_____________ using _____________ or trojans.
a) attackers, malware
b) hackers, antivirus
c) penetration testers, malware
d) penetration testers, virus

7. If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see
information such as username and password stored by the cookie.
a) memory
b) quarantine
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
c) cookies
d) hard drive

8. Which of the following is a non-technical type of intrusion or attack technique?


a) Reverse Engineering
b) Malware Analysis
c) Social Engineering
d) Malware Writing

9. Which of them is an example of grabbing email information?


a) Cookie stealing
b) Reverse engineering
c) Port scanning
d) Banner grabbing

10. _____________ is the technique used for tricking users to disclose their username and passwords
through fake pages.
a) Social Engineering
b) Phishing
c) Cookie Stealing
d) Banner Grabbing

11. Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam
emails.
a) trojans, redirected malicious URLs
b) antivirus, patches
c) cracked software, redirected malicious URLs
d) malware, security patches

12. Unsolicited Bulk E-mails (UBI) are called __________


a) SMS
b) MMS
c) Spam emails
d) Malicious emails

13. Fraudulent email messages are some fake email messages that seem legitimate which ask for your
bank details and reply those emails with updated confidential information.
a) True
b) False

14. Fraudulent email messages are some fake email messages that seem legitimate which asks for your
confidential bank details such as _____________ details _________ and passwords.
a) credit card, antivirus name
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
b) credit card, login ID
c) cell phone, antivirus name
d) car model, account ID

15. Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)?
a) Zeus
b) Stuxnet
c) Reaper Exploit
d) Friday the 13

16. Email users who use IE as their _________________ are vulnerable to Reaper Exploit.
a) Web engine
b) Rendering engine
c) Game engine
d) HTML engine

17. _______________ needs to be turned off in order to prevent from this attack.
a) Email scripting
b) Email attachments
c) Email services
d) Third party email programs

18. Which of the following is a tool to monitor outgoing traffic of target PC’s email and intercept all the
emails sent from it?
a) Wireshark
b) Advanced Stealth Email Redirector
c) MS Outlook
d) Cisco Jabber

19. Advanced SER is abbreviated as ___________


a) Advanced Stealth Electronic Redirector
b) Advanced Security Email Redirector
c) Advanced Stealth Email Redirector
d) Advanced Stealth Email Recorder

20. Which of the following will not help in preserving email security?
a) Create a strong password
b) Connect your email to a phone number
c) Use two-factor authentication for password verification and login
d) Click on unknown links and sites

21. Once the email is compromised, all other sites and services online associated with this email can be
compromised.
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
a) True
b) False

22. _____________ is an encryption program or add-ons which provides cryptographic privacy &
authentication for email communication.
a) Powerful Good Privacy
b) Pretty Good Privacy
c) Pretty Good Encryption
d) Pretty Strong Encryption

23. PGP is abbreviated as _______________


a) Pretty Good Privacy
b) Powerful Good Privacy
c) Protocol Giving Privacy
d) Pretty Good Protocol

24. Which of them is not an example of business email security tool?


a) Microsoft Office Trust Center
b) Sendinc
c) Hushmail Business
d) Cisco Jabber

25. Which of them is not an example of business email security tool?


a) Enlocked
b) RPost Office
c) MS Outlook
d) Sendinc

26. ________________ is a free extension of browser that enables you in decrypting as well as encrypting
emails.
a) Enlocked
b) MS Outlook
c) Cisco Jabber
d) Mailvelope

27. Which of the following is not an email related hacking tool?


a) Email Finder Pro
b) Sendinc
c) Mail PassView
d) Mail Password

28. _______________ is targeted bulk email marketing software.


a) Email Spider Toolkit
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
b) Email Spider Easy
c) Email Crawler Easy
d) Email Spider Toolkit

29. ______________ is a tool that is integrated with top 90 search engines to grab quick search for email
addresses and other details.
a) Email Spider Toolkit
b) Email Spider Easy
c) Email Crawler Easy
d) Email Spider Toolkit

30. MegaHackerZ helps crackers to crack email passwords.


a) True
b) False

31. Saving passwords in the browser is a good habit.


a) True
b) False

32. Which of the following is not an advantage of dictionary attack?


a) Very fast
b) Time-saving
c) Easy to perform
d) Very tough and inefficient

33. A _______________ is a process of breaking a password protected system or server by simply &
automatically entering every word in a dictionary as a password.
a) Dictionary attack
b) Phishing attack
c) Social engineering attack
d) MiTM attack

34. Which of the following comes under the advantage of dictionary attack?
a) Time-consuming
b) Moderate efficient
c) Very fast
d) Complex to carry-out

