Question no.
  • QUESTION 1 Topic: Cyber Security Basics
    Information on criminal records of individuals, financial data of companies, genetic information, address, mobile number, email ID, record of web surfing behaviour, record of credit card, record of debit card, netbanking details, etc. are classified under ______.
  • QUESTION 2 Topic: Cyber Security Basics
    SDLC in software development stands for _____.
  • QUESTION 3 Topic: Cyber Security Basics
    The private content of a transaction, if unprotected can be intercepted when it goes through the route over the internet is called __
  • QUESTION 4 Topic: Computer Forensics Test
    Where does ephemeral data is accessed during computer forensics examination
  • QUESTION 5 Topic: Cyber Security Basics
    ____________ work in background & keeps on downloading other malicious programs when the system is online.
  • QUESTION 6 Topic: Computer Forensics Test
    What does CoC concept refers to, in computer forensics
  • QUESTION 7 Topic: Cyber Security Basics
    Victims of cyber attack might loose _______.
  • QUESTION 8 Topic: Cyber Security Basics
    _______of access rights in source code development means verification of role before permitting access to source code.
  • QUESTION 9 Topic: Cyber Security Basics
    Backdoors cannot be designed as ______________
  • QUESTION 10 Topic: Cyber Security Basics
    Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic?
  • QUESTION 11 Topic: Cyber Security Basics
    Code Red is a type of ________
  • QUESTION 12 Topic: Cyber Security Basics
    Security should be implemented at the stage of ______in software.
  • QUESTION 13 Topic: Cyber Security Basics
    A __ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
  • QUESTION 14 Topic: Cyber Security Basics
    ______________ are special malware programs written by elite hackers and black hat hackers to spy your mobile phones and systems.
  • QUESTION 15 Topic: Cyber Security Basics
    Cyber Security provide security against what?
  • QUESTION 16 Topic: Cyber Security Basics
    When ____ and ____ are in charge of data, the integrity of the data is imperilled?
  • QUESTION 17 Topic: Cyber Security Basics
    An electronic file that uniquely identifies individuals and websites on the internet and enables secure, confidential communications.
  • QUESTION 18 Topic: Cyber Security Basics
    Protecting access to a computer through________ is called access control.
  • QUESTION 19 Topic: Cyber Security Basics
    Which of the below cyber security principles states that the security system should be as compact and straightforward as possible?
  • QUESTION 20 Topic: Cyber Security Basics
    What is called the collective terms of malicious software, such as viruses, worms and trojans?
  • QUESTION 21 Topic: Cyber Security Basics
    Which of the following port and IP address scanner famous among the users?
  • QUESTION 22 Topic: IT Act Questions
    How much duration is provided to digital signature subscriber before suspension as per IT Act, 2000
  • QUESTION 23 Topic: Cyber Security Basics
    A ___________ is a method in which a computer security mechanism is bypassed untraceable for accessing the computer or its information.
  • QUESTION 24 Topic: Computer Forensics Test
    What is the file extension used by outlook express to store e-mails locally
  • QUESTION 25 Topic: Cyber Security Basics
    LDAP in directory service stands for ______.
  • QUESTION 26 Topic: Cyber Security Basics
    ___________ will give you an USB which will contain ___________ that will take control of your system in the background.
  • QUESTION 27 Topic: Computer Forensics Test
    What does CoC concept refers to, in computer forensics
  • QUESTION 28 Topic: Cyber Security Basics
    Recall the attack that consumes network bandwidth and flood the networks with data.
  • QUESTION 29 Topic: Cyber Security Basics
    _____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.
  • QUESTION 30 Topic: Cyber Security Basics
    __ is a computer crime in which criminal breaks into a computer system for exploring details of information etc.
  • QUESTION 31 Topic: Cybercrime Questions
    Which of the following recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events
  • QUESTION 32 Topic: Cyber Security Basics
    Under information security, CIA standsfor _______.
  • QUESTION 33 Topic: Cyber Security Basics
    In Wi-Fi Security, which of the following protocol is more used?
  • QUESTION 34 Topic: Cyber Offenses Test
    A ------- is a computer program that can invade computer and perform a variety of functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files)
  • QUESTION 35 Topic: Cyber Offenses Test
    What program would you use to gain administrative rights to someone's computer?
  • QUESTION 36 Topic: Cyber Crime Questions
    Illegal Interception, Illegal Access, Data Interference, and System Interference are all a part of Cybercrime.
  • QUESTION 37 Topic: Cyber Security Basics
    Which of the following is not an appropriate countermeasure for web server hacking?
  • QUESTION 38 Topic: Cyber Security Basics
    Which of the following is a non-technical type of intrusion or attack technique?
  • QUESTION 39 Topic: Computer Forensics Test
    How is social networking site frauds propagated
  • QUESTION 40 Topic: Cyber Security Basics
    Enumeration Is Part Of What Phase Of Ethical Hacking?
  • QUESTION 41 Topic: Cyber Security Basics
    What is backup?
  • QUESTION 42 Topic: Cyber Security Basics
    Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails.
  • QUESTION 43 Topic: Cyber Security Basics
    Any company or agency’s IT protection is managed and maintained by?
  • QUESTION 44 Topic: Cyber Security Basics
    Any single employee ______hold all data needed for making a complete financial transaction.
  • QUESTION 45 Topic: Identity Theft Questions
    Which technique is applied for identity theft if obtained going through items user have thrown out
  • QUESTION 46 Topic: Cyber Offenses Test
    How does banking industry averts skimming related frauds
  • QUESTION 47 Topic: Cyber Security Basics
    Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
  • QUESTION 48 Topic: Cyber Security Basics
    The term “CHAP” stands for __________
  • QUESTION 49 Topic: Cyber Security Basics
    Which of the below can be classified as a type of computer threat?
  • QUESTION 50 Topic: Cyber Offenses Test
    Which of the following is a path or means by which a hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome