Professional Documents
Culture Documents
Cyber Security QB
Cyber Security QB
Cyber Security QB
A. Data
B. Device
C. Network
D. All of these
2. Which of the following is defined as an attempt to steal, spy, damage or destroy computer
systems, networks, or their associated information?
A. Computer security
B. Cyber attack
C. Digital hacking
D. Cryptography
3. The procedure for determining the level of access that each individual has within an organization
refers to ___________.
A. Network security
B. Cloud security
C. Data security
D. Identity Management
4. The principle that ensures the data accessible by the authorized users and blocking access to
others is _______.
A. Confidentiality
B. Integrity
C. Availability
D. None of these
9. The threats in which employees try to avoid the policies of an organization put in place to
protect endpoints and valuable data are categorized as ____________.
A. Malicious threats
B. Negligent
C. Accidental threats
D. None of these
10. The group of hackers who hack the system illegally to steal money or to achieve their own illegal
goals are called as _____
A. Grey hat hackers
B. White hat hackers
C. State-sponsored attackers
D. Black hat hackers
11. The websites to showcase your work and let others know about yourself are known as
________.
A. Portfolio website
B. Educational website
C. Informational website
D. Non-profit website
12. Which of the following refers to the violation of the principle if a computer is no more
accessible?
A. Access control
B. Confidentiality
C. Availability
D. Integrity
14. In the CIA Triad, which one of the following is not involved?
A. Availability
B. Confidentiality
C. Authenticity
D. Integrity
15. In order to ensure the security of the data/ information, we need to ____________ the data.
A. Delete
B. Decrypt
C. Encrypt
D. Compress
16. A ____________ can be a hardware device or a software program that filters all the packets of
data that comes through a network, the internet, etc.
A. Antivirus
B. Firewall
C. Malware
D. Cookies
17. The DNS would translate any Domain name into ___________.
A. IP
B. URL
C. Binary
D. Hex
20. Cyber terrorism belongs to which one of the following cyber crimes.
A. Society
B. Individual
C. Property
D. Organisation
21. The security that protects the software and devices from unwanted threats is known as ______.
A. Network security
B. Data security
C. Application security
D. Cloud security
22. A malicious software that secretly records information about user activities on their system is
known as _______.
A. Virus
B. Trojan horse
C. Adware
D. Spyware
23. Which one of the following cyber attack in which sender seems to be from genuine organization?
A. Phishing
B. Denial of Service
C. Brute force
D. Man-in-the-middle
24. Which of the following tips are suggested to avoid cyber attack?
A. Use strong passwords
B. Don’t open suspicious mails
C. Periodic data backup
D. All of these
27. A threat to an organization's security or data that comes from within is called ________.
A. Hacktivists
B. Cyber criminals
C. State-sponsored attackers
D. Insider threats
28. Grey hat hacking is Legal.
A. TRUE
B. FALSE
33. Which is a malicious code that is installed in the host machine by pretending to be useful
software?
A. Virus
B. Trojan Horse
C. Spam
D. Scareware
34. The process of converting plain text into cipher text is known as ______.
A. Decoding
B. Decryption
C. Encryption
D. Authentication
36. Protecting information and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction is know as _________.
A. Physical Security
B. Border Security
C. Information Security
D. Organisation Security
38. _______________ is a malicious code that is installed in the host machine by pretending to be
useful software.
A. Virus
B. Trojan Horse
C. Spam
D. Scareware
39. Which of the following is used to read HTML Code and to render Webpage?
A. Web Server
B. Web matrix
C. Web Browser
D. None of these
41. _________ is an activity which involves injecting a malicious client side script into a trusted
website.
A. Web-Jacking
B. Computer Vandalism
C. Spamming
D. Cross Site Scripting
42. Special program which can detect and remove viruses from computer is called ___________.
A. Malware
B. Antivirus
C. Virus
D. Groupware
43. This is a technique where every possible combination of letters, numbers and symbols in an
attempt to guess the password.
A. DOS Attack
B. DDOS Attack
C. Brute-Force Attack
D. Dictionary Attack
48. __________ deals with the procedure for determining the level of access that each individual
has within an organization.
A. Operational Security
B. Identity Management
C. Netwrok Security
D. Application Security
49. Which one of the following ensures the originality of data and tamper-free?
A. Confidentiality
B. Integrity
C. Authenticity
D. Availability
50. ___________ is a software that secretly records information about user activities on their
system.
A. Ransomware
B. Scareware
C. Spyware
D. Trojan Horse
53. Access social networking sites using ____________ protocol to safeguard your username,
password and other information you post.
A. HTTP
B. HTTPS
C. FTP
D. SNMP
54. __________ is a type of attack that allows an attacker to intercept the connection between
client and server.
A. Piggybacking
B. Cyber Hijacking
C. Eavesdropping
D. Phishing
55. Which group of hackers who carry out malicious activity to promote a political agenda, religious
belief, or social ideology?
A. Cyber Criminals
B. Hacktivists
C. State-sponsored attackers
D. Insider Threats
63. Which of the following is NOT a valid mean of authentication for interoperable transactions?
A. Aadhaar + Biometric
B. Magnetic stripe card + Bank PIN
C. Magnetic stripe card + OTP
D. Aadhaar + Bank Pin
64. An ______________ attack is an attack in which an adversary successfully assumes the identity
of one of the legitimate parties in a system or in a communications protocol.
