InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
A zero-day vulnerability is a type of vulnerability unknown to the creator or vendor of the system or software.(a) True(b) FalseThe question was asked during an online exam.Origin of the question is Bugs and Vulnerabilities topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right CHOICE is (a) True |
|
| 2. |
__________ is the timeframe from when the loophole in security was introduced till the time when the bug was fixed.(a) Time-frame of vulnerability(b) Window of vulnerability(c) Time-lap of vulnerability(d) Entry-door of vulnerabilityI got this question in an international level competition.This interesting question is from Bugs and Vulnerabilities in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The CORRECT option is (b) Window of vulnerability |
|
| 3. |
ISMS is abbreviated as __________(a) Information Server Management System(b) Information Security Management Software(c) Internet Server Management System(d) Information Security Management SystemI got this question during an online interview.Question is taken from Bugs and Vulnerabilities in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct OPTION is (d) Information Security Management System |
|
| 4. |
Security bugs are also known as _______(a) security defect(b) security problems(c) system defect(d) software errorI have been asked this question during an interview.Origin of the question is Bugs and Vulnerabilities topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct option is (a) SECURITY defect |
|
| 5. |
A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system.(a) System error(b) Bugged system(c) Security bug(d) System virusThe question was asked during an interview for a job.My doubt stems from Bugs and Vulnerabilities topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right answer is (c) Security bug |
|
| 6. |
___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.(a) Exploiting(b) Cracking(c) Hacking(d) PivotingI got this question during an interview.I'd like to ask this question from Bugs and Vulnerabilities topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct answer is (d) PIVOTING |
|
| 7. |
________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit.(a) Local exploits(b) Remote exploits(c) System exploits(d) Network exploitsI had been asked this question in final exam.The question is from Bugs and Vulnerabilities in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right option is (a) LOCAL exploits |
|
| 8. |
Remote exploits is that type of exploits acts over any network to exploit on security vulnerability.(a) True(b) FalseThis question was addressed to me during an interview.Asked question is from Bugs and Vulnerabilities in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The CORRECT choice is (a) True |
|
| 9. |
A/An __________ is a piece of software or a segment of command that usually take advantage of a bug to cause unintended actions and behaviors.(a) malware(b) trojan(c) worms(d) exploitI got this question during an interview for a job.My question is from Bugs and Vulnerabilities topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right choice is (d) exploit |
|
| 10. |
There are ________ types of exploit.(a) 3(b) 2(c) 5(d) 4I had been asked this question during an online exam.My question is based upon Bugs and Vulnerabilities topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» RIGHT answer is (b) 2 To explain I WOULD say: Exploits can be categorized based on various criteria. But the most prominent categorization is done by how exploits COMMUNICATE with vulnerable software. These are categorized as local exploits and remote exploits. |
|
| 11. |
_____________ is a special type of vulnerability that doesn’t possess risk.(a) Vulnerabilities without risk(b) Vulnerabilities without attacker(c) Vulnerabilities without action(d) Vulnerabilities no one knowsI got this question in an interview for internship.This question is from Bugs and Vulnerabilities in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The CORRECT OPTION is (a) Vulnerabilities without RISK |
|
| 12. |
Risk and vulnerabilities are the same things.(a) True(b) FalseThis question was posed to me in class test.Question is from Bugs and Vulnerabilities in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right choice is (b) False |
|
| 13. |
____________ is the cyclic practice for identifying & classifying and then solving the vulnerabilities in a system.(a) Bug protection(b) Bug bounty(c) Vulnerability measurement(d) Vulnerability managementThe question was posed to me in quiz.My question comes from Bugs and Vulnerabilities topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct option is (d) VULNERABILITY management |
|
| 14. |
_________ is the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system.(a) Attack vector(b) Attack surface(c) Attack point(d) Attack arenaThe question was asked in unit test.This interesting question is from Bugs and Vulnerabilities in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct OPTION is (b) Attack surface |
|
| 15. |
___________ is a weakness that can be exploited by attackers.(a) System with Virus(b) System without firewall(c) System with vulnerabilities(d) System with a strong passwordThis question was addressed to me in examination.This intriguing question originated from Bugs and Vulnerabilities topic in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» RIGHT choice is (C) System with vulnerabilities To explain: In cyber-security, a system having vulnerabilities is defined as the weakness in a system that can be exploited by cyber-criminals and ATTACKERS for their own benefit. For this, they use special tools and techniques in order to CRACK into the system through the vulnerabilities. |
|
| 16. |
