Question no.
  • QUESTION 1 Topic: Cyber Offenses Test
    What type of virus describes the awful consequences of not acting immediately?
  • QUESTION 2 Topic: Cyber Security Basics
    Enumeration Is Part Of What Phase Of Ethical Hacking?
  • QUESTION 3 Topic: Cyber Security Basics
    Which of the following is not an appropriate method of defacing web server?
  • QUESTION 4 Topic: Cyber Security Basics
    When information about transactions is transmitted in transparent way hackers can catch the transmissions to obtain customers sensitive information. This is known as __
  • QUESTION 5 Topic: Cyber Offenses Test
    Which of the following is known as Malicious software?
  • QUESTION 6 Topic: Cyber Security Basics
    Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
  • QUESTION 7 Topic: Cyber Offenses Test
    What feature/flag limits the life of an IP packet on the network
  • QUESTION 8 Topic: Cyber Security Basics
    A __ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
  • QUESTION 9 Topic: Cyber Security Basics
    Script files sent mostly through email attachment to attack host computer are called ______.
  • QUESTION 10 Topic: Cyber Security Basics
    Passwords enable users to
  • QUESTION 11 Topic: Cyber Security Basics
    Protection from______ of source code means non-disclosure of the source code to outsiders.
  • QUESTION 12 Topic: Cyber Offenses Test
    To protect a computer from virus, you should install -------- in your computer.
  • QUESTION 13 Topic: IT Act Questions
    How much duration is provided to digital signature subscriber before suspension as per IT Act, 2000
  • QUESTION 14 Topic: Cyber Terrorism
    Which of the following is an example of a economic cybercrime
  • QUESTION 15 Topic: Cyber Security Basics
    Protection from _______of source code means protection of any individual from destroying the software source code.
  • QUESTION 16 Topic: Cybercrime Tools Questions
    Which attack type is prevented by array bound checking
  • QUESTION 17 Topic: Cyber Offenses Test
    The first computer virus is --------
  • QUESTION 18 Topic: Cyber Security Basics
    Recall the attack that consumes network bandwidth and flood the networks with data.
  • QUESTION 19 Topic: Cyber Security Basics
    Which of the following is the threat preclusion technique that observes network traffic flows for vulnerability exploits?
  • QUESTION 20 Topic: Computer Forensics Test
    How is social networking site frauds propagated
  • QUESTION 21 Topic: Cyber Security Basics
    Which one of the following is a type of antivirus program?
  • QUESTION 22 Topic: Mobile Devices Forensics Test
    What does the term MAC, in MAC address expands to
  • QUESTION 23 Topic: Cyber Offenses Test
    What is your computer called when it is infected with a malware bot?
  • QUESTION 24 Topic: Cyber Security Basics
    Circuit-level gateway firewalls have which of the below disadvantages?
  • QUESTION 25 Topic: Cyber Security Basics
    Which one of the following usually used in the process of Wi-Fi-hacking?
  • QUESTION 26 Topic: Cyber Security Basics
    By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.
  • QUESTION 27 Topic: Cyber Security Basics
    Trojans can not ______________
  • QUESTION 28 Topic: Computer Forensics Test
    What does CoC concept refers to, in computer forensics
  • QUESTION 29 Topic: Mobile Devices Forensics Test
    What is the important function for forensic toolkit of cell phones
  • QUESTION 30 Topic: Cyber Security Basics
    Security compromise in a network occurs mainly due to this.
  • QUESTION 31 Topic: IT Act Questions
    Which is the Act which provides legal framework for e-Governance in India
  • QUESTION 32 Topic: Cyber Offenses Test
    What program would you use to gain administrative rights to someone's computer?
  • QUESTION 33 Topic: Cyber Security Basics
    ATM Skimmers are used to take your confidential data from your ATM cards.
  • QUESTION 34 Topic: Organizational Cybersecurity Questions
    What does Authentication Service facilitates
  • QUESTION 35 Topic: Cyber Offenses Test
    A ????????.. creates copies during replication that are functionally equivalent but have distinctly different bit patterns.
  • QUESTION 36 Topic: Cyber Security Basics
    In Wi-Fi Security, which of the following protocol is more used?
  • QUESTION 37 Topic: Cyber Security Basics
    Which of them is not a major way of stealing email information?
  • QUESTION 38 Topic: Cyber Security Basics
    Which of the below security encryption standards is the weakest?
  • QUESTION 39 Topic: Cyber Security Basics
    The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans.
  • QUESTION 40 Topic: Cyber Security Basics
    ________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.
  • QUESTION 41 Topic: Organizational Cybersecurity Questions
    What refers to stealing money or resources a bit at a time
  • QUESTION 42 Topic: Cyber Security Basics
    An act to injure, corrupt, or threaten a system or network is characterised as which of the below?
  • QUESTION 43 Topic: Cybercrime Questions
    Which port number is used by HTTP
  • QUESTION 44 Topic: Cyber Security Basics
    There are _______ major ways of stealing email information.
  • QUESTION 45 Topic: Cyber Security Basics
    Which of the below implemented is not a good means of safeguarding privacy?
  • QUESTION 46 Topic: Cyber Crime Questions
    What type of hacker was the 16 year-old individual who hacked into NASA networks and downloaded temperature and humidity control software worth $1.7 billion?
  • QUESTION 47 Topic: Cyber Security Basics
    What is backup?
  • QUESTION 48 Topic: Cyber Security Basics
    A Proxy server is used for which of the following?
  • QUESTION 49 Topic: Cybercrime Tools Questions
    What type of attack technique is used, if user receive a phone call from an individual identifying herself as an employee of bank requesting that user update personal information
  • QUESTION 50 Topic: Cyber Security Basics
    Recognize the type of malwares that hide themselves in various cycles of encryption and decryption.