-
QUESTION 1 Topic: Cyber Offenses Test
What type of virus describes the awful consequences of not acting immediately?
-
QUESTION 2 Topic: Cyber Security Basics
Enumeration Is Part Of What Phase Of Ethical Hacking?
-
QUESTION 3 Topic: Cyber Security Basics
Which of the following is not an appropriate method of defacing web server?
-
QUESTION 4 Topic: Cyber Security Basics
When information about transactions is transmitted in transparent way hackers can catch the transmissions to obtain customers sensitive information. This is known as __
-
QUESTION 5 Topic: Cyber Offenses Test
Which of the following is known as Malicious software?
-
QUESTION 6 Topic: Cyber Security Basics
Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
-
QUESTION 7 Topic: Cyber Offenses Test
What feature/flag limits the life of an IP packet on the network
-
QUESTION 8 Topic: Cyber Security Basics
A __ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
-
QUESTION 9 Topic: Cyber Security Basics
Script files sent mostly through email attachment to attack host computer are called ______.
-
QUESTION 10 Topic: Cyber Security Basics
Passwords enable users to
-
QUESTION 11 Topic: Cyber Security Basics
Protection from______ of source code means non-disclosure of the source code to outsiders.
-
QUESTION 12 Topic: Cyber Offenses Test
To protect a computer from virus, you should install -------- in your computer.
-
QUESTION 13 Topic: IT Act Questions
How much duration is provided to digital signature subscriber before suspension as per IT Act, 2000
-
QUESTION 14 Topic: Cyber Terrorism
Which of the following is an example of a economic cybercrime
-
QUESTION 15 Topic: Cyber Security Basics
Protection from _______of source code means protection of any individual from destroying the software source code.
-
QUESTION 16 Topic: Cybercrime Tools Questions
Which attack type is prevented by array bound checking
-
QUESTION 17 Topic: Cyber Offenses Test
The first computer virus is --------
-
QUESTION 18 Topic: Cyber Security Basics
Recall the attack that consumes network bandwidth and flood the networks with data.
-
QUESTION 19 Topic: Cyber Security Basics
Which of the following is the threat preclusion technique that observes network traffic flows for vulnerability exploits?
-
QUESTION 20 Topic: Computer Forensics Test
How is social networking site frauds propagated
-
QUESTION 21 Topic: Cyber Security Basics
Which one of the following is a type of antivirus program?
-
QUESTION 22 Topic: Mobile Devices Forensics Test
What does the term MAC, in MAC address expands to
-
QUESTION 23 Topic: Cyber Offenses Test
What is your computer called when it is infected with a malware bot?
-
QUESTION 24 Topic: Cyber Security Basics
Circuit-level gateway firewalls have which of the below disadvantages?
-
QUESTION 25 Topic: Cyber Security Basics
Which one of the following usually used in the process of Wi-Fi-hacking?
-
QUESTION 26 Topic: Cyber Security Basics
By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.
-
QUESTION 27 Topic: Cyber Security Basics
Trojans can not ______________
-
QUESTION 28 Topic: Computer Forensics Test
What does CoC concept refers to, in computer forensics
-
QUESTION 29 Topic: Mobile Devices Forensics Test
What is the important function for forensic toolkit of cell phones
-
QUESTION 30 Topic: Cyber Security Basics
Security compromise in a network occurs mainly due to this.
-
QUESTION 31 Topic: IT Act Questions
Which is the Act which provides legal framework for e-Governance in India
-
QUESTION 32 Topic: Cyber Offenses Test
What program would you use to gain administrative rights to someone's computer?
-
QUESTION 33 Topic: Cyber Security Basics
ATM Skimmers are used to take your confidential data from your ATM cards.
-
QUESTION 34 Topic: Organizational Cybersecurity Questions
What does Authentication Service facilitates
-
QUESTION 35 Topic: Cyber Offenses Test
A ????????.. creates copies during replication that are functionally equivalent but have distinctly different bit patterns.
-
QUESTION 36 Topic: Cyber Security Basics
In Wi-Fi Security, which of the following protocol is more used?
-
QUESTION 37 Topic: Cyber Security Basics
Which of them is not a major way of stealing email information?
-
QUESTION 38 Topic: Cyber Security Basics
Which of the below security encryption standards is the weakest?
-
QUESTION 39 Topic: Cyber Security Basics
The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans.
-
QUESTION 40 Topic: Cyber Security Basics
________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.
-
QUESTION 41 Topic: Organizational Cybersecurity Questions
What refers to stealing money or resources a bit at a time
-
QUESTION 42 Topic: Cyber Security Basics
An act to injure, corrupt, or threaten a system or network is characterised as which of the below?
-
QUESTION 43 Topic: Cybercrime Questions
Which port number is used by HTTP
-
QUESTION 44 Topic: Cyber Security Basics
There are _______ major ways of stealing email information.
-
QUESTION 45 Topic: Cyber Security Basics
Which of the below implemented is not a good means of safeguarding privacy?
-
QUESTION 46 Topic: Cyber Crime Questions
What type of hacker was the 16 year-old individual who hacked into NASA networks and downloaded temperature and humidity control software worth $1.7 billion?
-
QUESTION 47 Topic: Cyber Security Basics
What is backup?
-
QUESTION 48 Topic: Cyber Security Basics
A Proxy server is used for which of the following?
-
QUESTION 49 Topic: Cybercrime Tools Questions
What type of attack technique is used, if user receive a phone call from an individual identifying herself as an employee of bank requesting that user update personal information
-
QUESTION 50 Topic: Cyber Security Basics
Recognize the type of malwares that hide themselves in various cycles of encryption and decryption.