________ is a password recovery and auditing tool.(a) LC3(b) LC4(c) Network Stumbler(d) MaltegoI had been asked this question during an internship interview.I need to ask this question from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct option is (b) LC4 |
|
| 17. |
L0phtCrack is formerly known as LC3.(a) True(b) FalseThe question was asked by my college professor while I was bunking the class.The doubt is from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right OPTION is (b) False |
|
| 18. |
___________ is a web application assessment security tool.(a) LC4(b) WebInspect(c) Ettercap(d) QualysGuardThis question was posed to me during an interview.My enquiry is from Popular Tools used in Security topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right answer is (b) WebInspect |
|
| 19. |
Which of the following attack-based checks WebInspect cannot do?(a) cross-site scripting(b) directory traversal(c) parameter injection(d) injecting shell codeThe question was posed to me by my school principal while I was bunking the class.I'm obligated to ask this question of Popular Tools used in Security in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right answer is (d) injecting shell code |
|
| 20. |
_____________ is a popular IP address and port scanner.(a) Cain and Abel(b) Snort(c) Angry IP Scanner(d) EttercapThe question was posed to me in a job interview.My question is from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct choice is (c) ANGRY IP Scanner |
|
| 21. |
_______________ is a popular tool used for network analysis in multiprotocol diverse network.(a) Snort(b) SuperScan(c) Burp Suit(d) EtterPeakThis question was posed to me in exam.This intriguing question comes from Popular Tools used in Security in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct option is (d) EtterPeak |
|
| 22. |
____________ scans TCP ports and resolves different hostnames.(a) SuperScan(b) Snort(c) Ettercap(d) QualysGuardThe question was asked by my college director while I was bunking the class.The question is from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct option is (a) SuperScan |
|
| 23. |
Aircrack-ng is used for ____________(a) Firewall bypassing(b) Wi-Fi attacks(c) Packet filtering(d) System password crackingI had been asked this question in an interview.I want to ask this question from Popular Tools used in Security topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct option is (b) Wi-Fi attacks |
|
| 24. |
Which of this Nmap do not check?(a) services different hosts are offering(b) on what OS they are running(c) what kind of firewall is in use(d) what type of antivirus is in useI had been asked this question in an interview for internship.My doubt is from Popular Tools used in Security in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right choice is (d) what type of antivirus is in use |
|
| 25. |
Which of the following deals with network intrusion detection and real-time traffic analysis?(a) John the Ripper(b) L0phtCrack(c) Snort(d) NessusThis question was addressed to me in an international level competition.The query is from Popular Tools used in Security topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right option is (c) Snort |
|
| 26. |
Which of the below-mentioned tool is used for Wi-Fi hacking?(a) Wireshark(b) Nessus(c) Aircrack-ng(d) SnortI had been asked this question in homework.The query is from Popular Tools used in Security topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct option is (c) Aircrack-ng |
|
| 27. |
Wireshark is a ____________ tool.(a) network protocol analysis(b) network connection security(c) connection analysis(d) defending malicious packet-filteringI got this question by my school principal while I was bunking the class.My doubt is from Popular Tools used in Security topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct OPTION is (a) network protocol ANALYSIS |
|
| 28. |
__________ is a popular tool used for discovering networks as well as in security auditing.(a) Ettercap(b) Metasploit(c) Nmap(d) Burp SuitThis question was addressed to me in semester exam.This interesting question is from Popular Tools used in Security topic in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct option is (c) Nmap |
|
| 29. |
_________ framework made cracking of vulnerabilities easy like point and click.(a) .Net(b) Metasploit(c) Zeus(d) EttercapI have been asked this question during an interview.I want to ask this question from Popular Tools used in Security in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right option is (B) Metasploit |
|
| 30. |
Nmap is abbreviated as Network Mapper.(a) True(b) FalseI got this question in class test.Origin of the question is Popular Tools used in Security topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct choice is (a) True |
|
| 31. |
_____________ helps in protecting corporate data, communications and other assets.(a) Snort(b) CipherCloud(c) Burp Suit(d) WiresharkThe question was asked in an interview for job.I want to ask this question from Popular Tools used in Security in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» RIGHT choice is (b) CipherCloud Easiest EXPLANATION: CipherCloud helps in protecting corporate data, different communications as WELL as other assets. This includes anti-virus scanning FACILITY, ENCRYPTION & traffic monitoring. In addition, it provides mobile security support also. |
|
| 32. |
__________ is a popular corporate security tool that is used to detect the attack on email with cloud only services.(a) Cain and Abel(b) Proofpoint(c) Angry IP Scanner(d) EttercapThis question was addressed to me in an interview for internship.My question is from Popular Tools used in Security topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct answer is (b) Proofpoint |
|
| 33. |
________________ helps in protecting businesses against data breaches that may make threats to cloud.(a) Centrify(b) Mailbox Exchange Recovery(c) Nessus(d) DashlineI have been asked this question during an interview.The origin of the question is Popular Tools used in Security in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right option is (a) CENTRIFY |
|
| 34. |
________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location.(a) EventLog Analyser(b) NordVPN(c) Wireshark(d) PacketFilter AnalyzerI got this question in an interview for job.The above asked question is from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right answer is (a) EventLog Analyser |
|
| 35. |
______________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes.(a) Outlook(b) Nessus(c) Mailbox Exchange Recovery(d) Mail Exchange Recovery toolkitI have been asked this question during a job interview.My question comes from Popular Tools used in Security topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct choice is (c) Mailbox EXCHANGE Recovery |
|
| 36. |
__________ is a popular command-line packet analyser.(a) Wireshark(b) Snort(c) Metasploit(d) TcpdumpThe question was posed to me by my school principal while I was bunking the class.Enquiry is from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right choice is (d) Tcpdump |
|
| 37. |
__________ is a debugger and exploration tool.(a) Netdog(b) Netcat(c) Tcpdump(d) BackTrackThis question was addressed to me by my school principal while I was bunking the class.This interesting question is from Popular Tools used in Security topic in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right answer is (b) Netcat |
|
| 38. |
ToneLoc is abbreviated as __________(a) Tone Locking(b) Tone Locator(c) Tone Locker(d) Tune LocatorI had been asked this question in examination.This interesting question is from Popular Tools used in Security in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right option is (c) Tone Locker |
|
| 39. |
Network Stumbler is a Windows Wi-Fi monitoring tool.(a) True(b) FalseThis question was posed to me during an internship interview.This is a very interesting question from Popular Tools used in Security in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct OPTION is (a) True |
|
| 40. |
____________ is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network.(a) Wireshark(b) Nessus(c) Snort(d) WebInspectI have been asked this question by my school principal while I was bunking the class.My question is from Popular Tools used in Security in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» RIGHT ANSWER is (b) Nessus To EXPLAIN: Nessus is a popular and PROPRIETARY network vulnerability scanning tool developed by Tenable Network Security. It helps in easily identifying vulnerabilities and fix them, which includes missing patches and software FLAWS. |
|
| 41. |
_____________ is a tool which can detect registry issues in an operating system.(a) Network Stumbler(b) Ettercap(c) Maltego(d) LANguard Network Security ScannerI had been asked this question in homework.This question is from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right option is (d) LANguard Network SECURITY Scanner |
|
| 42. |
Which of the following attach is not used by LC4 to recover Windows password?(a) Brute-force attack(b) Dictionary attack(c) MiTM attack(d) Hybrid attacksThe question was posed to me in an interview for job.This interesting question is from Popular Tools used in Security topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct answer is (C) MiTM attack |
|
| 43. |
Section 79 of the Indian IT Act declares that any 3^rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.(a) True(b) FalseThe question was asked during a job interview.My query is from Cyber Laws and IT laws topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct option is (a) True |
|
| 44. |
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.(a) section 65(b) section 66(c) section 71(d) section 72This question was addressed to me in an online interview.I want to ask this question from Cyber Laws and IT laws in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct option is (d) section 72 |
|
| 45. |
Stealing of digital files comes under __________ of the Indian IT Act.(a) section 66-A(b) section 66-B(c) section 66-C(d) section 66-DThis question was posed to me during an online exam.Enquiry is from Cyber Laws and IT laws topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct answer is (c) SECTION 66-C |
|
| 46. |
Sending offensive message to someone comes under _____________ of the Indian IT Act ______(a) section 66-A, 2000(b) section 66-B, 2008(c) section 67, 2000(d) section 66-A, 2008This question was addressed to me during an internship interview.My question is taken from Cyber Laws and IT laws topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right option is (d) section 66-A, 2008 |
|
| 47. |
Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________(a) 2 years(b) 3 years(c) 4 years(d) 5 yearsI have been asked this question in an interview.I want to ask this question from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct answer is (b) 3 years |
|
| 48. |
Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.(a) True(b) FalseThe question was asked during an interview.My question is from Cyber Laws and IT laws topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct answer is (a) True |
|
| 49. |
If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.(a) 2(b) 3(c) 4(d) 5This question was posed to me in a job interview.This key question is from Cyber Laws and IT laws in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct answer is (d) 5 |
|
| 50. |
Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.(a) Section 66(b) Section 67(c) Section 68(d) Section 69The question was asked in quiz.The query is from Cyber Laws and IT laws in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right choice is (b) SECTION 67 |
|