Q.1
Which of the following is defined as an attempt to harm, damage or cause threat to a system or network?
  • a) Digital crime
  • b) Threats
  • c) System hijacking
  • d) Cyber Attack
Q.2
They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
  • a) White Hat Hackers
  • b) Black Hat Hackers
  • c) Hactivists
  • d) Gray Hat Hackers
Q.3
IT security in any firm or organization is maintained and handled by ____________________
  • a) Software Security Specialist
  • b) CEO of the organization
  • c) Security Auditor
  • d) IT Security Engineer
Q.4
Where did the term “hacker” originate?
  • a) MIT
  • b) New York University
  • c) Harvard University
  • d) Bell’s Lab
Q.5
What is the existence of weakness in a system or network is known as?
  • a) Attack
  • b) Exploit
  • c) Vulnerability
  • d) Threat
Q.6
Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.
  • a) MiTM attack
  • b) Phishing attack
  • c) Website attack
  • d) DoS attack
Q.7
Which of the following is not a step followed by cyber-criminals in data breaching?
  • a) Exfiltration
  • b) Research and info-gathering
  • c) Attack the system
  • d) Fixing the bugs
Q.8
Which of the following online service’s privacy cannot be protected using Tor?
  • a) Browsing data
  • b) Instant messaging
  • c) Login using ID
  • d) Relay chats
Q.9
Which of the following term refers to a group of hackers who are both white and black hat?
  • a) Yellow Hat hackers
  • b) Grey Hat hackers
  • c) Red Hat Hackers
  • d) White-Black Hat Hackers
Q.10
Which of the following is not an email-related hacking tool?
  • a) Mail Password
  • b) Email Finder Pro
  • c) Mail PassView
  • d) Sendinc
Q.11
Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack?
  • a) botnets
  • b) programs
  • c) virus
  • d) worms
Q.12
Which of the following is the least strong security encryption standard?
  • a) WPA3
  • b) WPA2
  • c) WPA
  • d) WEP
Q.13
Which of the following is a Stuxnet?
  • a) Trojan
  • b) Antivirus
  • c) Worm
  • d) Virus
Q.14
Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?
  • a) Operating System fingerprinting
  • b) Operating System penetration testing
  • c) Digital-printing
  • d) Machine printing
Q.15
Which of the following can diminish the chance of data leakage?
  • a) Steganography
  • b) Chorography
  • c) Cryptography
  • d) Authentication
0 h : 0 m : 1 s