Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.(a) Malware(b) Remote Access Trojans(c) Keyloggers(d) SpywareThe question was asked in a job interview.This interesting question is from Cyber Attacks Types in division Cyber Security of Cyber Security

Answer»

Correct CHOICE is (d) Spyware

Best explanation: Spyware is professional malicious spying software that is hard to detect by anti-malware or anti-virus programs because they are PROGRAMMED in such a skillful WAY. These types of software keep on collecting personal information, surfing habits, surfing history as well as credit CARD details.

2.

___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain.(a) Cyber-warfare(b) Cyber campaign(c) Cyber-terrorism(d) Cyber attackThis question was addressed to me in final exam.I want to ask this question from Cyber Attacks Types in chapter Cyber Security of Cyber Security

Answer»

The correct CHOICE is (C) Cyber-terrorism

To explain I would say: Cyber- terrorism is the term used to describe INTERNET terrorism, where individuals and GROUPS are anonymously misusing ethnicities, religions as well as threaten any TECHNOLOGY user, which may lead to even loss of life.

3.

Stuxnet is a _________(a) Worm(b) Virus(c) Trojan(d) AntivirusThe question was posed to me in a national level competition.This interesting question is from Cyber Attacks Types in division Cyber Security of Cyber Security

Answer»

Correct option is (a) Worm

Easy explanation: STUXNET is a POPULAR and powerful worm that came into existence in MID 2010, which was very powerful as it was accountable for the cause of huge damage to Iran’s NUCLEAR program. It mainly targets the PLCs (PROGRAMMABLE Logic Controllers) in a system.

4.

_________ are the special type of programs used for recording and tracking user’s keystroke.(a) Keylogger(b) Trojans(c) Virus(d) WormsI had been asked this question in an interview for job.My query is from Cyber Attacks Types topic in division Cyber Security of Cyber Security

Answer»

Right option is (a) Keylogger

For explanation I would say: Keyloggers are SURVEILLANCE PROGRAMS developed for both security purpose as well as DONE for hacking passwords and other personal credentials and information. This type of programs actually saves the keystrokes done using a keyboard and then sends the RECORDED keystroke file to the CREATOR of such programs.

5.

Which method of hacking will record all your keystrokes?(a) Keyhijacking(b) Keyjacking(c) Keylogging(d) Keyboard monitoringThe question was posed to me in my homework.Question is from Cyber Attacks Types in portion Cyber Security of Cyber Security

Answer»

Right CHOICE is (C) Keylogging

The EXPLANATION: Keylogging is the method or procedure of recording all the key strokes/keyboard BUTTON pressed by the user of that system.

6.

An attempt to harm, damage or cause threat to a system or network is broadly termed as ______(a) Cyber-crime(b) Cyber Attack(c) System hijacking(d) Digital crimeThis question was posed to me during an online interview.Enquiry is from Cyber Attacks Types in section Cyber Security of Cyber Security

Answer»

Right answer is (B) Cyber Attack

The explanation: Cyber attack is an umbrella term USED to classify different computer & NETWORK attacks or activities such as extortion, IDENTITY theft, EMAIL hacking, digital spying, stealing hardware, mobile hacking and physical security breaching.

7.

Which of them is not a wireless attack?(a) Eavesdropping(b) MAC Spoofing(c) Wireless Hijacking(d) PhishingThis question was posed to me in an internship interview.This intriguing question originated from Cyber Attacks Types in chapter Cyber Security of Cyber Security

Answer»

The correct ANSWER is (d) Phishing

To explain I WOULD say: WIRELESS attacks are MALICIOUS attacks done in wireless systems, networks or devices. Attacks on Wi-Fi network is one common EXAMPLE that general people know. Other such sub-types of wireless attacks are wireless authentication attack, Encryption cracking etc.

8.

Which of this is an example of physical hacking?(a) Remote Unauthorised access(b) Inserting malware loaded USB to a system(c) SQL Injection on SQL vulnerable site(d) DDoS (Distributed Denial of Service) attackI have been asked this question during an online interview.I'd like to ask this question from Cyber Attacks Types topic in section Cyber Security of Cyber Security

Answer»

The correct choice is (b) INSERTING malware loaded USB to a system

The explanation: If a suspicious gain access to server room or into any confidential AREA with a malicious pen-drive loaded with malware which will get triggered automatically once inserted to USB port of any employee’s PC; such attacks come under physical hacking, because that person in gaining unauthorized physical access to any room or ORGANIZATION first, then managed to get an employee’s PC also, all done PHYSICALLY – hence breaching physical SECURITY.