35. The hybrid attack is a combination of dictionary attack followed by inserting entropy & performs brute
force.
a) True
b) False

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
36. Brute force attack is ______________
a) fast
b) inefficient
c) slow
d) complex to understand

37. A _____________ attack one of the simplest processes of gaining access to any password-protected
system.
a) Clickjacking
b) Brute force
c) Eavesdropping
d) Waterhole

38. ____________ attack is a combination of Dictionary attack & brute force attack.
a) Syllable
b) Syllabi
c) Database
d) Phishing

39. Attackers can use the _______________ when he/she gets some information or hint regarding
password he/she wants to crack.
a) Syllable attack
b) Rule-based attack
c) Offline attack
d) Hybrid attack

40. _______________ are based on dictionary attack techniques.


a) Hybrid attacks
b) Network attacks
c) TCP attacks
d) Database attacks

41. _____________ are based on dictionary attack techniques where the dictionary attack is mixed with
some numerals and special symbols.
a) Syllable attack
b) Rule-based attack
c) Offline attack
d) Hybrid attack

42. Which of the following is not an example of non-technical attack techniques?


a) Shoulder surfing
b) Keyboard sniffing
c) Phishing
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) Social engineering

43. System hacking involves password hacking as one of the major hacking methodologies.
a) True
b) False

44. Password cracking in system hacking is of ________ types.


a) 2
b) 3
c) 4
d) 5

45. There are ________ major types of passwords.


a) 4
b) 5
c) 6
d) 7

46. In _______________ attacks an attacker do not contact with authorizing party for stealing password.
a) passive online
b) active online
c) offline
d) non-electronic

47. Which of the following is an example of passive online attack?


a) Phishing
b) Social Engineering
c) Spamming
d) Wire sniffing

48. Which of the following is not an example of a passive online attack?


a) MiTM
b) Reply Attack
c) Phishing
d) Wire sniffing

49. Which of the following do not comes under hurdles of passive online attack for hackers?
a) Hard to perpetrate
b) Computationally complex
c) Time taking, so patience has to be there
d) Tools not available

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
50. Which of the following case comes under victims’ list of an active online attack?
a) Strong password based accounts
b) Unsecured HTTP users
c) Open authentication points
d) Logged in systems and services

51. In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1
against victim’s system/account.
a) passive online
b) active online
c) offline attack
d) non-electronic

52. Which of them is not a disadvantage of active online attack?


a) Takes a long time
b) Easily and automatically detected
c) Need high network bandwidth
d) Need the patience to crack

53. _________________ can be alternatively termed as password guessing attack.


a) passive online
b) active online
c) offline attack
d) non-electronic

54. ________________ attacks are carried out from a location other than the real computer where the
password reside or was used.
a) passive online
b) active online
c) offline password
d) non-electronic

55. _______________ attacks always need physical access to the system that is having password file or the
hacker needs to crack the system by other means.
a) online
b) offline
c) password
d) non-electronic

56. Which of the following is not an example of offline password attack?


a) Dictionary attack
b) Rainbow attacks
c) Brute force attack
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) Spamming attack

57. Passwords need to be kept encrypted to protect from such offline attacks.
a) True
b) False

58. ____________________ is the anticipation of unauthorized access or break to computers or data by


means of wireless networks.
a) Wireless access
b) Wireless security
c) Wired Security
d) Wired device apps

59. Which among them has the strongest wireless security?


a) WEP
b) WPA
c) WPA2
d) WPA3

60. Which among the following is the least strong security encryption standard?
a) WEP
b) WPA
c) WPA2
d) WPA3

61. _________ is an old IEEE 802.11 standard from the year 1999.
a) WPA2
b) WPA3
c) WEP
d) WPA

62. _______________ is the central node of 802.11 wireless operations.


a) WPA
b) Access Point
c) WAP
d) Access Port

63. AP is abbreviated as _____________


a) Access Point
b) Access Port
c) Access Position
d) Accessing Port

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
64. ___________________ is alike as that of Access Point (AP) from 802.11, & the mobile operators uses it
for offering signal coverage.
a) Base Signal Station
b) Base Transmitter Station
c) Base Transceiver Station
d) Transceiver Station

65. BTS stands for ___________________


a) Basement Transceiver Server
b) Base Transmitter Station
c) Base Transceiver Server
d) Base Transceiver Station

66. There are __________ types of wireless authentication modes.


a) 2
b) 3
c) 4
d) 5

67. When a wireless user authenticates to any AP, both of them go in the course of four-step
authentication progression which is called _____________
a) AP-handshaking
b) 4-way handshake
c) 4-way connection
d) wireless handshaking

