MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Computer Science
Ethical Hacking
Quiz 1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Q.1
Data Protection Actis designed to what?
To enable everyone to access all data
To protect personal data stored on computers or in an organised paper filing system
To allow people to use data systems where their details are stored
Q.2
If the integrity of data is compromised it means that?
It has been changed in some way
It has been copied
It has not been backed up
The legitimate user no longer has access to it
Q.3
The "C" in the CIA triad stands for
Communications
Compatibility
Confidentiality
Q.4
The "I" in the CIA triad stands for
Integrity
Intelligence
Independence
Q.5
The "A" in the CIA triad stands for
Accessibility
Advantage
Availability
Q.6
Plaintext + key = ______________.
Decoded
Ciphertext
Uncoded
Q.7
What is a hackers?
A hacker is someone who discovers the weaknesses of a computer or computer network
someone who helps others
a person who does not know how to turn on a computer
a person who spends a lot of time with his smartphone
Q.8
Personal Information
PII (Personally Identifiable Information)
TOE (Target of Evaluation)
OSINT (Open Source Intelligence)
Zero Day
Q.9
Open Source Intelligence
Hack Value
Daisy Chaining
PII
OSINT
Q.10
What does IoT stand for?
Internet of Types
Internet of Technologies
Internet over Telephone
Internet of Things
Q.11
What does GDPR stand for?
Great Danes Performance Ratings
General Data Protection Records
General Disclosure Protection Regulations
General Data Protection Regulation
Q.12
What type of ethical hack tests access to the physical infrastructure?
Internal network
Remote network
External network
Physical access
Q.13
What is the first phase of hacking?
Attack
Maintaining access
Gaining access
Reconnaissance
Q.14
Hacking for a cause is called:
Active hacking
Hacktivism
Activism
Black-hat hacking
Q.15
What is a Tabletop exercise?
A planned exercise allowed organisations to evaluate their response to a cyber attack
A dummy exercise with networking models on a Tabletop
A rehearsal cyber attack performed on a smaller organisation before attacking a large organisation
An authorised attack on a computer system
Q.16
How can you protect your computer against viruses?
Put a lock on it.
Install an anti-virus package, scan and delete files and update it.
Q.17
How does a worm infect a computer?
E-mail attachments
Through security loopholes, your computer is not up to date
Suspicious web links
On memory sticks
Q.18
MAC address spoofing is which type of attack?
Encryption
Brute-force
Authentication
Social engineering
Q.19
Set file permissions
chmod
mkdir
cat
cd
Q.20
What does RIPA stand for?
Regulation of Investigatory Powers Act
Regulation of Information Powers Act
Regulation of Investigatory Protection Act
Recovery of Investigatory Powers Act
Recovery of Information Powers Act
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page