Which of the following is considered as the unsolicited commercial email?

A.    Virus

B.     Malware

C.     Spam

D.    All of the above

Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?

A.    Malware

B.     Spyware

C.     Adware

D.    All of the above

_______ is a type of software designed to help the user's computer detect viruses and avoid them.

A.    Malware

B.     Adware

C.     Antivirus

D.    Both B and C

Which one of the following is a type of antivirus program?

A.    Quick heal

B.     Mcafee

C.     Kaspersky

D.    All of the above

It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______:

A.    Antivirus

B.     Firewall

C.     Cookies

D.    Malware

A.    Work factor

Which of the following is a type of independent malicious program that never required any host program?

A.    Trojan Horse

B.     Worm

C.     Trap Door

D.    Virus

Which of the following usually considered as the default port number of apache and several other web servers?

A.    20

B.     40

C.     80

D.    87

DNS translates a Domain name into _________

A.    Hex

B.     Binary

C.     IP

D.    URL

In the CIA Triad, which one of the following is not involved?

A.    Availability

B.     Confidentiality

C.     Authenticity

D.    Integrity

In an any organization, company or firm the policies of information security come under__________

A.    CIA Triad

B.     Confidentiality

C.     Authenticity

D.    None of the above

Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the fundamentals?

A.    They help in understanding the hacking process

B.     These are the main elements for any security breach

C.     They help to understand the security and its components in a better manner

D.    All of the above

In order to ensure the security of the data/ information, we need to ____________ the data:

A.    Encrypt

B.     Decrypt

C.     Delete

D.    None of the above

Which one of the following is considered as the most secure Linux operating system that also provides anonymity and the incognito option for securing the user's information?

A.    Ubuntu

B.     Tails

C.     Fedora

D.    All of the above

Which type following UNIX account provides all types of privileges and rights which one can perform administrative functions?

A.    Client

B.     Guest

C.     Root

D.    Administrative

Which of the following is considered as the first hacker's conference?

A.    OSCON

B.     DEVON

C.     DEFCON

D.    SECTION

Which of the following known as the oldest phone hacking techniques used by hackers to make free calls?

A.    Phreaking

B.     Phishing

C.     Cracking

D.    Spraining

In which of the following, a person is constantly followed/chased by another person or group of several peoples?

A.    Phishing

B.     Bulling

C.     Stalking             

D.    Identity theft

Which of the following technique is used to verify the integrity of the message?

A.    Message digest

B.     Digital signature

C.     Decryption algorithm

D.    Protocol

Which of the following principle is violated if computer system is not accessible?

A.    Confidentiality

B.     Availability

C.     Access Control

D.    Authentication

The certificate Authority signs the digital certificate with

A.    User's public key

B.     User's Private Key

C.     It's own public key

D.    It's own Private key

The number of users on a network has the greatest impact on the network's _______

A.    Performance

B.     Reliability

C.     Security

D.    none of the above

Network failure is primarily a _______ issue.

A.    Performance

B.     Reliability

C.     Security

D.    none of the above

_______ is a network reliability issue.

A.    The number of users

B.     The type of transmission medium

C.     The frequency of failure

D.    Unauthorized access

_______ is a network reliability issue.

A.    Catastrophe

B.     The number of users

C.     The type of transmission medium

D.    Unauthorized access

Unauthorized access is a network _______ issue.

A.    Performance

B.     Reliability

C.     Security

D.    none of the above

A virus is a network _______ issue.

A.    Performance

B.     Reliability

C.     Security

D.    none of the above

Encryption techniques improve a network's _______

A.    Performance

B.     Reliability

C.     Security

D.    Longevity

A _______ is illicitly introduced code that damages a network device

A.    Protocol

B.     Virus

C.     Catastrophe

D.    Medium

Passwords are used to improve the _______ of a network.

A.    Performance

B.     Reliability

C.     Security

D.    Longevity

Which one of the following can be considered as the class of computer threats?

A.    Dos Attack

B.     Phishing

C.     Soliciting

D.    Both A and C

Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?

A.    Piracy

B.     Plagiarism

C.     Intellectual property rights

D.    All of the above

Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?

A.    Cyber low

B.     Cyberethics

C.     Cybersecurity

D.    Cybersafety

Which of the following refers to the violation of the principle if a computer is no more accessible?

A.    Access control

B.     Confidentiality

C.     Availability

D.    All of the above

Which one of the following refers to the technique used for verifying the integrity of the message?

A.    Digital signature

B.     Decryption algorithm

C.     Protocol

D.    Message Digest

Which one of the following usually used in the process of Wi-Fi-hacking?

A.    Aircrack-ng

B.     Wireshark

C.     Norton

D.    All of the above

Which of the following port and IP address scanner famous among the users?

