Hi everyone, Here is an opportunity fr y’all. The Digital Adda has launched Cyber Security Certification Quiz & after completing the quiz you get Free Certificate. Get complete details below and apply:
About the Quiz:
Cybersecurity isthe practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
Cyber Security lifecycle consists of five distinct stages, each with its own tasks:
- Assessing: This stage, we look at the actual performance of the organization’s controls and compare it with the desired or potential level of performance.
- Defining a Security Strategy: A strong security strategy does not priorities security and impede productivity.
- Developing a Framework: In this stage, we look at the organization’s ability to meet a variety of regulatory frameworks and data protection standards.
- Implementing Controls: Controls may include a combination of firewalls, intrusion prevention systems (IPS), security information and event management (SIEMs), security operations centers (SOCs), endpoint detection solutions, vulnerability management, security awareness training and much more.
- Auditing: In order to successfully implement a cybersecurity strategy, or information security management system (ISMS), it is essential to carry out a systematic review of the implemented strategy and controls.
Get Cyber SecurityCertification Certificate from The Digital Adda which you can share in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.
Here are the Questions and Answers:
Question 1: Which of the following is not an advantage of cyber security?
- Makes the system slower
- Minimizes computer freezing and crashes
- Gives privacy to users
- Protects system against viruses
Question 2: Which of the following attacks requires a carrier file to self-replicate?
- Trojan
- Virus
- Worm
- Spam
Question 3: Which of the following uses asymmetric key encryption?
- AES
- PGP
- 3DES
- RC5
Question 4: Which of the following offers the strongest wireless signal encryption?
- WEP
- WAP
- WIPS
- WPA
Question 5: Which of the following describes asymmetric key encryption?
- Consists of a private signing key and a public verification key
- The sender and receiver must securely share a key.
- Cannot be used for non-repudiation purposes
- Cannot be used for sender authentication
Question 6: Which of the following is NOT a type of virus?
- Tunneling
- Boot sector
- Macro
- Wrapper
Question 7: A hacker locks out users and encrypts their personal computer files and data, holding it hostage until they agree to pay to the attacker. What is this practice called?
- Browser hijacker
- Ransomware
- Brute-force
Question 8: On the evening news you heard the reporter talking about an Internet threat called a ‘Botnet’. What exactly is a Botnet?
- It is a malicious program that attempts to hide itself, other files, or computer data so they cannot be found on a computer.
- A group of computers running malicious programs that are remotely controlled by cybercriminals.
- A new type of cyber virus spread from China causing havoc around the globe.
Question 9: This type of attack is designed to hinder the normal operation of a website, or other network resource.
- DoS attack
- POS attack
- Phishing
- All of the above
Question 10: What information do you need to set up a wireless access point?
- SSID
- MAC address
- IP address
- ARP
Question 11: Which of the following is NOT a DoS attack?
- Server Spoofing
- PIng Broadcast
- Ping of Death
- Smurf
Question 12: Who is responsible for Cyber Security?
- Technology Information Security Offic
- Developers
- Government
- Everyone
Question 13: When receiving an email from an unknown contact that has a link, you should?
- Open the link to view its content
- Report the suspicious email to TISO
- Forward the email to your co-workers to allow them to open the link first
- Forward the email to your personal email account so you can open it at home
Question 14: What does social engineering mean in a security context?
- Building secure systems that are easy to use for society
- It is a form of social deception focussed on information gathering, fraud, or system access.
- It is a Honeypot
- All of the above
Question 15: What is Cyber Security?
- Cyber Security provides security against malware
- Cyber Security provides security against cyber-terrorists
- Cyber Security protects a system from cyber attacks
- All of the mentioned
Question 16: What does cyber security protect?
- Cyber security protects criminals
- Cyber security protects internet-connected systems
- Cyber security protects hackers
- None of the mentioned
Question 17: Who is the father of computer security?
- August Kerckhoffs
- Bob Thomas
- Robert
- Charles
Question 18: Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
- Cyber attack
- Computer security
- Cryptography
- Digital hacking
Question 19: Which of the following is a type of cyber security?