68. WPS stands for __________________


a) WiFi Protected System
b) WiFi Protected Setup
c) WiFi Protocol Setup
d) Wireless Protected Setup

69. It is recommended to use WPA2 or WPA3 encryption standard as they are strong and more secure.
a) True
b) False

70. ___________ is a process of wireless traffic analysis that may be helpful for forensic investigations or
during troubleshooting any wireless issue.
a) Wireless Traffic Sniffing
b) WiFi Traffic Sniffing
c) Wireless Traffic Checking
d) Wireless Transmission Sniffing

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
71. Which of the following is a Wireless traffic Sniffing tool?
a) Maltego
b) BurpSuit
c) Nessus
d) Wireshark

72. ___________________ began to show up few years back on wireless access points as a new way of
adding or connecting new devices.
a) WPA2
b) WPA
c) WPS
d) WEP

73. There are _________ types of computer virus.


a) 5
b) 7
c) 10
d) 12

74. Which of the following is not a type of virus?


a) Boot sector
b) Polymorphic
c) Multipartite
d) Trojans

75. A computer ________ is a malicious code which self-replicates by copying itself to other programs.
a) program
b) virus
c) application
d) worm

76. Which of them is not an ideal way of spreading the virus?


a) Infected website
b) Emails
c) Official Antivirus CDs
d) USBs

77. In which year Apple II virus came into existence?


a) 1979
b) 1980
c) 1981
d) 1982

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
78. In mid-1981, the 1st virus for Apple computers with the name _________ came into existence.
a) Apple I
b) Apple II
c) Apple III
d) Apple Virus

79. The virus hides itself from getting detected by ______ different ways.
a) 2
b) 3
c) 4
d) 5

80. _______________ infects the master boot record and it is challenging and a complex task to remove
this virus.
a) Boot Sector Virus
b) Polymorphic
c) Multipartite
d) Trojans

81. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the
specific type of files which it infects.
a) Boot Sector Virus
b) Direct Action Virus
c) Polymorphic Virus
d) Multipartite Virus

82. Direct Action Virus is also known as ___________


a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
d) Multipartite Virus

83. ______________ infects the executables as well as the boot sectors.


a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
d) Multipartite Virus

84. ______________ are difficult to identify as they keep on changing their type and signature.
a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
d) Multipartite Virus

85. ____________ deletes all the files that it infects.


a) Non-resident virus
b) Overwrite Virus
c) Polymorphic Virus
d) Multipartite Virus

86. _____________ is also known as cavity virus.


a) Non-resident virus
b) Overwrite Virus
c) Polymorphic Virus
d) Space-filler Virus

87. Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?
a) Research purpose
b) Pranks
c) Identity theft
d) Protection

88. A ___________ is a small malicious program that runs hidden on infected system.
a) Virus
b) Trojan
c) Shareware
d) Adware

89. ____________ works in background and steals sensitive data.


a) Virus
b) Shareware
c) Trojan
d) Adware

90. By gaining access to the Trojaned system the attacker can stage different types of attack using that
____________ program running in the background.
a) Trojan
b) Virus
c) Antivirus
d) Anti-malware

91. Trojan creators do not look for _______________


a) Credit card information
b) Confidential data
c) Important documents
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) Securing systems with such programs

92. Which of them is not a proper way of getting into the system?
a) IM
b) Attachments
c) Official product sites
d) Un-trusted sites, freeware and pirated software

93. Which of the following port is not used by Trojans?


a) UDP
b) TCP
c) SMTP
d) MP

94. Trojans do not do one of the following. What is that?


a) Deleting Data
b) Protecting Data
c) Modifying Data
d) Copying Data

95. Some Trojans carry ransomware with them to encrypt the data and ask for ransom.
a) True
b) False

96. Once activated __________ can enable ____________to spy on the victim, steal their sensitive
information & gain backdoor access to the system.
a) virus, cyber-criminals
b) malware, penetration testers
c) trojans, cyber-criminals
d) virus, penetration testers

97. Trojans can not ______________


a) steal data
b) self-replicate
c) steal financial information
d) steal login credentials

98. A _______________ provides malicious users remote control over the targeted computer.
a) DDoS-Trojan
b) Backdoor Trojan
c) Trojan-Banker
d) Trojan-Downloader

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
99. _______________ programs are specially designed for stealing your account data for online banking
systems, e-payment services & credit/debit cards.
a) DDoS-Trojan
b) Backdoor Trojan
c) Trojan-Banker
d) Trojan-Downloader

100. ______________ perform automated DoS (Denial of Service) attacks on a targeted web address.
a) DDoS-Trojan
b) Backdoor Trojan
c) Trojan-Banker
d) Trojan-Downloader

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577

You might also like