A.    Cain and Abel

B.     Angry IP Scanner

C.     Snort

D.    Ettercap

In ethical hacking and cyber security, there are _______ types of scanning:

A.    1

B.     2

C.     3

D.    4

Which of the following is not a type of scanning?

A.    Xmas Tree Scan

B.     Cloud scan

C.     Null Scan

D.    SYN Stealth

In system hacking, which of the following is the most crucial activity?

A.    Information gathering

B.     Covering tracks

C.     Cracking passwords

D.    None of the above

Which one of the following is actually considered as the first computer virus?

 

A.    Sasser

B.     Blaster

C.     Creeper

D.    Both A and C

To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.

A.    Antivirus

B.     Firewall

C.     Vlc player

D.    Script

Code Red is a type of ________

A.    An Antivirus Program

B.     A photo editing software

C.     A computer virus

D.    A video editing software

Which of the following can be considered as the elements of cyber security?

A.    Application Security

B.     Operational Security

C.     Network Security

D.    All of the above

Which one of the following is also referred to as malicious software?

A.    Maliciousware

B.     Badware

C.     Ilegalware

D.    Malware

Hackers usually used the computer virus for ______ purpose.

A.    To log, monitor each and every user's stroke

B.     To gain access the sensitive information like user's Id and Passwords

C.     To corrupt the user's data stored in the computer system

D.    All of the above

In Wi-Fi Security, which of the following protocol is more used?

A.    WPA

B.     WPA2

C.     WPS

D.    Both A and C

The term "TCP/IP" stands for_____

A.    Transmission Contribution protocol/ internet protocol

B.     Transmission Control Protocol/ internet protocol

C.     Transaction Control protocol/ internet protocol

D.    Transmission Control Protocol/ internet protocol

The response time and transit time is used to measure the ____________ of a network.

A.    Security

B.     Longevity

C.     Reliability

D.    Performance

Which of the following factor of the network gets hugely impacted when the number of users exceeds the network's limit?

A.    Reliability

B.     Performance

C.     Security

D.    Longevity

In the computer networks, the encryption techniques are primarily used for improving the ________

A.    Security

B.     Performance

C.     Reliability

D.    Longevity

When was the first computer virus created?

A.    1970

B.     1971

C.     1972

D.    1969

Which of the following is considered as the world's first antivirus program?

A.    Creeper

B.     Reaper

C.     Tinkered

D.    Ray Tomlinson

Which of the following principle of cyber security restricts how privileges are initiated whenever any object or subject is created?

A.    Least privilege

B.     Open-Design

C.     Fail-safe Defaults

D.    None of the above

Which of the following can also consider as the instances of Open Design?

A.    CSS

B.     DVD Player

C.     Only A

D.    Both A and B

Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it?

A.    Least common mechanism

B.     Compromise recording

C.     Psychological acceptability

D.    Work factor

The term "CHAP" stands for __________

A.    Circuit Hardware Authentication Protocols

B.     Challenge Hardware Authentication Protocols

C.     Challenge Handshake Authentication Protocols

D.    Circuit Handshake Authentication Protocols

Which type of the following malware does not replicate or clone them self's through infection?

A.    Rootkits

B.     Trojans

C.     Worms

D.    Viruses

Which of the following malware's type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.

A.    RATs

B.     Worms

C.     Rootkits

D.    Botnets

Which of the following is just opposite to the Open Design principle?

B.     Security through obscurity

C.     Least common mechanism

D.    Least privileges

Name of the Hacker who breaks the SIPRNET system?

A.    John Draper

B.     Kevin Mitnick

C.     John von Neumann

D.    Kevin Poulsen

Which of the following is an anti-virus program

A.    Norton

B.     K7

C.     Quick heal

D.    All of these

All of the following are examples of real security and privacy threats except:

A.    Hackers

B.     Virus

C.     Spam

D.    Worm

  _____________ monitors user activity on internet and transmit that information in the background to someone else.

A.    Malware

B.     Spyware

C.     Adware

D.    None of these

Viruses are __________.

A.    Man made

B.     Naturally occur

C.     Machine made

D.    All of the above

Firewall is a type of ____________.

A.    Virus

B.     Security threat

C.     Worm

D.    None of the above

Unsolicited commercial email is known as ____________.

A.    Spam

B.     Malware

C.     Virus

D.    Spyware

Which of the following is not an external threat to a computer or a computer network

A.    Ignorance

B.     Trojan horses

C.     Adware

D.    Crackers

Exploring appropriate and ethical behaviours related to online environments and digital media.

A.    Cyber ethics

B.     Cyber security

C.     Cyber safety

D.    Cyber law

Which of the following is digital certificate standard?

A.    X.508

B.     X.509

C.     D.509

D.    None of the Above