- 
                  
QUESTION 1 Topic: Cyber Security Basics
                  
                  
                                        The security audit team______ to keep the computers safe from cyber attacks.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 2 Topic: Cyber Security Basics
                  
                  
                                        Information security audit analyses events of past threats to formulate _____.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 3 Topic: Cyber Security Basics
                  
                  
                                        _____in source code development means verification of role before permitting access to source code.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 4 Topic: Cyber Security Basics
                  
                  
                                        Which of the following is considered as the unsolicited commercial email?
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 5 Topic: Cyber Security Basics
                  
                  
                                        Which of the below can be classified as a type of computer threat?
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 6 Topic: IT Act Questions
                  
                  
                                        How much duration is provided to digital signature subscriber before suspension as per IT Act, 2000
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 7 Topic: Cyber Security Basics
                  
                  
                                        Why Would A Hacker Use A Proxy Server?
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 8 Topic: Cyber Security Basics
                  
                  
                                        A computer checks the _____ of user names and passwords for a match before granting access.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 9 Topic: Cyber Security Basics
                  
                  
                                        An ethical hacker must need to have the skills of understanding the problem, networking knowledge and to know how the technology works.
                    
                   
                  
                                                          
                                                                              
                                                        
                 
                              - 
                  
QUESTION 10 Topic: Cyber Offenses Test
                  
                  
                                        What does SSO refers to
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 11 Topic: Cyber Security Basics
                  
                  
                                        Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 12 Topic: Cyber Security Basics
                  
                  
                                        If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.
                    
                   
                  
                                                          
                                                                              
                                                        
                 
                              - 
                  
QUESTION 13 Topic: Cyber Security Basics
                  
                  
                                        The DSS Signature Uses Which Hash Algorithm?
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 14 Topic: Cyber Security Basics
                  
                  
                                        Which of the following is not an appropriate method of defacing web server?
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 15 Topic: Cyber Security Basics
                  
                  
                                        Phishing is a form of
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 16 Topic: Cyber Security Basics
                  
                  
                                        This scanning finds out the open nodes on a specific host or multiple hosts on the network by scanning.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 17 Topic: IT Act Questions
                  
                  
                                        Which section of IT Act was invalidated by Supreme Court of India
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 18 Topic: Cyber Security Basics
                  
                  
                                        All of the following are examples of real security and privacy risks Except ___
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 19 Topic: Cyber Security Basics
                  
                  
                                         In Wi-Fi Security, which of the following protocol is more used?
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 20 Topic: Cyber Security Basics
                  
                  
                                        ____ are viruses that are triggered by the passage of time or on a certain date.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 21 Topic: IT Act Questions
                  
                  
                                        What major update in IT Act 2008 was enacted as against IT Act 2000
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 22 Topic: Cyber Security Basics
                  
                  
                                        Hackers usually used the computer virus for ______ purpose
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 23 Topic: Cyber Security Basics
                  
                  
                                        The threat of backdoors started when ____________ & ____________ OSs became widely accepted.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 24 Topic: Cyber Crime Questions
                  
                  
                                        What is a person called when they try to hurt a group of people with the use of a computer?
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 25 Topic: Cyber Security Basics
                  
                  
                                        What is the full form of CIA under information security?
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 26 Topic: Cyber Security Basics
                  
                  
                                        LDAP in directory service stands for ______.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 27 Topic: Cyber Security Basics
                  
                  
                                        _________ persistence and up-to-date with the latest technological updates and their flaws are some of the major qualities; an ethical hacker must need to have.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 28 Topic: Cyber Crime Questions
                  
                  
                                        Computer hacking is the practice of modifying computer software and hardware to accomplish a goal outside of the creator's original purpose.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 29 Topic: Cyber Offenses Test
                  
                  
                                        ?????.. are used in denial of service attacks, typically against targeted web sites.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 30 Topic: Organizational Cybersecurity Questions
                  
                  
                                        What is the attention-grabbing properties of a cue in an email is referred as
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 31 Topic: Cyber Security Basics
                  
                  
                                        Recognize the type of malwares that hide themselves in various cycles of encryption and decryption.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 32 Topic: Computer Forensics Test
                  
                  
                                        What does CoC concept refers to, in computer forensics
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 33 Topic: Cyber Security Basics
                  
                  
                                        The _______________ is a security app by Microsoft which is a built-in one into Windows OS that is designed to filter network data from your Windows system & block harmful communications or the programs which are initiating them.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 34 Topic: Cyber Security Basics
                  
                  
                                        __ can be used to minimize the risk of security breaches or viruses.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 35 Topic: Cybercrime Tools Questions
                  
                  
                                        Which of the following is not a method to preserve the security and integrity of information
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 36 Topic: Cyber Security Basics
                  
                  
                                        To ensure information safety, ________should be implemented.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 37 Topic: Cyber Offenses Test
                  
                  
                                        What type of virus describes the awful consequences of not acting immediately?
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 38 Topic: Cyber Offenses Test
                  
                  
                                        Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 39 Topic: Cyber Offenses Test
                  
                  
                                        Key logger is a
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 40 Topic: Identity Theft Questions
                  
                  
                                        What does "whaling" refers to in online fraud
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 41 Topic: Cyber Security Basics
                  
                  
                                        Which of the following is not a risk in internet based transaction
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 42 Topic: Cyber Security Basics
                  
                  
                                        Which one of the following usually used in the process of Wi-Fi-hacking?
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 43 Topic: Cyber Security Basics
                  
                  
                                        Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 44 Topic: Cyber Security Basics
                  
                  
                                        Which of the following would most likely NOT be a symptom of a virus?
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 45 Topic: Cyber Terrorism
                  
                  
                                        Which of the following is an example of a economic cybercrime
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 46 Topic: Mobile Devices Forensics Test
                  
                  
                                        What does the term MAC, in MAC address expands to
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 47 Topic: Cyber Security Basics
                  
                  
                                         _______ is a type of software designed to help the user’s computer detect viruses and avoid them.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 48 Topic: Cyber Offenses Test
                  
                  
                                        What is it called when someone changes the FROM section of an email so that the message you receive appears to come from a person other than the one who sent it?
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 49 Topic: Cyber Security Basics
                  
                  
                                        ____________ work in background & keeps on downloading other malicious programs when the system is online.
                    
                   
                  
                                                          
                                                                              
                                                                              
                                                                              
                                                        
                 
                              - 
                  
QUESTION 50 Topic: Cyber Security Basics
                  
                  
                                         Which of the following refers to stealing one’s idea or invention of others and use it for their own benefits?