Quiz 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

3. Who is the father of computer security? a) August Kerckhoffs b) Bob Thomas c) Robert d) Charles Answer: a

a) August Kerckhoffs

4. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information? a) Cyber attack b) Computer security c) Cryptography d) Digital hacking Answer: a

a) Cyber attack

9. Which of the following is a component of cyber security? a) Internet Of Things b) AI c) Database d) Attacks

a) Internet Of Things

24. Where did the term "hacker" originate? a) MIT b) New York University c) Harvard University d) Bell's Lab

a) MIT

11. Which of the following is not an advantage of cyber security? a) Makes the system slower b) Minimizes computer freezing and crashes c) Gives privacy to users d) Protects system against viruses

a) Makes the system slower

14. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______ a) Nation / State sponsored hackers b) CIA triad c) Special Hackers d) Government Hackers

a) Nation / State sponsored hackers

34. Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer? a) Operating System fingerprinting b) Operating System penetration testing c) Digital-printing d) Machine printing

a) Operating System fingerprinting

17. Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic? a) Pharming b) Website-Duplication c) Mimicking d) Spamming

a) Pharming

35. Which of the following can diminish the chance of data leakage? a) Steganography b) Chorography c) Cryptography d) Authentication

a) Steganography

31. Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack? a) botnets b) programs c) virus d) worms

a) botnets

15. Which of the following act violates cyber security? a) Exploit b) Attack c) Threat d) Vulnerability

b) Attack

22. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are "they" referred to here? a) White Hat Hackers b) Black Hat Hackers c) Hactivists d) Gray Hat Hackers

b) Black Hat Hackers

19. A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack? a) Clickjacking b) Buffer-overflow c) Phishing d) MiTM

b) Buffer-overflow

2. What does cyber security protect? a) Cyber security protects criminals b) Cyber security protects internet-connected systems c) Cyber security protects hackers d) None of the mentioned

b) Cyber security protects internet-connected systems

29. Which of the following term refers to a group of hackers who are both white and black hat? a) Yellow Hat hackers b) Grey Hat hackers c) Red Hat Hackers d) White-Black Hat Hackers

b) Grey Hat hackers

26. Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information. a) MiTM attack b) Phishing attack c) Website attack d) DoS attack

b) Phishing attack

12. "Cyberspace" was coined by _________ a) Richard Stallman b) William Gibson c) Andrew Tannenbaum d) Scott Fahlman

b) William Gibson

13. In which year has hacking become a practical crime and a matter of concern in the field of cyber technology? a) 1991 b) 1983 c) 1970 d) 1964

c) 1970

18. Which of the following is not a type of peer-to-peer cyber-crime? a) MiTM b) Injecting Trojans to a target victim c) Credit card details leak in the deep web d) Phishing

c) Credit card details leak in the deep web

28. Which of the following online service's privacy cannot be protected using Tor? a) Browsing data b) Instant messaging c) Login using ID d) Relay chats

c) Login using ID

16. Which of the following actions compromise cyber security? a) Vulnerability b) Attack c) Threat d) Exploit

c) Threat

25. What is the existence of weakness in a system or network is known as? a) Attack b) Exploit c) Vulnerability d) Threat

c) Vulnerability

33. Which of the following is a Stuxnet? a) Trojan b) Antivirus c) Worm d) Virus

c) Worm

20. Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user? a) ip tracker b) emails c) websites d) web pages

c) websites

8. Which of the following is not a cybercrime? a) Denial of Service b) Man in the Middle c) Malware d) AES

d) AES

10. Which of the following is a type of cyber attack? a) Phishing b) SQL Injections c) Password Attack d) All of the above

d) All of the above

5. Which of the following is a type of cyber security? a) Cloud Security b) Network Security c) Application Security d) All of the above

d) All of the above

6. What are the features of cyber security? a) Compliance b) Defense against internal threats c) Threat Prevention d) All of the above

d) All of the above

7. Which of the following is an objective of network security? a) Confidentiality b) Integrity c) Availability d) All of the above

d) All of the above

1. What is Cyber Security? a) Cyber Security provides security against malware b) Cyber Security provides security against cyber-terrorists c) Cyber Security protects a system from cyber attacks d) All of the mentioned

d) All of the mentioned

21. Which of the following is defined as an attempt to harm, damage or cause threat to a system or network? a) Digital crime b) Threats c) System hijacking d) Cyber Attack

d) Cyber Attack

27. Which of the following is not a step followed by cyber-criminals in data breaching? a) Exfiltration b) Research and info-gathering c) Attack the system d) Fixing the bugs

d) Fixing the bugs

23. IT security in any firm or organization is maintained and handled by ____________________ a) Software Security Specialist b) CEO of the organization c) Security Auditor d) IT Security Engineer

d) IT Security Engineer

30. Which of the following is not an email-related hacking tool? a) Mail Password b) Email Finder Pro c) Mail PassView d) Sendinc

d) Sendinc

32. Which of the following is the least strong security encryption standard? a) WPA3 b) WPA2 c) WPA d) WEP

d) WEP


Conjuntos de estudio relacionados

Test 4 Questions, Chapter 51: Caring for Clients with Diabetes Mellitus, CH.51 - Diabetes PrepU ?'s, Diabetes Prep-U (easy), Prep U: Chapter 51: Assessment and Management of Patients With Diabetes

View Set

Chapter 18: General Adaption Syndrome

View Set

HW ch 13 Microbe-Human Interactions [Infection, Disease, and Epidemiology]

View Set

Ch. 9.2} Shaping Planetary Surfaces

View Set

CH2: ACCOUNTING CYCLE (DURING THE PERIOD)

View Set

Experiment # 7 Preparation of Cyclohexene from Cyclohexanol

View Set