Professional Documents
Culture Documents
B) Spying Someone Using Keylogger: 1. A 2. C 3. C 4. B 5. C 6. C
B) Spying Someone Using Keylogger: 1. A 2. C 3. C 4. B 5. C 6. C
a
2. c
1. Which of the following is not an example of a computer as weapon cyber-crime? 3. c
4. b
a) Credit card fraudulent 5. c
6. c
b) Spying someone using keylogger
c) IPR Violation
d) Pornography
View Answer
Answer: b
Explanation: DDoS (Distributed Denial of Service), IPR violation, pornography are mass attacks done
using a computer. Spying someone using keylogger is an example of peer-to-peer attack.
2. What is the name of the IT law that India is having in the Indian legislature?
View Answer
Answer: c
Explanation: The Indian legislature thought of adding a chapter that is dedicated to cyber law. This
finally brought India’s Information Technology (IT) Act, 2000 which deals with the different cyber-crimes
and their associated laws.
3. __________ is the specific search engine for exploits where anyone can find all the exploits
associated to vulnerability.
a) Google
b) Bing
c) Exploit-db
d) Exploit-engine
View Answer
Answer: c
Explanation: Since based on vulnerabilities, we can find exploits, Exploit-db is the specific search engine
for exploits where anyone can find all the exploits associated with vulnerability. You can find this from
https://www.exploit-db.com.
a) Misconfiguration in OS
c) Misconfiguration in networks
View Answer
Answer: b
Explanation: Websites get hosted on web servers. Web servers are actually computers running that
makes us available & accessible files (web pages) through the internet. Various ways that can help
compromise a web server are a misconfiguration of network or OS, bugs in web server’s OS etc.
5. Activate _____________ when you’re required it to use, otherwise turn it off for security
purpose.
a) Flash Light
b) App updates
c) Bluetooth
d) Rotation
View Answer
Answer: c
Explanation: Activate Bluetooth when you’re required it to use, otherwise turn it off for security
purpose. This is because; there are various tools and vulnerabilities that may gain access to your smart-
phone using Bluetooth.
6. DDoS in mobile systems wait for the owner of the _____________ to trigger the attack.
a) worms
b) virus
c) botnets
d) programs
View Answer
Answer: c
Explanation: Botnets on compromised mobile devices wait for instructions from their owner. After
getting the owner’s instruction it launches DDoS flood attack. This result in a failure in connecting calls
or transmitting data.