Q.1
The antivirus or PC defender software in a system helps in detecting virus and Trojans.
  • a) True
  • b) False
Q.2
___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.
  • a) Data-hack
  • b) Data-stealing
  • c) Database altering
  • d) Data breach
Q.3
Which of these is not a step followed by cyber-criminals in data breaching?
  • a) Research and info-gathering
  • b) Attack the system
  • c) Fixing the bugs
  • d) Exfiltration
Q.4
What types of data are stolen by cyber-criminals in most of the cases?
  • a) Data that will pay once sold
  • b) Data that has no value
  • c) Data like username and passwords only
  • d) Data that is old
Q.5
Which of the companies and organizations do not become the major targets of attackers for data stealing?
  • a) Business firms
  • b) Medical and Healthcare
  • c) Government and secret agencies
  • d) NGOs
Q.6
___________ will give you an USB which will contain ___________ that will take control of your system in the background.
  • a) Attackers, Trojans
  • b) White hat hackers, antivirus
  • c) White hat hackers, Trojans
  • d) Attackers, antivirus
Q.7
An attacker, who is an employee of your firm may ___________ to know your system password.
  • a) do peeping
  • b) perform network jamming
  • c) do shoulder surfing
  • d) steal your laptop
Q.8
You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your data from that thrown-away file also, using the technique _________
  • a) Dumpster diving
  • b) Shoulder surfing
  • c) Phishing
  • d) Spamming
Q.9
ATM Skimmers are used to take your confidential data from your ATM cards.
  • a) True
  • b) False
Q.10
_____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt all the files and unlock the system.
  • a) Scareware
  • b) Ransomware
  • c) Adware
  • d) Spyware
Q.11
______________ are special malware programs written by elite hackers and black hat hackers to spy your mobile phones and systems.
  • a) Scareware
  • b) Ransomware
  • c) Adware
  • d) Spyware
Q.12
Clicking a link which is there in your email which came from an unknown source can redirect you to ____________ that automatically installs malware in your system.
  • a) that vendor’s site
  • b) security solution site
  • c) malicious site
  • d) software downloading site
Q.13
An attacker may use automatic brute forcing tool to compromise your ____________
  • a) username
  • b) employee ID
  • c) system / PC name
  • d) password
Q.14
The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________
  • a) Distributed Denial-of-Service (DDoS)
  • b) Permanent Denial-of-Service (PDoS)
  • c) Denial-of-Service (DoS)
  • d) Controlled Denial-of-Service (CDoS)
Q.15
Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other components to make their hands dirty on your confidential information.
  • a) True
  • b) False
0 h : 0 m : 1 s