I&cs MCQ Set-2
I&cs MCQ Set-2
I&cs MCQ Set-2
2. ____________ is the method for keeping sensitive information in email communication & accounts
secure against unofficial access, loss, or compromise.
a) Email security
b) Email hacking
c) Email protection
d) Email safeguarding
3. _____________ is a famous technological medium for the spread of malware, facing problems of spam,
& phishing attacks.
a) Cloud
b) Pen drive
c) Website
d) Email
5. If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the
browser transfers the cookie to that website.
a) True
b) False
6. The stored cookie which contains all your personal data about that website can be stolen away by
_____________ using _____________ or trojans.
a) attackers, malware
b) hackers, antivirus
c) penetration testers, malware
d) penetration testers, virus
7. If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see
information such as username and password stored by the cookie.
a) memory
b) quarantine
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
c) cookies
d) hard drive
10. _____________ is the technique used for tricking users to disclose their username and passwords
through fake pages.
a) Social Engineering
b) Phishing
c) Cookie Stealing
d) Banner Grabbing
11. Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam
emails.
a) trojans, redirected malicious URLs
b) antivirus, patches
c) cracked software, redirected malicious URLs
d) malware, security patches
13. Fraudulent email messages are some fake email messages that seem legitimate which ask for your
bank details and reply those emails with updated confidential information.
a) True
b) False
14. Fraudulent email messages are some fake email messages that seem legitimate which asks for your
confidential bank details such as _____________ details _________ and passwords.
a) credit card, antivirus name
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
b) credit card, login ID
c) cell phone, antivirus name
d) car model, account ID
15. Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)?
a) Zeus
b) Stuxnet
c) Reaper Exploit
d) Friday the 13
16. Email users who use IE as their _________________ are vulnerable to Reaper Exploit.
a) Web engine
b) Rendering engine
c) Game engine
d) HTML engine
17. _______________ needs to be turned off in order to prevent from this attack.
a) Email scripting
b) Email attachments
c) Email services
d) Third party email programs
18. Which of the following is a tool to monitor outgoing traffic of target PC’s email and intercept all the
emails sent from it?
a) Wireshark
b) Advanced Stealth Email Redirector
c) MS Outlook
d) Cisco Jabber
20. Which of the following will not help in preserving email security?
a) Create a strong password
b) Connect your email to a phone number
c) Use two-factor authentication for password verification and login
d) Click on unknown links and sites
21. Once the email is compromised, all other sites and services online associated with this email can be
compromised.
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
a) True
b) False
22. _____________ is an encryption program or add-ons which provides cryptographic privacy &
authentication for email communication.
a) Powerful Good Privacy
b) Pretty Good Privacy
c) Pretty Good Encryption
d) Pretty Strong Encryption
26. ________________ is a free extension of browser that enables you in decrypting as well as encrypting
emails.
a) Enlocked
b) MS Outlook
c) Cisco Jabber
d) Mailvelope
29. ______________ is a tool that is integrated with top 90 search engines to grab quick search for email
addresses and other details.
a) Email Spider Toolkit
b) Email Spider Easy
c) Email Crawler Easy
d) Email Spider Toolkit
33. A _______________ is a process of breaking a password protected system or server by simply &
automatically entering every word in a dictionary as a password.
a) Dictionary attack
b) Phishing attack
c) Social engineering attack
d) MiTM attack
34. Which of the following comes under the advantage of dictionary attack?
a) Time-consuming
b) Moderate efficient
c) Very fast
d) Complex to carry-out
35. The hybrid attack is a combination of dictionary attack followed by inserting entropy & performs brute
force.
a) True
b) False
37. A _____________ attack one of the simplest processes of gaining access to any password-protected
system.
a) Clickjacking
b) Brute force
c) Eavesdropping
d) Waterhole
38. ____________ attack is a combination of Dictionary attack & brute force attack.
a) Syllable
b) Syllabi
c) Database
d) Phishing
39. Attackers can use the _______________ when he/she gets some information or hint regarding
password he/she wants to crack.
