Question no.
  • QUESTION 1 Topic: Cyber Crime Questions
    Code red is a(n) ----------
  • QUESTION 2 Topic: Cyber Security Basics
    Information Gathering about the system or the person or about organization or network is not important.
  • QUESTION 3 Topic: Cyber Security Basics
    Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic?
  • QUESTION 4 Topic: Cyber Security Basics
    Which Of The Following Is An Independent Malicious Program That Need Not Any Host Program?
  • QUESTION 5 Topic: Cyber Security Basics
    A malicious program spreading throughInternet and storage media and attacking the data in victims computer is called_______.
  • QUESTION 6 Topic: Cyber Security Basics
    Which one of the following usually used in the process of Wi-Fi-hacking?
  • QUESTION 7 Topic: Cyber Security Basics
    An IPS must have a file storage.
  • QUESTION 8 Topic: Cyber Security Basics
    Performing Hacking Activities With The Intent On Gaining Visibility For An Unfair Situation Is Called
  • QUESTION 9 Topic: Cyber Security Basics
    Backdoors are also known as ______________
  • QUESTION 10 Topic: Cyber Security Basics
    Which of the following is not a risk in internet based transaction
  • QUESTION 11 Topic: Cyber Security Basics
    Which of the following refers to the violation of the principle if a computer is no more accessible?
  • QUESTION 12 Topic: Cyber Offenses Test
    What category of software is designed to cause detriment to your computer?
  • QUESTION 13 Topic: Cyber Offenses Test
    Which of the following is known as Malicious software?
  • QUESTION 14 Topic: Cyber Security Basics
    Which of the following is not an appropriate method of defacing web server?
  • QUESTION 15 Topic: Cyber Offenses Test
    What does SSO refers to
  • QUESTION 16 Topic: Cyber Security Basics
    There are _______ major ways of stealing email information.
  • QUESTION 17 Topic: Cyber Security Basics
    ____________ works in background and steals sensitive data.
  • QUESTION 18 Topic: Cyber Security Basics
    ___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.
  • QUESTION 19 Topic: Cyber Security Basics
    An ethical hacker must need to have the skills of understanding the problem, networking knowledge and to know how the technology works.
  • QUESTION 20 Topic: Cyber Security Basics
    As a backup for securing your device, it is necessary to create a _____________
  • QUESTION 21 Topic: Cyber Offenses Test
    Which is the major motive for cybercrimes till date
  • QUESTION 22 Topic: Cyber Security Basics
    __ Is a specialized form of online identity theft.
  • QUESTION 23 Topic: Cyber Security Basics
    Which of the below benefits of cyber security is not true?
  • QUESTION 24 Topic: Cyber Security Basics
    Which of the companies and organizations do not become the major targets of attackers for data stealing?
  • QUESTION 25 Topic: Cyber Security Basics
    Passwords enable users to
  • QUESTION 26 Topic: Cyber Security Basics
    What is the full form of LDAP?
  • QUESTION 27 Topic: Cyber Security Basics
    Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs.
  • QUESTION 28 Topic: Cyber Security Basics
    The term “protection from ______of source code” refers to limiting access to the source code to just authorised individuals.
  • QUESTION 29 Topic: Cyber Security Basics
    All of the following are examples of real security and privacy risks EXCEPT:
  • QUESTION 30 Topic: Cyber Security Basics
    Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user’s system?
  • QUESTION 31 Topic: Cyber Offenses Test
    What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?
  • QUESTION 32 Topic: Cyber Security Basics
    When A Person Is Harrassed Repeatedly By Being Followed, Called Or Be Written To He/she Is A Target Of
  • QUESTION 33 Topic: Cyber Security Basics
    Recall the type of malwares which are basically attached to executable code or exe files.
  • QUESTION 34 Topic: Cyber Offenses Test
    ????????.. is a form of virus explicitly designed to hide itself from detection by antivirus software.
  • QUESTION 35 Topic: Cyber Security Basics
    Potential weaknesses in IT infrastructure through which a cyber attack might occur is called __.
  • QUESTION 36 Topic: Cyber Offenses Test
    What is the standard IANA port number used for requesting web pages
  • QUESTION 37 Topic: Cyber Security Basics
    When ____ and ____ are in charge of data, the integrity of the data is imperilled?
  • QUESTION 38 Topic: Cyber Security Basics
    Which of the following denotes the deliberate exploitation of computer systems and its resources connected through Internet?
  • QUESTION 39 Topic: Cyber Offenses Test
    The first computer virus is --------
  • QUESTION 40 Topic: Cyber Offenses Test
    What program would you use to gain administrative rights to someone's computer?
  • QUESTION 41 Topic: Cyber Security Basics
    In The SSL Record Protocol Operation Pad_2 Is -
  • QUESTION 42 Topic: Cyber Security Basics
    Which one of the following can be considered as the class of computer threats?
  • QUESTION 43 Topic: Cyber Security Basics
    Which of the below is a popular victim of cyber attackers looking to gain the IP address of a target or victim user?
  • QUESTION 44 Topic: Cyber Offenses Test
    Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase
  • QUESTION 45 Topic: Cyber Security Basics
    Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.
  • QUESTION 46 Topic: Computer Forensics Test
    What does CoC concept refers to, in computer forensics
  • QUESTION 47 Topic: Cyber Security Basics
    This is the concept for guiding information security policy within a corporation, firm, or organisation. What exactly is “this” in this context?
  • QUESTION 48 Topic: Cyber Offenses Test
    What is short for malicious software (is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?
  • QUESTION 49 Topic: Cybercrime Tools Questions
    Which attack type is prevented by array bound checking
  • QUESTION 50 Topic: Cyber Security Basics
    What Is The Most Important Activity In System Hacking?