MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Computer Science
1000 Cyber Security
Quiz 2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Q.1
Which of the following is defined as an attempt to harm, damage or cause threat to a system or network?
a) Digital crime
b) Threats
c) System hijacking
d) Cyber Attack
Q.2
They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
a) White Hat Hackers
b) Black Hat Hackers
c) Hactivists
d) Gray Hat Hackers
Q.3
IT security in any firm or organization is maintained and handled by ____________________
a) Software Security Specialist
b) CEO of the organization
c) Security Auditor
d) IT Security Engineer
Q.4
Where did the term “hacker” originate?
a) MIT
b) New York University
c) Harvard University
d) Bell’s Lab
Q.5
What is the existence of weakness in a system or network is known as?
a) Attack
b) Exploit
c) Vulnerability
d) Threat
Q.6
Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.
a) MiTM attack
b) Phishing attack
c) Website attack
d) DoS attack
Q.7
Which of the following is not a step followed by cyber-criminals in data breaching?
a) Exfiltration
b) Research and info-gathering
c) Attack the system
d) Fixing the bugs
Q.8
Which of the following online service’s privacy cannot be protected using Tor?
a) Browsing data
b) Instant messaging
c) Login using ID
d) Relay chats
Q.9
Which of the following term refers to a group of hackers who are both white and black hat?
a) Yellow Hat hackers
b) Grey Hat hackers
c) Red Hat Hackers
d) White-Black Hat Hackers
Q.10
Which of the following is not an email-related hacking tool?
a) Mail Password
b) Email Finder Pro
c) Mail PassView
d) Sendinc
Q.11
Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack?
a) botnets
b) programs
c) virus
d) worms
Q.12
Which of the following is the least strong security encryption standard?
a) WPA3
b) WPA2
c) WPA
d) WEP
Q.13
Which of the following is a Stuxnet?
a) Trojan
b) Antivirus
c) Worm
d) Virus
Q.14
Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?
a) Operating System fingerprinting
b) Operating System penetration testing
c) Digital-printing
d) Machine printing
Q.15
Which of the following can diminish the chance of data leakage?
a) Steganography
b) Chorography
c) Cryptography
d) Authentication
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page