9.

Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________(a) Session Hijacking(b) Session Fixation(c) Cookie stuffing(d) Session SpyingThis question was posed to me in an online interview.This intriguing question originated from Cyber Attacks Types topic in portion Cyber Security of Cyber Security

Answer»

Correct CHOICE is (a) Session Hijacking

Easy explanation: Using session hijacking, which is popularly known as COOKIE hijacking is an exploitation method for COMPROMISING the user’s session for gaining unauthorized access to user’s information.

10.

When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.(a) Database crash attack(b) DoS (Denial of Service) attack(c) Data overflow Attack(d) Buffer Overflow attackThe question was posed to me in an online quiz.The above asked question is from Cyber Attacks Types in portion Cyber Security of Cyber Security

Answer»

Right choice is (d) BUFFER OVERFLOW attack

For explanation I WOULD say: The Buffer overflow attack takes place when an excessive amount of data occurs in the buffer, which it cannot handle and lead to data being over-flow into its adjoined STORAGE. This attack can cause a SYSTEM or application crash and can lead to malicious entry-point.

11.

This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?(a) SQL injection(b) HTML Injection(c) Cross Site Scripting (XSS)(d) Cross Site Request Forgery (XSRF)The question was asked in an online interview.I'd like to ask this question from Cyber Attacks Types in portion Cyber Security of Cyber Security

Answer»

Right option is (c) Cross SITE Scripting (XSS)

Explanation: XSS ATTACK can be infused by putting the MALICIOUS code (which gets automatically run) in any comment section or feedback section of any webpage (usually a blogging page). This can hamper the reputation of a site and the attacker may place any private data or PERSONAL credentials.

12.

XSS is abbreviated as __________(a) Extreme Secure Scripting(b) Cross Site Security(c) X Site Scripting(d) Cross Site ScriptingThe question was asked in a national level competition.This is a very interesting question from Cyber Attacks Types in portion Cyber Security of Cyber Security

Answer»

The correct choice is (d) CROSS Site Scripting

To ELABORATE: Cross Site Scripting is another popular WEB application attack type that can HAMPER the reputation of any site.

13.

Who deploy Malwares to a system or network?(a) Criminal organizations, Black hat hackers, malware developers, cyber-terrorists(b) Criminal organizations, White hat hackers, malware developers, cyber-terrorists(c) Criminal organizations, Black hat hackers, software developers, cyber-terrorists(d) Criminal organizations, gray hat hackers, Malware developers, Penetration testersThe question was asked in semester exam.Asked question is from Cyber Attacks Types topic in section Cyber Security of Cyber Security

Answer» RIGHT choice is (a) CRIMINAL organizations, Black hat hackers, malware DEVELOPERS, cyber-terrorists

Easy explanation: Criminal-minded organizations, GROUPS and individuals cyber-terrorist groups, Black hat hackers, malware developers etc are those who can DEPLOY malwares to any target system or network in order to deface that system.
14.

_____________ is a code injecting method used for attacking the database of a system / website.(a) HTML injection(b) SQL Injection(c) Malicious code injection(d) XML InjectionThis question was addressed to me during an online exam.My question comes from Cyber Attacks Types topic in portion Cyber Security of Cyber Security

Answer»

The correct choice is (b) SQL Injection

The best explanation: SQLi (Structured Query Language Injection) is a POPULAR attack where SQL code is targeted or INJECTED; for breaking the web application having SQL vulnerabilities. This ALLOWS the attacker to run MALICIOUS code and take access to the database of that server.

15.

The full form of Malware is ________(a) Malfunctioned Software(b) Multipurpose Software(c) Malicious Software(d) Malfunctioning of SecurityThis question was posed to me during an interview.Origin of the question is Cyber Attacks Types topic in division Cyber Security of Cyber Security

Answer» CORRECT choice is (c) Malicious Software

Easiest explanation: Different types of harmful software and programs that can pose threats to a system, network or ANYTHING RELATED to cyberspace are termed as Malware. Examples of some common malware are Virus, TROJANS, Ransomware, spyware, worms, rootkits ETC.