Question no.
  • QUESTION 1 Topic: Cyber Security Basics
    The security audit team______ to keep the computers safe from cyber attacks.
  • QUESTION 2 Topic: Cyber Security Basics
    Information security audit analyses events of past threats to formulate _____.
  • QUESTION 3 Topic: Cyber Security Basics
    _____in source code development means verification of role before permitting access to source code.
  • QUESTION 4 Topic: Cyber Security Basics
    Which of the following is considered as the unsolicited commercial email?
  • QUESTION 5 Topic: Cyber Security Basics
    Which of the below can be classified as a type of computer threat?
  • QUESTION 6 Topic: IT Act Questions
    How much duration is provided to digital signature subscriber before suspension as per IT Act, 2000
  • QUESTION 7 Topic: Cyber Security Basics
    Why Would A Hacker Use A Proxy Server?
  • QUESTION 8 Topic: Cyber Security Basics
    A computer checks the _____ of user names and passwords for a match before granting access.
  • QUESTION 9 Topic: Cyber Security Basics
    An ethical hacker must need to have the skills of understanding the problem, networking knowledge and to know how the technology works.
  • QUESTION 10 Topic: Cyber Offenses Test
    What does SSO refers to
  • QUESTION 11 Topic: Cyber Security Basics
    Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
  • QUESTION 12 Topic: Cyber Security Basics
    If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.
  • QUESTION 13 Topic: Cyber Security Basics
    The DSS Signature Uses Which Hash Algorithm?
  • QUESTION 14 Topic: Cyber Security Basics
    Which of the following is not an appropriate method of defacing web server?
  • QUESTION 15 Topic: Cyber Security Basics
    Phishing is a form of
  • QUESTION 16 Topic: Cyber Security Basics
    This scanning finds out the open nodes on a specific host or multiple hosts on the network by scanning.
  • QUESTION 17 Topic: IT Act Questions
    Which section of IT Act was invalidated by Supreme Court of India
  • QUESTION 18 Topic: Cyber Security Basics
    All of the following are examples of real security and privacy risks Except ___
  • QUESTION 19 Topic: Cyber Security Basics
    In Wi-Fi Security, which of the following protocol is more used?
  • QUESTION 20 Topic: Cyber Security Basics
    ____ are viruses that are triggered by the passage of time or on a certain date.
  • QUESTION 21 Topic: IT Act Questions
    What major update in IT Act 2008 was enacted as against IT Act 2000
  • QUESTION 22 Topic: Cyber Security Basics
    Hackers usually used the computer virus for ______ purpose
  • QUESTION 23 Topic: Cyber Security Basics
    The threat of backdoors started when ____________ & ____________ OSs became widely accepted.
  • QUESTION 24 Topic: Cyber Crime Questions
    What is a person called when they try to hurt a group of people with the use of a computer?
  • QUESTION 25 Topic: Cyber Security Basics
    What is the full form of CIA under information security?
  • QUESTION 26 Topic: Cyber Security Basics
    LDAP in directory service stands for ______.
  • QUESTION 27 Topic: Cyber Security Basics
    _________ persistence and up-to-date with the latest technological updates and their flaws are some of the major qualities; an ethical hacker must need to have.
  • QUESTION 28 Topic: Cyber Crime Questions
    Computer hacking is the practice of modifying computer software and hardware to accomplish a goal outside of the creator's original purpose.
  • QUESTION 29 Topic: Cyber Offenses Test
    ?????.. are used in denial of service attacks, typically against targeted web sites.
  • QUESTION 30 Topic: Organizational Cybersecurity Questions
    What is the attention-grabbing properties of a cue in an email is referred as
  • QUESTION 31 Topic: Cyber Security Basics
    Recognize the type of malwares that hide themselves in various cycles of encryption and decryption.
  • QUESTION 32 Topic: Computer Forensics Test
    What does CoC concept refers to, in computer forensics
  • QUESTION 33 Topic: Cyber Security Basics
    The _______________ is a security app by Microsoft which is a built-in one into Windows OS that is designed to filter network data from your Windows system & block harmful communications or the programs which are initiating them.
  • QUESTION 34 Topic: Cyber Security Basics
    __ can be used to minimize the risk of security breaches or viruses.
  • QUESTION 35 Topic: Cybercrime Tools Questions
    Which of the following is not a method to preserve the security and integrity of information
  • QUESTION 36 Topic: Cyber Security Basics
    To ensure information safety, ________should be implemented.
  • QUESTION 37 Topic: Cyber Offenses Test
    What type of virus describes the awful consequences of not acting immediately?
  • QUESTION 38 Topic: Cyber Offenses Test
    Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase
  • QUESTION 39 Topic: Cyber Offenses Test
    Key logger is a
  • QUESTION 40 Topic: Identity Theft Questions
    What does "whaling" refers to in online fraud
  • QUESTION 41 Topic: Cyber Security Basics
    Which of the following is not a risk in internet based transaction
  • QUESTION 42 Topic: Cyber Security Basics
    Which one of the following usually used in the process of Wi-Fi-hacking?
  • QUESTION 43 Topic: Cyber Security Basics
    Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.
  • QUESTION 44 Topic: Cyber Security Basics
    Which of the following would most likely NOT be a symptom of a virus?
  • QUESTION 45 Topic: Cyber Terrorism
    Which of the following is an example of a economic cybercrime
  • QUESTION 46 Topic: Mobile Devices Forensics Test
    What does the term MAC, in MAC address expands to
  • QUESTION 47 Topic: Cyber Security Basics
    _______ is a type of software designed to help the user’s computer detect viruses and avoid them.
  • QUESTION 48 Topic: Cyber Offenses Test
    What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?
  • QUESTION 49 Topic: Cyber Security Basics
    ____________ work in background & keeps on downloading other malicious programs when the system is online.
  • QUESTION 50 Topic: Cyber Security Basics
    Which of the following refers to stealing one’s idea or invention of others and use it for their own benefits?