Test Series - cyber security

Test Number 2/13

Q: Which of the following is not an advantage of cyber security?
A. Makes the system slower
B. Minimizes computer freezing and crashes
C. Gives privacy to users
D. Protects system against viruses
Solution: The advantages are minimization of computer freezing and crashes, user privacy, and protection against viruses, worms, etc. Disadvantages include the system becoming slow, configuring firewalls correctly can be difficult, need to update the new software in order to keep security up to date.
Q: “Cyberspace” was coined by _________
A. Richard Stallman
B. William Gibson
C. Andrew Tannenbaum
D. Scott Fahlman
Solution: William Gibson, an American-Canadian fiction pioneer, and coiner, examined the many streams of technology and invented the word “cyberspace” in 1821. The phrase refers to linked technologies that aid in information exchange, interaction with digital devices, storage and digital entertainment, computer and network security, and other information technology-related matters.
Q: In ____________ hacking became a practical crime and a matter of concern in the field of cyber technology.
A. 1991
B. 1983
C. 1970
D. 1964
Solution: In the case of hackers in the 1970s, hackers and cyber thieves found out how wired technologies operate and how they might be abused to obtain a competitive edge or misuse the technology.
Q: Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______
A. Nation / State sponsored hackers
B. CIA
C. Special Hackers
D. Government Hackers
Solution: Nation / State-sponsored hackers are those who are engaged or paid by a nation’s or state’s government to safeguard the country from cyber terrorists and other groups or individuals, as well as to expose their plans, communications, and activities.
Q: The Computer Fraud & Abuse Act was adopted in the United States in the year _____________
A. 1985
B. 1987
C. 1989
D. 1984
Solution: In 1984, the United States enacted this cyber security policy with the objective of guaranteeing that computer-related crimes are not gone unpunished. This regulation also prohibits unauthorized access to computers and the information they contain.
Q: Which of the following act violates cyber security?
A. Exploit
B. Attack
C. Threat
D. Vulnerability
Solution: A threat is a possible danger that might lead to a security breach and cause harm to the system or network. Vulnerability is a word that refers to a flaw in a network or system that might be exploited by an attacker. Exploiting a security flaw might result in unexpected and unwanted effects. A cyber-attack is an attempt by attackers to alter, delete, steal or expose any specific data by gaining unauthorized access.
Q: Which of the following actions compromise cyber security?
A. Vulnerability
B. Attack
C. Threat
D. Exploit
Solution: A threat is defined as a potential hazard that might result in a breach of security and cause harm to the system or network. Vulnerability is a term that refers to a weakness in a network or system that an attacker may exploit. Exploiting a weakness in security might have unintended and undesirable consequences.
Q: Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?
A. Pharming
B. Website-Duplication
C. Mimicking
D. Spamming
Solution: Pharming is a strategy and approach used by cybercriminals to create phony web pages and sites in order to mislead users into giving over personal information such as login IDs and passwords.
Q: ____________ is not a type of peer-to-peer cyber-crime?
A. MiTM
B. Injecting Trojans to a target victim
C. Credit card details leak in the deep web
D. Phishing
Solution: Peer-to-peer includes phishing, as well as the distribution of Trojans and worms to individuals. The leakage of a huge number of people’s credit card data on the deep web, on the other hand, is classified as a computer-as-weapon cyber-crime.
Q: Gaining Wi-Fi access dishonestly is not a cyber-crime.
A. False
B. True
C. .
D. none
Solution: It is a cyber-crime, according to section 66 of the IT Act of 2000, which was subsequently replaced by more wider and precise legislation (the IT Act of 2008), if anybody accesses anyone’s Wi-Fi network without the owner’s consent or for malevolent purposes.

You Have Score    /10