Test Series - cyber security

Test Number 4/13

Q: What is legal form of hacking known as?
A. Hactivism
B. Cracking
C. Non ethical Hacking
D. Ethical hacking
Solution: Ethical hacking is a type of hacking used by white-hat hackers to conduct penetration testing and discover possible dangers in businesses and organisations.
Q: Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence making a cyber crime are _________
A. Red Hat Hackers
B. Cyber Terrorists
C. State sponsored hackers
D. Blue Hat Hackers
Solution: Cyber terrorists are highly skilled programmers and cyber criminals who conceal their identities and trails of activity while carrying out harmful operations via the internet. They are paid to obtain unauthorized access to a country’s data centers or to break into the intelligence agencies’ network.
Q: Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.
A. MiTM attack
B. Phishing attack
C. Website attack
D. DoS attack
Solution: Phishing is a type of cybercrime in which a person is digitally persuaded to disclose private information. Phishing comes in a variety of forms. Some of them employ malware and emails to divert users to various websites.
Q: ______________ is not a step followed by cyber-criminals in data breaching.
A. Exfiltration
B. Research and info-gathering
C. Attack the system
D. Fixing the bugs
Solution: During a hack, cyber-criminals first do research on the target, gathering data about the victim’s system and network. Then go ahead and attack. Once the attacker has gained access, he or she takes sensitive information.
Q: What is the full form of Malware?
A. Malfunctioning of Security
B. Malicious Software
C. Malfunctioned Software
D. Multipurpose Software
Solution: Malware refers to a variety of malicious software and applications that can represent a threat to a system, network, or anything else in cyberspace. Viruses, Trojans, Ransomware, spyware, worms, rootkits, and other types of malware are examples of prevalent malware.
Q: Philip Zimmerman released ____________ in 1991, and it is a sophisticated encryption tool.
A. Data Encryption Standard
B. Pretty Good Privacy
C. Protected Good Privacy
D. Advanced Encryption Standard
Solution: This encryption program package known as PGP (Pretty Good Privacy) has grown in popularity around the world because it aids in data communication authentication as well as privacy protection through cryptographic algorithms that encrypt and decrypt plain texts (in emails and files) to cipher texts and vice versa.
Q: The ___________ term refers to a group of hackers who are both white and black hat.
A. Yellow Hat hackers
B. Grey Hat hackers
C. Red Hat Hackers
D. White-Black Hat Hackers
Solution: Grey Hat Hackers are a hybrid of ethical and unethical hacker personalities. They hack other people’s computers for fun, but they don’t hurt them, and they exploit network faults and vulnerabilities without the admin or owner’s awareness.
Q: _________ is broadly known as CIA triad.
A. AIC (Authenticity, Integrity, Confidentiality)
B. AIN (Availability, Integrity, Non-repudiation)
C. NIC (Non-repudiation, Integrity, Confidentiality)
D. AIC (Availability, Integrity, Confidentiality)
Solution: Because people get confused with the acronym with the abbreviation and the secret agency name Central Intelligence Agency, the CIA Triad has been renamed AIC (Availability, Integrity, Confidentiality) Triad.
Q: Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?
A. OS fingerprinting
B. OS penetration testing
C. Digital-printing
D. Footprinting
Solution: OS fingerprinting is an ethical hacking technique used for determining what operating system (OS) is running on a remote computer. OS Fingerprinting is the practice of examining data packets that come from a network in order to extract intelligence that may be utilized in future assaults.
Q: Under which IT Act does misuse of digital signatures for fraudulent purposes come?
A. section 72
B. section 68
C. section 78
D. section 65
Solution: Misuse of digital signatures is a frequent kind of cybercrime perpetrated by cybercriminals and black hat hackers. Section 72 of the Indian Information Technology Act governs this fraudulent act.

You Have Score    /10