-
QUESTION 1 Topic: Cyber Crime Questions
Code red is a(n) ----------
-
QUESTION 2 Topic: Cyber Security Basics
Information Gathering about the system or the person or about organization or network is not important.
-
QUESTION 3 Topic: Cyber Security Basics
Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic?
-
QUESTION 4 Topic: Cyber Security Basics
Which Of The Following Is An Independent Malicious Program That Need Not Any Host Program?
-
QUESTION 5 Topic: Cyber Security Basics
A malicious program spreading throughInternet and storage media and attacking the data in victims computer is called_______.
-
QUESTION 6 Topic: Cyber Security Basics
Which one of the following usually used in the process of Wi-Fi-hacking?
-
QUESTION 7 Topic: Cyber Security Basics
An IPS must have a file storage.
-
QUESTION 8 Topic: Cyber Security Basics
Performing Hacking Activities With The Intent On Gaining Visibility For An Unfair Situation Is Called
-
QUESTION 9 Topic: Cyber Security Basics
Backdoors are also known as ______________
-
QUESTION 10 Topic: Cyber Security Basics
Which of the following is not a risk in internet based transaction
-
QUESTION 11 Topic: Cyber Security Basics
Which of the following refers to the violation of the principle if a computer is no more accessible?
-
QUESTION 12 Topic: Cyber Offenses Test
What category of software is designed to cause detriment to your computer?
-
QUESTION 13 Topic: Cyber Offenses Test
Which of the following is known as Malicious software?
-
QUESTION 14 Topic: Cyber Security Basics
Which of the following is not an appropriate method of defacing web server?
-
QUESTION 15 Topic: Cyber Offenses Test
What does SSO refers to
-
QUESTION 16 Topic: Cyber Security Basics
There are _______ major ways of stealing email information.
-
QUESTION 17 Topic: Cyber Security Basics
____________ works in background and steals sensitive data.
-
QUESTION 18 Topic: Cyber Security Basics
___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.
-
QUESTION 19 Topic: Cyber Security Basics
An ethical hacker must need to have the skills of understanding the problem, networking knowledge and to know how the technology works.
-
QUESTION 20 Topic: Cyber Security Basics
As a backup for securing your device, it is necessary to create a _____________
-
QUESTION 21 Topic: Cyber Offenses Test
Which is the major motive for cybercrimes till date
-
QUESTION 22 Topic: Cyber Security Basics
__ Is a specialized form of online identity theft.
-
QUESTION 23 Topic: Cyber Security Basics
Which of the below benefits of cyber security is not true?
-
QUESTION 24 Topic: Cyber Security Basics
Which of the companies and organizations do not become the major targets of attackers for data stealing?
-
QUESTION 25 Topic: Cyber Security Basics
Passwords enable users to
-
QUESTION 26 Topic: Cyber Security Basics
What is the full form of LDAP?
-
QUESTION 27 Topic: Cyber Security Basics
Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs.
-
QUESTION 28 Topic: Cyber Security Basics
The term “protection from ______of source code” refers to limiting access to the source code to just authorised individuals.
-
QUESTION 29 Topic: Cyber Security Basics
All of the following are examples of real security and privacy risks EXCEPT:
-
QUESTION 30 Topic: Cyber Security Basics
Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user’s system?
-
QUESTION 31 Topic: Cyber Offenses Test
What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?
-
QUESTION 32 Topic: Cyber Security Basics
When A Person Is Harrassed Repeatedly By Being Followed, Called Or Be Written To He/she Is A Target Of
-
QUESTION 33 Topic: Cyber Security Basics
Recall the type of malwares which are basically attached to executable code or exe files.
-
QUESTION 34 Topic: Cyber Offenses Test
????????.. is a form of virus explicitly designed to hide itself from detection by antivirus software.
-
QUESTION 35 Topic: Cyber Security Basics
Potential weaknesses in IT infrastructure through which a cyber attack might occur is called __.
-
QUESTION 36 Topic: Cyber Offenses Test
What is the standard IANA port number used for requesting web pages
-
QUESTION 37 Topic: Cyber Security Basics
When ____ and ____ are in charge of data, the integrity of the data is imperilled?
-
QUESTION 38 Topic: Cyber Security Basics
Which of the following denotes the deliberate exploitation of computer systems and its resources connected through Internet?
-
QUESTION 39 Topic: Cyber Offenses Test
The first computer virus is --------
-
QUESTION 40 Topic: Cyber Offenses Test
What program would you use to gain administrative rights to someone's computer?
-
QUESTION 41 Topic: Cyber Security Basics
In The SSL Record Protocol Operation Pad_2 Is -
-
QUESTION 42 Topic: Cyber Security Basics
Which one of the following can be considered as the class of computer threats?
-
QUESTION 43 Topic: Cyber Security Basics
Which of the below is a popular victim of cyber attackers looking to gain the IP address of a target or victim user?
-
QUESTION 44 Topic: Cyber Offenses Test
Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase
-
QUESTION 45 Topic: Cyber Security Basics
Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.
-
QUESTION 46 Topic: Computer Forensics Test
What does CoC concept refers to, in computer forensics
-
QUESTION 47 Topic: Cyber Security Basics
This is the concept for guiding information security policy within a corporation, firm, or organisation. What exactly is “this” in this context?
-
QUESTION 48 Topic: Cyber Offenses Test
What is short for malicious software (is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?
-
QUESTION 49 Topic: Cybercrime Tools Questions
Which attack type is prevented by array bound checking
-
QUESTION 50 Topic: Cyber Security Basics
What Is The Most Important Activity In System Hacking?