1. What are the features of cyber security?
Answer:
The correct option is D.
Note
The features are as follows:
1. Compliance: Creating a program that meets the requirements and rules of the users.
2. Defense against internal threats: Should provide security against internal exploitation.
3. Threat Prevention: Should be capable of detecting the threat and preventing them.
2. Which of the following is an objective of network security?
Answer:
The correct option is D.
Note
The objectives of network security are Confidentiality, Integrity, and Availability.
Confidentiality: The function of confidentiality is to keep sensitive company information safe from unwanted access. The confidentiality component of network security ensures that data is only accessible to those who are authorized to see it.
Integrity: This goal entails ensuring and preserving data accuracy and consistency. The purpose of integrity is to ensure that data is accurate and not tampered with by unauthorized individuals.
Availability: The purpose of availability in Network Security is to ensure that data, network resources, and services are always available to legitimate users, whenever they need them.
3. Which of the following is a component of cyber security?
Answer:
The correct option is A.
Note
The Internet of Things (IoT) is a network of physical objects embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems through the internet.
4. Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?
Answer:
The correct option is. C
Note
Enumeration by cyber-attackers is also feasible via websites since attackers target websites in order to obtain the victim’s or target user’s IP address.
5. Which of the following is defined as an attempt to harm, damage or cause threat to a system or network?
Answer:
The correct option is. D
Note
Extortion, identity theft, email hacking, digital surveillance, stealing hardware, mobile hacking, and physical security breaches are all examples of cyber assaults or activities.
6. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
Answer:
The correct option is. B
Note
Black Hat hackers, often known as “crackers,” are a sort of cyber crime that gain illegal access to a user’s account or system in order to steal confidential data or introduce malware into the system for personal gain or to harm the company.
7. IT security in any firm or organization is maintained and handled by ____________________
Answer:
The correct option is.D
Note
This is a position in a company or organisation where an individual develops and maintains different systems and security tools for the company or organisation to which he or she belongs.
8. Where did the term “hacker” originate?
Answer:
The correct option is. A
Note
The term “hacker” was coined at MIT (Massachusetts Institute of Technology) because individuals and highly competent professionals use computer languages to address various challenges. In this context, labels such as geeks and nerds have been coined.
9. Which of the following term refers to a group of hackers who are both white and black hat?
Answer:
The correct option is. B
Grey Hat Hackers are a hybrid of ethical and unethical hacker personalities. They hack other people’s computers for fun, but they don’t hurt them, and they exploit network faults and vulnerabilities without the admin or owner’s awareness.
Note
10. Which of the following can diminish the chance of data leakage?
Answer:
The correct option is.A
Note
Ordinary files are targeted by hackers or other cyber criminals in order to disguise distinct data or information within another data file. You can reduce the risk of data leaking by employing steganography.
11. _____ can be used to preserve the integrity of a document or a message.
Answer:
The correct option is.C
Note
Message Digest
12. The physical form of money is converted into
Answer:
The correct option is.A
Note
Binary form
13. Conventional encryption also referred to as
Answer:
The correct option is. B
Note
single key encryption
14. Protocols refers to
Answer:
The correct option is. A
Note
15. Rules and methods
15. Which of the following is a Stuxnet?
Answer:
The correct option is. C
Stuxnet is a popular and powerful worm that came into existence in mid 2010, which was very powerful as it was accountable for the cause of huge damage to Iran’s Nuclear program. It mainly targets the PLCs (Programmable Logic Controllers) in a system.
Note
16. Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?
Answer:
The correct option is.A
OS fingerprinting is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer. OS Fingerprinting is the practice of examining data packets that come from a network in order to extract intelligence that may be utilized in future assaults.
Note
17. Which of the following is the least strong security encryption standard?
Answer:
The correct option is. D
Wireless security is an important aspect of cyber-security. Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2, and WPA3 are the most common kinds of wireless security. WEP is a famously insecure encryption protocol.
Note
18. Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.
Answer:
The correct option is. A
Note
Phishing is a type of cybercrime in which a person is digitally persuaded to disclose private information. Phishing comes in a variety of forms. Some of them employ malware and emails to divert users to various websites.
19. Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?
Answer:
The correct option is.
Note
Pharming is a strategy and approach used by cybercriminals to create phony web pages and sites in order to mislead users into giving over personal information such as login IDs and passwords.
20. Which of the following is not a type of peer-to-peer cyber-crime?
Answer:
The correct option is. C
Note
Peer-to-peer includes phishing, as well as the distribution of Trojans and worms to individuals. The leakage of a huge number of people’s credit card data on the deep web, on the other hand, is classified as a computer-as-weapon cyber-crime.
21. Which of the following online service’s privacy cannot be protected using Tor?
Answer:
The correct option is. C
Note
Login using ID will obviously take your ID in order to access your account and is not the headache of Tor. Privacy regarding instant messaging, browsing data, relay chats are some of the following online services protected by Tor.
22. Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack?
Answer:
The correct option is.A
Note
Botnets on infected mobile devices are waiting for orders from their owners. It starts a DDoS flood attack after receiving the owner’s instructions. As a result, calls are not connected or data is not sent.
23. A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
Answer:
The correct option is.B
Note
The excess data that contains certain specific instructions in the memory for actions are projected by a cyber-criminal or penetration tester to break the system in a buffer-overflow attack.
24. What is the existence of weakness in a system or network is known as?
Answer:
The correct option is. C
Note
Vulnerability is a term that refers to a weakness in a network or system that an attacker may exploit. Exploiting a weakness in security might have unintended and undesirable consequences.
25. Which of the following is not a step followed by cyber-criminals in data breaching?
Answer:
The correct option is. D
During a hack, cyber-criminals first do research on the target, gathering data about the victim’s system and network. Then go ahead and attack. Once the attacker has gained access, he or she takes sensitive information.
Note