You are on page 1of 6

Cyber Security and Digital Forensics

I MID - Objective Questions and Answers


1. Data encryption is primarily used to ensure confidentiality.
True
False

2. Identify the oldest phone hacking technique used by hackers to make free calls.
A. Spamming
B. Phreaking
C. Cracking
D. Phishing

3. Choose among the following techniques, which are used to hide information inside a
picture.
A. Image rendering
B. Steganongraphy
C. Rootkits
D. Bitmapping

4. Identify the class of computer threats.


A. Phishing
B. DOS attack
C. Soliciting
D. Both B and C

5. Which software is mainly used to help users detect viruses and avoid them?
A. Antivirus
B. Adware
C. Malware
D. None of the above

6. Which of the following tool is used in Wi-fi hacking?


A. Wireshark
B. Aircrack-ng
C. Norton
D. None

7. Which of the following is considered an element of cyber security?


A. Network security
B. Operational security
C. Application security
D. All of the above
8. Which of the following is considered as the unsolicited commercial email?
A. Virus
B. Malware
C. Spam
D. All of the above

9. In which of these a person is continually chased/followed by another person or a


group of various people?
a. Identity theft
b. Stalking
c. Bullying
d. Phishing

10. A ____________ can be a hardware device or a software program that filters all
the packets of data that comes through a network, the internet, etc. // Firewall
11. Which of these is also malicious software?
a. Badware
b. Malicious Ware
c. Malware
d. Ilegalware

12. Using the cipher algorithm, which of these types of text would be transformed?
a. Plain text
b. Scalar text
c. Complex text
d. Transformed text

13. Which of the following malware types does not clone or replicate itself through
infection?
a. Viruses
b. Worms
c. Trojans
d. Rootkits

14. Botnets are managed by ______________


(a) Bot-holders
(b) Bot-herders
(c) Bot-trainers
(d) Bot-creators

15. The attacker using a network of compromised devices is known as


_____________
a) Internet
b) Botnet
c) Telnet
d) D-net
16. Which of the following is a form of DoS attack?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
17. Packet sniffers involve ____________
a) Active receiver
b) Passive receiver
c) Legal receiver
d) Partially-active receiver
18. Sniffers can be prevented by using _______________
a) Wired environment
b) WiFi
c) Ethernet LAN
d) Switched network
19. System hacking involves password hacking as one of the major hacking
methodologies.
a) True
b) False
20. Which of the following is an example of passive online attack?
a) Phishing
b) Social Engineering
c) Spamming
d) Wire sniffing
21. Spyware collects user’s personal data & spreads it to______________ data-firms,
or its creator.
a) advertisers
b) dark-market
c) antivirus company
d) share market
22. Which of the following activity is not done by spyware?
a) sell internet usage data
b) capture credit card details
c) user’s personal identity
d) steal signature of the different virus
23. Spyware is not a powerful & one of the most widespread threats on the internet.
a) True
b) False
24. ____________ records all your key-strokes, chat-room dialogs, program run in your
system, and system details. // system monitors
25. ____________ works in background and steals sensitive data. //trojan
26. Some Trojans carry ransomware with them to encrypt the data and ask for ransom.
a) True
b) False
27. A _______________ provides malicious users remote control over the targeted computer.
//backdoor trojan
28. A computer ________ is a malicious code which self-replicates by copying itself to other
programs. //virus
29. Steganography follows the concept of security through obscurity.
a) True
b) False
30. A ________________ tool permits security professional or a hacker to embed hidden
data within a carrier file like an image or video which can later be extracted from them. //
Steganography
31. The main motive for using steganography is that hackers or other users can hide a secret
message behind a ______________
a) special file
b) ordinary file
c) program file
d) encrypted file
32. Sniffing is also known as ___________________
a) network-tapping
b) wiretapping
c) net-tapping
d) wireless-tapping
33. Which of them is not an objective of sniffing for hackers?
a) Fetching passwords
b) Email texts
c) Types of files transferred
d) Geographic location of a user
34. The most commonly used session hijacking attack is the _______________
a) IP hacking
b) IP spooling
c) IP spoofing
d) IP tracking
35. _____________ is done only after the target user has connected to the server. //hijacking
36. Session hijacking takes place at ____________ number of levels. // 2
37. __________ is a code injecting method used for attacking the database of a system or
website // SQl injection
38. Attempting to gain access to a network using an employee’s credentials is called the
_____________ mode of ethical hacking. // Local networking

39. What is the purpose of a Denial of Service attack?


A. Exploit a weakness in the TCP/IP stack
B. To execute a Trojan on a system
C. To overload a system so it is no longer operational
D. To shutdown services by turning them off

40. Sniffing is used to perform ______________ fingerprinting.


A. Passive stack
B. Active stack
C. Passive banner grabbing
D. Scanned

41. Phishing is a form of ____________________.


A. Spamming
B. Identify Theft
C. Impersonation
D. Scanning

42. What are the types of scanning?


A. Port, network, and services
B. Network, vulnerability, and port
C. Passive, active, and interactive
D. Server, client, and network

43. Keyloggers are a form of ______________.


A. Spyware
B. Shoulder surfing
C. Trojan
D. Social engineering
44. Buffer-overflow is also known as ______________

a) buffer-overrun
b) buffer-leak
c) memory leakage
d) data overflow

45. Which of the following is defined as an attempt to harm, damage or cause threat to a
system or network?

a) Digital crime
b) Threats
c) System hijacking
d) Cyber Attack

46. ____Virus__________ is a executable code that is attached to other executable files and
often legitimate program.
47. __Scareware____ is designed to persuade the user to take a specific action based on fear.
48. __Reverse Proxy Server_____placed in front of the webservers to protect, hide, offload
and distribute access to webservers.
49. ___RootKit____is designed to modify the operating system to create a backdoor.
50. _____Vishing_____________ use voice communication to try and gather private
information, such as login credentials, by masquerading as a reputable person.

You might also like