- Cloud Security
- Network Security
- Application Security
- All of the above
Question 20: What are the features of cyber security?
- Compliance
- Defense against internal threats
- Threat Prevention
- All of the above
Question 21: Which of the following is an objective of network security?
- Confidentiality
- Integrity
- Availability
- All of the above
Question 22: Which of the following is not a cybercrime?
- Denial of Service
- Man in the Middle
- Malware
- AES
Question 23: Which of the following is a component of cyber security?
- Internet Of Things
- AI
- Database
- Attacks
Question 24: Which of the following is a type of cyber attack?
- Phishing
- SQL Injections
- Password Attack
- All of the above
Question 25: “Cyberspace” was coined by _
- Richard Stallman
- William Gibson
- Andrew Tannenbaum
- Scott Fahlman
Question 26: Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _
- Nation/State sponsored hackers
- CIA triad
- Special Hackers
- Government Hackers
Question 27: In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?
- 1991
- 1983
- 1970
- 1964
Question 28: Which of the following act violates cyber security?
- Exploit
- Attack
- Threat
- Vulnerability
Question 29: Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?
- Pharming
- Website-Duplication
- Mimicking
- Spamming
Question 30: A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
- Clickjacking
- Buffer-overflow
- Phishing
- MiTM
Question 31: Which of the following is defined as an attempt to harm, damage or cause threat to a system or network?
- Digital crime
- Threats
- System hijacking
- Cyber Attack
Question 32: They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
- White Hat Hackers
- Black Hat Hackers
- Hactivists
- Gray Hat Hackers
Question 33: Where did the term “hacker” originate?
- MIT
- New York University
- Harvard University
- Bell’s Lab
Question 34: Which of the following is not a step followed by cyber-criminals in data breaching?
- Exfiltration
- Research and info-gathering
- Attack the system
- Fixing the bugs
Question 35: Which of the following online service’s privacy cannot be protected using Tor?
- Browsing data
- Instant messaging
- Login using ID
- Relay chats
Question 36: Which of the following is not an email-related hacking tool?
- Mail Password
- Email Finder Pro
- Mail PassView
- Sendinc
Question 37: Which of the following can diminish the chance of data leakage?
- Steganography
- Chorography
- Cryptography
- Authentication
Question 38: Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?
- Operating System fingerprinting
- Operating System penetration testing
- Digital-printing
- Machine printing
Question 39: Which of the following is a Stuxnet?
- Trojan
- Antivirus
- Worm
- Virus
Question 40: Which of the following is the least strong security encryption standard?
- WPA3
- WPA2
- WPA
- WEP
Question 41: Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack?
- botnets
- programs
- virus
- worms
Question 42: In which of the following, a person is constantly followed/chased by another person or group of several peoples?
- Phishing
- Bulling
- Stalking
- Identity theft
Question 43: _ is a type of software designed to help the user’s computer detect viruses and avoid them.
- Malware
- Adware
- Antivirus
- Both B and C
Question 44: Which one of the following is a type of antivirus program?
- Quick heal
- Mcafee
- Kaspersky
- All of the above
Question 45: It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______:
- Antivirus
- Firewall
- Cookies
- Malware
Question 46: Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
- Cyber low
- Cyberethics
- Cybersecurity
- Cybersafety
Question 47: Which one of the following refers to the technique used for verifying the integrity of the message?
- Digital signature
- Decryption algorithm
- Protocol
- Message Digest
Question 48: In system hacking, which of the following is the most crucial activity?
- Information gathering
- Covering tracks
- Cracking passwords
- None of the above
Question 49: To protect the computer system against the hacker and different kind of viruses, one must always keep _ on in the computer system.
- Antivirus
- Firewall
- Vlc player
- Script
Question 50: Hackers usually used the computer virus for __ purpose.
- To log, monitor each and every user’s stroke
- To gain access the sensitive information like user’s Id and Passwords
- To corrupt the user’s data stored in the computer system
- All of the above