Home Programming Kids Programming Hardware & Software Hardware & Networking APP security Software Education Kids Study MCQS Download OTHERS Login

Cyber Security Multiple Choice Question MCQ - 2

Categories: APP security APP security

1. The full form of Malware is ___

a) Malfunctioned Software

b) Multipurpose Software

c) Malicious Software

d) Malfunctioning of Security

Answer: c


2. Who deploy Malwares to a system or network?

a) Criminal organizations, Black hat hackers, malware developers, cyber-terrorists

b) Criminal organizations, White hat hackers, malware developers, cyber-terrorists

c) Criminal organizations, Black hat hackers, software developers, cyber-terrorists

d) Criminal organizations, gray hat hackers, Malware developers, Penetration testers

Answer: a


3. ____ is a code injecting method used for attacking the database of a system / website.

a) HTML injection

b) SQL Injection

c) Malicious code injection

d) XML Injection

Answer: b


4. XSS is abbreviated as ____

a) Extreme Secure Scripting

b) Cross Site Security

c) X Site Scripting

d) Cross Site Scripting

Answer: d


5. This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?

a) SQL injection

b) HTML Injection

c) Cross Site Scripting (XSS)

d) Cross Site Request Forgery (XSRF)

Answer: c


6. When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.

a) Database crash attack

b) DoS (Denial of Service) attack

c) Data overflow Attack

d) Buffer Overflow attack

Answer: d


7. Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ______

a) Session Hijacking

b) Session Fixation

c) Cookie stuffing

d) Session Spying

Answer: a


8. Which of this is an example of physical hacking?

a) Remote Unauthorised access

b) Inserting malware loaded USB to a system

c) SQL Injection on SQL vulnerable site

d) DDoS (Distributed Denial of Service) attack

Answer: b


9. Which of them is not a wireless attack?

a) Eavesdropping

b) MAC Spoofing

c) Wireless Hijacking

d) Phishing

Answer: d


10. An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

a) Cyber-crime

b) Cyber Attack

c) System hijacking

d) Digital crime

Answer: b


11. Which method of hacking will record all your keystrokes?

a) Keyhijacking

b) Keyjacking

c) Keylogging

d) Keyboard monitoring

Answer: c


12. _________ are the special type of programs used for recording and tracking user’s keystroke.

a) Keylogger

b) Trojans

c) Virus

d) Worms

Answer: a


13. These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.

a) Malware

b) Remote Access Trojans

c) Keyloggers

d) Spyware

Answer: d


14. Stuxnet is a _____

a) Worm

b) Virus

c) Trojan

d) Antivirus

Answer: a


15. _____ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain.

a) Cyber-warfare

b) Cyber campaign

c) Cyber-terrorism

d) Cyber attack

Answer: c


Top articles
Application Security Interview Questions with Answer Published at:- Do Android phones need antivirus or internet security apps? Published at:- What are ways to increase security and privacy of android app? Published at:- What are some reliable references for mobile app security? Published at:- How can I increase strength of web app security? Published at:- Why is mobile app security crucial in the app development process? Published at:- What are some good cyber security courses for freshers in Delhi NCR? Published at:- What are the benefits of performing cloud app security testing? Published at:- Why is biometrics necessary for mobile app security? Published at:- Why is Mobile App Security Important in App Development? Published at:- What are the Security Issues for Mobile Applications? Published at:- List the various methodologies in Security testing? Published at:- What can financial institutions do for app security? Published at:- Mobile app security crucial in the app development process Published at:- Why Norton Mobile Security Is a Must-Have for Your Smartphone Published at:- 10 Easy Ways to Protect Your Online Privacy Published at:- Exploring Online Antivirus Scans for Android Mobiles Published at:- Exploring the Microsoft Authenticator App Download Published at:- Migrating Google Authenticator App to a New Phone Published at:- Using Google Authenticator on PC Windows 10 Published at:- Using Google Authenticator QR Code Without Your Old Phone Published at:- Microsoft Authenticator App for Android Published at:- Android Smartphone of the Best Free Antivirus Apps Published at:- Google Authenticator App of Closer Look at Generating 2FA Codes Published at:- Cyber Security Multiple Choice Question MCQ - 2 Published at:-

Cyber Security Multiple Choice Question MCQ - 2