Cyber Security Multiple Choice Question MCQ - 2
Categories: APP security APP security
1. The full form of Malware is ___ a) Malfunctioned Software b) Multipurpose Software c) Malicious Software d) Malfunctioning of Security Answer: c 2. Who deploy Malwares to a system or network? a) Criminal organizations, Black hat hackers, malware developers, cyber-terrorists b) Criminal organizations, White hat hackers, malware developers, cyber-terrorists c) Criminal organizations, Black hat hackers, software developers, cyber-terrorists d) Criminal organizations, gray hat hackers, Malware developers, Penetration testers Answer: a 3. ____ is a code injecting method used for attacking the database of a system / website. a) HTML injection b) SQL Injection c) Malicious code injection d) XML Injection Answer: b 4. XSS is abbreviated as ____ a) Extreme Secure Scripting b) Cross Site Security c) X Site Scripting d) Cross Site Scripting Answer: d 5. This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here? a) SQL injection b) HTML Injection c) Cross Site Scripting (XSS) d) Cross Site Request Forgery (XSRF) Answer: c 6. When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place. a) Database crash attack b) DoS (Denial of Service) attack c) Data overflow Attack d) Buffer Overflow attack Answer: d 7. Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ______ a) Session Hijacking b) Session Fixation c) Cookie stuffing d) Session Spying Answer: a 8. Which of this is an example of physical hacking? a) Remote Unauthorised access b) Inserting malware loaded USB to a system c) SQL Injection on SQL vulnerable site d) DDoS (Distributed Denial of Service) attack Answer: b 9. Which of them is not a wireless attack? a) Eavesdropping b) MAC Spoofing c) Wireless Hijacking d) Phishing Answer: d 10. An attempt to harm, damage or cause threat to a system or network is broadly termed as ______ a) Cyber-crime b) Cyber Attack c) System hijacking d) Digital crime Answer: b 11. Which method of hacking will record all your keystrokes? a) Keyhijacking b) Keyjacking c) Keylogging d) Keyboard monitoring Answer: c 12. _________ are the special type of programs used for recording and tracking user’s keystroke. a) Keylogger b) Trojans c) Virus d) Worms Answer: a 13. These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium. a) Malware b) Remote Access Trojans c) Keyloggers d) Spyware Answer: d 14. Stuxnet is a _____ a) Worm b) Virus c) Trojan d) Antivirus Answer: a 15. _____ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain. a) Cyber-warfare b) Cyber campaign c) Cyber-terrorism d) Cyber attack Answer: c