You are on page 1of 4

1.

IoT refers to
a. Internet of Things
2. How can you tell if a website encrypts its traffic?
b. Look for the lock symbol in a URL
3. A Computer on Internet is uniquely indentified by
c. IP Address
4. From the given options, which of them is not a vulnerability to information security
d. Flood
5. The device used by Banks to automatically read those special numbers on the bottom of the
cheques is
b. MICR

6. Pretty Good Privacy (PGP) is used in


a. E-Mail Security
7. To protect a computer from virus, you should install ____ in your computers
c. Anti virus
8. Is it save to install apen drive that you find on the roadside directly in your system
c. Never
9. Which of the following is not an example of physical data leakage?
d. Phishing
10. Encryption is done at sender site and decryption is done at ______
d. receiver site
11. Which of the following usually observe each activity on the internet of the victim, gather
information in the background, and send it to someone else?
b. Spyware
12. What does”whaling” refers to in online fraud
c. Targeting high level executives of companies
13. Is it safe to download movies from the torrent and other sites
b. No
14. What is Obfuscation?
c. technique to hide IP addresses
15. What is Salting?
a. Extends the length of passwords by adding some special characters to the original
password.
16. Why would a hacker use a proxy server?
b. To hide malicious activity on the network
17. Which of the following details can be shared over phone whenever you receive calls stating
from Bank’s or any other support team?
d. None of the above
18. ______ focuses on the detection & prevention of sensitive date exfiltration and lost data.
c. Data loss prevention
19. In ______ phase, the hackers try to hide their footprints
b. Covering Tracks
20. Which one of the following statements is correct about Email security in the network
security methods?
c. Phising is one of the most commonly used methods that are used by hackers to
gain access to the Network
21. Connection or link to other documents or Web Pages that contain related information is
called
c. Hyperlink
22. ______ monitors user activity on internet and transmit the information in the background to
someone else.
b. Spyware
23. What is a Zombie
a. A Compromised system used to launch a DDoS attack
24. Why would HTTP tunneling be used?
c. To bypass a firewall
25. Which international organization is central repository of IP Address and manages supply of
IP Addresses.
b. ICANN
26. MAC Operating Sytsem is developed by which company
b. Apple
27. What is used to store session information?
a. cookie
28. Which one is volatile memory in computer system?
b. RAM
29. Passwords, paraphrases and PIN’s are example of which security term?
c. Authentication
30. Which of the following is an antivirus program?
a. Trend Micro. B. Norton. C. McAfee d. All the above
31. Which of the following is used to protect data and passowrds?
c. Encryption
32. Cyber Security in the organization is the responsibility of?
a. Everyone in the organization.
33. Which of the following UNIX account provides all types of privileges and rights which one can
perform administrative functions?
b. root.
34. Pretty Good Privacy is used in?
a. Email security
35. ______ is commonly used technological medium for the spread of malware and phishing attacks?
d. Email
36. What does the https:// at the beginning of a URL denote as opposed to http://?(without the s)?
b. That information in a site is encrypted
37. The integrity component provides which feature of the CIA triad?
a. Verification that information is accurate
38. Potential weaknesses in IT infrastructure through which a cyber attack might occur is called?
c. vulberability
39. In which attack the hacker hides the actual UI where victim is supposed to click?
b. Clickjacking.
one 40. How can you tell if a website encrypts traffic?
b. Look for the lock symbol in a URL
41. Which among the below is not a correct example of multi factor authentication?
d. Entering PIN for a card transaction while withdrawing money at ATM
42. In the CIA Triad which one of the following is not involved?
c. Authenticity
43. What is the existence of weakness in a system or network is known as?
c. vulnerability
44. Criminal minded individuals who work for terrorist organizations and steal information of nations
and other secret intelligence making a cyber crime are_______?
b. Cyber Terrorists
45. Which of the following do Cyber attackers commonly target for fetching IP address of a target or
victim user?
c. websites
46. On a smartphone which of these app may not require camera access of phone?
a. SMS Apps. B. Dictionary Apps. c. Payment Apps d. Both A and B
47. Key logger is a ___________
b. Spyware
48. What type of attack has an organization experienced when an employee installs an unauthorized
device on the network to view network traffic?
b. spoofing
49. Which of the following systems cannot be considered as an example of the operating systems?
a. Windows b. Red HAT Linux c. BSD Linux. d. Microsoft office
50. _________ is the entity for issuing digital certificates?
a. Certificate Authority
51. 1024 bit is equal to hoW many byte?
a. 1 Byte
52. Which of the following is afake network designed to tempt intruders with unpatched and
unprotected security vulnerabilities and false data?
B Honey Pot
53. What is the name of the software that generates revenue by generating annoying pop ups?
d. adware
54. What is the process of investigating a computer system for information relating to a security
incident?
a. Computer Forensics
55. An intrusion detecytion system is primarily designed to perform what function?
a. Detect abnormal activity
56. Data must arrive exactly as it wa sent to receiver from sender, its called
a. Message Integrity
57. Which of the following updates are very specific and targeted toward an exact problem?
c. Patch
58. Hackers use a computer virus for _______ purpose?
a. To log, monitor user’s keystroke b. To gain access to the sensitive information like user’s ID and
passwords. C. To corrupt the data stored in the computer system. D. All the above
59. What is most valuable to companies looking to sell you something?
a. Your phone number b. Your email address. C. Your physical address. D All the above
60. __________ is the action of recording the keys struck on a keyboard?
a. Keystroke logging
61. Which one of the following statements is correct about email security in the network security
method?
a. One has to deploy sophisticated hardware for email security
62. Which of the following details can be shared over phone whenever you receive calls stating from
banks or any other support team?
a. Account number b. CVV number c. Card expiry details. D. None of the above
63. Which of the following is the best answer for how to secure your router?
Aa. Change the default name and password of the router b. Turn off the router’s remote management.
C. Log out as the administrator once the router is set up d. All of the above

You might also like