A. Phishing
B. Vishing
C. Pharming
D. Impersonation
66. In this type of physical social engineering, the attacker acts like someone else to trap the victim.
A. Piggybacking
B. Eavesdropping
C. Dumpster Driving
D. Impersonation
67. In this types of physical social engineering, attacker can gain information by hearing a discussion
between two people, or by reading emails and listening to telephonic conversation.
A. Piggybacking
B. Eavesdropping
C. Dumpster Driving
D. Impersonation
68. It is not important to have your operating system up to date with the latest updates and security
patches.
A. True
B. False
69. The decoding of the complex code to original text using key is known as ___________.
A. Decryption
B. Encryption
C. Steganography
D. Digital signature
70. _____________ is a process of identifying an individual and ensuring that the individual is the
same who he/she claims to be.
A. Authorization
B. Authentication
C. Affiliation
D. Identification
72. The process of giving access to an individual to certain resources based on the credentials of an
individual is known as ______________.
A. Authorization
B. Authentication
C. Affiliation
D. Identification
73. Biometric data can be used in conjunction with username and password for two-way
authentication.
A. True
B. False
76. It is a technique of hiding secret messages in a document file, image file, and program or
protocol etc. such that the embedded message is invisible and can be retrieved using special
software.
A. Digital Signature
B. Encryption
C. Validation
D. Steganography
77. _______ provides a digital interface that enables applications or components of applications to
communicate with each other over the internet or via a private network.
A. Firewall
B. API
C. Router
D. Switch
78. __________ refers to a security flaw that has been discovered by a threat actor but is unknown
to the enterprise and software vendor.
A. Misconfigured Software
B. Poor Password Management
C. Zero Day Vulnerability
D. Unauthorized Access Control
81. ____________ safeguards include the activities like guidelines, trainings, manual controls and
planning measures.
A. Physical
B. Administrative
C. Technical
D. Protective
82. Which of the following is not a part of Cyber Security?
A. Physical
B. Administrative
C. Technical
D. Protective
83. Which of the following safeguards categorized based on the perspective of time?
A. Physical
B. Administrative
C. Technical
D. Preventive
84. ___________ safeguards become effective while the event(Cyber Attack) occurs.
A. Detective
B. Preventive
C. Technical
D. Corrective
85. ___________ is a small electronic text file stored on your hard drive.
A. Cache
B. Cookie
C. Firewall
D. Antivirus
86. _________ involves tricking a victim into making a request that utilizes their authentication or
authorization.
A. Cross-site Scripting
B. Cross-site request forgery
C. Page Scrapping
D. Credential Stuffing
90. __________ alerts the system administrator in the case when someone tries to break in the
firewall security.
A. IDS
B. IPS
C. ANTIVIRUS
D. None of these
91. IPS stands for ________.
A. Inspector of Police Service
B. Indian Police Service
C. Intrusion Prevention System
D. Intrusion Policy Security
92. When IPS detects unusual network activity and assumes it is malicious, it may be a false positive,
resulting in a DoS attack on an innocent user.
A. True
B. False
93. Which of the following IPS works based on the pattern of the attack?
A. Signature based
B. Policy based
C. Anomaly based
D. Host based
94. _______ is a built-in software package that monitors a single host for suspicious behavior by
examining events that take place on that host.
A. NIPS
B. WIPS
C. NBA
D. HIPS
96. Cyber Laws are enacted not only to monitor and prevent any immoral or illegal activities of
humans, also to give legal recognition to the legitimate users.
A. True
B. False
98. ___________ a type of intellectual property that protects original works of authorship.
A. Patent
B. Copyright
C. Trademark
D. Geographical Indication
99. __________ is the process of extracting data as proof for a crime, which involves electronic
media.
A. Cyber Forensics
B. Computer Forensics
C. Digital Forensics
D. All of these
101. __________ examines the malware like trojans to identify the hacker involved behind the crime.
A. Network Forensics
B. Email Forensics
C. Mobile Forensics
D. Malware Forensics
102. __________ extracts data from storage media by searching modified, active, or deleted files.
A. Network Forensics
B. Disk Forensics
C. Mobile Forensics
D. Malware Forensics
103. Reverse Stegnography is one of the techniques used by Cyber Forensic Investigators to analyze
the data and find a relation with the crime.
A. True
B. False
105. Communication Skill is not mandatory for a good cyber forensic expert.
A. True
B. False
107. _________ is a cybersecurity practice where you run code, observe and analyze and code in a
safe, isolated environment on a network that mimics end-user operating environments.
A. Skimming
B. Pharming
C. Sandboxing
D. Phishing
110. The proper configuration of domain names and IP addresses can keep Firewall secure.
A. True
B. False
111. ___________ enables organizations to determine which traffic is allowed to flow in and out of
each zone.
A. Domain Names
B. IP Addresses
C. Access Control Lists
D. Firewall Zones
112. ___________ is a security exercise where a cyber-security expert attempts to find and exploit
vulnerabilities in a computer system.
A. Penetration testing
B. Vulnerability Scanning
C. Sandboxing
D. Piggybacking
115. Rules of conduct for respectful and appropriate communication on the internet are referred to
as ________.
A. Etiquette
B. Net Behaviour
C. Netiquette
D. Code of Conduct
117. IMO Resolution MSC.428(98) came into effect from January ______.
A. 2019
B. 2020
C. 2021
D. 2022
118. Netiquette onboard refers to the practice of __________ by the crew members.
A. Using unique and distinct paswwords
B. Reporting to Captain when suspicious activity was found
C. Using Secure Wi-Fi connections
D. All of these