InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.(a) Malware(b) Remote Access Trojans(c) Keyloggers(d) SpywareThe question was asked in a job interview.This interesting question is from Cyber Attacks Types in division Cyber Security of Cyber Security |
|
Answer» Correct CHOICE is (d) Spyware |
|
| 2. |
___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain.(a) Cyber-warfare(b) Cyber campaign(c) Cyber-terrorism(d) Cyber attackThis question was addressed to me in final exam.I want to ask this question from Cyber Attacks Types in chapter Cyber Security of Cyber Security |
|
Answer» The correct CHOICE is (C) Cyber-terrorism |
|
| 3. |
Stuxnet is a _________(a) Worm(b) Virus(c) Trojan(d) AntivirusThe question was posed to me in a national level competition.This interesting question is from Cyber Attacks Types in division Cyber Security of Cyber Security |
|
Answer» Correct option is (a) Worm |
|
| 4. |
_________ are the special type of programs used for recording and tracking user’s keystroke.(a) Keylogger(b) Trojans(c) Virus(d) WormsI had been asked this question in an interview for job.My query is from Cyber Attacks Types topic in division Cyber Security of Cyber Security |
|
Answer» Right option is (a) Keylogger |
|
| 5. |
Which method of hacking will record all your keystrokes?(a) Keyhijacking(b) Keyjacking(c) Keylogging(d) Keyboard monitoringThe question was posed to me in my homework.Question is from Cyber Attacks Types in portion Cyber Security of Cyber Security |
|
Answer» Right CHOICE is (C) Keylogging |
|
| 6. |
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______(a) Cyber-crime(b) Cyber Attack(c) System hijacking(d) Digital crimeThis question was posed to me during an online interview.Enquiry is from Cyber Attacks Types in section Cyber Security of Cyber Security |
|
Answer» Right answer is (B) Cyber Attack |
|
| 7. |
Which of them is not a wireless attack?(a) Eavesdropping(b) MAC Spoofing(c) Wireless Hijacking(d) PhishingThis question was posed to me in an internship interview.This intriguing question originated from Cyber Attacks Types in chapter Cyber Security of Cyber Security |
|
Answer» The correct ANSWER is (d) Phishing |
|
| 8. |
Which of this is an example of physical hacking?(a) Remote Unauthorised access(b) Inserting malware loaded USB to a system(c) SQL Injection on SQL vulnerable site(d) DDoS (Distributed Denial of Service) attackI have been asked this question during an online interview.I'd like to ask this question from Cyber Attacks Types topic in section Cyber Security of Cyber Security |
|
Answer» The correct choice is (b) INSERTING malware loaded USB to a system |
|
| 9. |
Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________(a) Session Hijacking(b) Session Fixation(c) Cookie stuffing(d) Session SpyingThis question was posed to me in an online interview.This intriguing question originated from Cyber Attacks Types topic in portion Cyber Security of Cyber Security |
|
Answer» Correct CHOICE is (a) Session Hijacking |
|
| 10. |
When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.(a) Database crash attack(b) DoS (Denial of Service) attack(c) Data overflow Attack(d) Buffer Overflow attackThe question was posed to me in an online quiz.The above asked question is from Cyber Attacks Types in portion Cyber Security of Cyber Security |
|
Answer» Right choice is (d) BUFFER OVERFLOW attack |
|
| 11. |
This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?(a) SQL injection(b) HTML Injection(c) Cross Site Scripting (XSS)(d) Cross Site Request Forgery (XSRF)The question was asked in an online interview.I'd like to ask this question from Cyber Attacks Types in portion Cyber Security of Cyber Security |
|
Answer» Right option is (c) Cross SITE Scripting (XSS) |
|
| 12. |
XSS is abbreviated as __________(a) Extreme Secure Scripting(b) Cross Site Security(c) X Site Scripting(d) Cross Site ScriptingThe question was asked in a national level competition.This is a very interesting question from Cyber Attacks Types in portion Cyber Security of Cyber Security |
|
Answer» The correct choice is (d) CROSS Site Scripting |
|
| 13. |
Who deploy Malwares to a system or network?(a) Criminal organizations, Black hat hackers, malware developers, cyber-terrorists(b) Criminal organizations, White hat hackers, malware developers, cyber-terrorists(c) Criminal organizations, Black hat hackers, software developers, cyber-terrorists(d) Criminal organizations, gray hat hackers, Malware developers, Penetration testersThe question was asked in semester exam.Asked question is from Cyber Attacks Types topic in section Cyber Security of Cyber Security |
|
Answer» RIGHT choice is (a) CRIMINAL organizations, Black hat hackers, malware DEVELOPERS, cyber-terrorists Easy explanation: Criminal-minded organizations, GROUPS and individuals cyber-terrorist groups, Black hat hackers, malware developers etc are those who can DEPLOY malwares to any target system or network in order to deface that system. |
|
| 14. |
_____________ is a code injecting method used for attacking the database of a system / website.(a) HTML injection(b) SQL Injection(c) Malicious code injection(d) XML InjectionThis question was addressed to me during an online exam.My question comes from Cyber Attacks Types topic in portion Cyber Security of Cyber Security |
|
Answer» The correct choice is (b) SQL Injection |
|
| 15. |
The full form of Malware is ________(a) Malfunctioned Software(b) Multipurpose Software(c) Malicious Software(d) Malfunctioning of SecurityThis question was posed to me during an interview.Origin of the question is Cyber Attacks Types topic in division Cyber Security of Cyber Security |
|
Answer» CORRECT choice is (c) Malicious Software Easiest explanation: Different types of harmful software and programs that can pose threats to a system, network or ANYTHING RELATED to cyberspace are termed as Malware. Examples of some common malware are Virus, TROJANS, Ransomware, spyware, worms, rootkits ETC. |
|