a) Syllable attack
b) Rule-based attack
c) Offline attack
d) Hybrid attack
41. _____________ are based on dictionary attack techniques where the dictionary attack is mixed with
some numerals and special symbols.
a) Syllable attack
b) Rule-based attack
c) Offline attack
d) Hybrid attack
43. System hacking involves password hacking as one of the major hacking methodologies.
a) True
b) False
46. In _______________ attacks an attacker do not contact with authorizing party for stealing password.
a) passive online
b) active online
c) offline
d) non-electronic
49. Which of the following do not comes under hurdles of passive online attack for hackers?
a) Hard to perpetrate
b) Computationally complex
c) Time taking, so patience has to be there
d) Tools not available
51. In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1
against victim’s system/account.
a) passive online
b) active online
c) offline attack
d) non-electronic
54. ________________ attacks are carried out from a location other than the real computer where the
password reside or was used.
a) passive online
b) active online
c) offline password
d) non-electronic
55. _______________ attacks always need physical access to the system that is having password file or the
hacker needs to crack the system by other means.
a) online
b) offline
c) password
d) non-electronic
57. Passwords need to be kept encrypted to protect from such offline attacks.
a) True
b) False
60. Which among the following is the least strong security encryption standard?
a) WEP
b) WPA
c) WPA2
d) WPA3
61. _________ is an old IEEE 802.11 standard from the year 1999.
a) WPA2
b) WPA3
c) WEP
d) WPA
67. When a wireless user authenticates to any AP, both of them go in the course of four-step
authentication progression which is called _____________
a) AP-handshaking
b) 4-way handshake
c) 4-way connection
d) wireless handshaking
69. It is recommended to use WPA2 or WPA3 encryption standard as they are strong and more secure.
a) True
b) False
70. ___________ is a process of wireless traffic analysis that may be helpful for forensic investigations or
during troubleshooting any wireless issue.
a) Wireless Traffic Sniffing
b) WiFi Traffic Sniffing
c) Wireless Traffic Checking
d) Wireless Transmission Sniffing
72. ___________________ began to show up few years back on wireless access points as a new way of
adding or connecting new devices.
a) WPA2
b) WPA
c) WPS
d) WEP
75. A computer ________ is a malicious code which self-replicates by copying itself to other programs.
a) program
b) virus
c) application
d) worm
79. The virus hides itself from getting detected by ______ different ways.
a) 2
b) 3
c) 4
d) 5
80. _______________ infects the master boot record and it is challenging and a complex task to remove
this virus.
a) Boot Sector Virus
b) Polymorphic
c) Multipartite
d) Trojans
81. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the
specific type of files which it infects.
a) Boot Sector Virus
b) Direct Action Virus
c) Polymorphic Virus
d) Multipartite Virus
84. ______________ are difficult to identify as they keep on changing their type and signature.
a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
87. Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?
a) Research purpose
b) Pranks
c) Identity theft
d) Protection
88. A ___________ is a small malicious program that runs hidden on infected system.
a) Virus
b) Trojan
c) Shareware
d) Adware
90. By gaining access to the Trojaned system the attacker can stage different types of attack using that
____________ program running in the background.
a) Trojan
b) Virus
c) Antivirus
d) Anti-malware
92. Which of them is not a proper way of getting into the system?
a) IM
b) Attachments
c) Official product sites
d) Un-trusted sites, freeware and pirated software
95. Some Trojans carry ransomware with them to encrypt the data and ask for ransom.
a) True
b) False
96. Once activated __________ can enable ____________to spy on the victim, steal their sensitive
information & gain backdoor access to the system.
a) virus, cyber-criminals
b) malware, penetration testers
c) trojans, cyber-criminals
d) virus, penetration testers
98. A _______________ provides malicious users remote control over the targeted computer.
a) DDoS-Trojan
b) Backdoor Trojan
c) Trojan-Banker
d) Trojan-Downloader
100. ______________ perform automated DoS (Denial of Service) attacks on a targeted web address.
a) DDoS-Trojan
b) Backdoor Trojan
c) Trojan-Banker
d) Trojan-Downloader