InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
___________________ began to show up few years back on wireless access points as a new way of adding or connecting new devices.(a) WPA2(b) WPA(c) WPS(d) WEPThe question was posed to me in semester exam.The origin of the question is Cyber Security Types topic in division Cyber Security Types of Cyber Security |
|
Answer» The correct choice is (C) WPS |
|
| 2. |
Which of the following is a Wireless traffic Sniffing tool?(a) Maltego(b) BurpSuit(c) Nessus(d) WiresharkThis question was addressed to me in an interview for job.Origin of the question is Cyber Security Types in chapter Cyber Security Types of Cyber Security |
|
Answer» The correct choice is (d) Wireshark |
|
| 3. |
___________ is a process of wireless traffic analysis that may be helpful for forensic investigations or during troubleshooting any wireless issue.(a) Wireless Traffic Sniffing(b) WiFi Traffic Sniffing(c) Wireless Traffic Checking(d) Wireless Transmission SniffingThe question was asked by my college professor while I was bunking the class.I'm obligated to ask this question of Cyber Security Types topic in portion Cyber Security Types of Cyber Security |
|
Answer» Right OPTION is (a) WIRELESS Traffic Sniffing |
|
| 4. |
It is recommended to use WPA2 or WPA3 encryption standard as they are strong and more secure.(a) True(b) FalseThis question was addressed to me in an interview for job.My question is taken from Cyber Security Types in chapter Cyber Security Types of Cyber Security |
|
Answer» The correct answer is (a) True |
|
| 5. |
WPS stands for __________________(a) WiFi Protected System(b) WiFi Protected Setup(c) WiFi Protocol Setup(d) Wireless Protected SetupI had been asked this question in an interview for internship.My question is based upon Cyber Security Types in portion Cyber Security Types of Cyber Security |
|
Answer» The correct answer is (b) WIFI Protected Setup |
|
| 6. |
When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called _____________(a) AP-handshaking(b) 4-way handshake(c) 4-way connection(d) wireless handshakingThe question was posed to me in my homework.The origin of the question is Cyber Security Types topic in portion Cyber Security Types of Cyber Security |
|
Answer» RIGHT OPTION is (b) 4-way handshake To elaborate: When a wireless user authenticates to any AP, both of them go in the COURSE of four-step AUTHENTICATION progression which is CALLED 4-way handshake. |
|
| 7. |
There are __________ types of wireless authentication modes.(a) 2(b) 3(c) 4(d) 5I had been asked this question during an interview.I'd like to ask this question from Cyber Security Types topic in portion Cyber Security Types of Cyber Security |
|
Answer» The correct answer is (a) 2 |
|
| 8. |
___________________ is alike as that of Access Point (AP) from 802.11, & the mobile operators uses it for offering signal coverage.(a) Base Signal Station(b) Base Transmitter Station(c) Base Transceiver Station(d) Transceiver StationThis question was posed to me during an interview.My question is from Cyber Security Types in chapter Cyber Security Types of Cyber Security |
|
Answer» Right OPTION is (c) Base Transceiver STATION |
|
| 9. |
BTS stands for ___________________(a) Basement Transceiver Server(b) Base Transmitter Station(c) Base Transceiver Server(d) Base Transceiver StationThe question was asked during an internship interview.I would like to ask this question from Cyber Security Types in section Cyber Security Types of Cyber Security |
|
Answer» Right choice is (d) BASE TRANSCEIVER Station |
|
| 10. |
AP is abbreviated as _____________(a) Access Point(b) Access Port(c) Access Position(d) Accessing PortI have been asked this question in an interview for internship.The origin of the question is Cyber Security Types topic in division Cyber Security Types of Cyber Security |
|
Answer» CORRECT answer is (a) Access Point For explanation I would say: The CENTRAL node of 802.11 is that interface which acts as an intermediary of a WIRED & wireless network; and all the associated wireless clients’ USE this and exchange data. |
|
| 11. |
_______________ is the central node of 802.11 wireless operations.(a) WPA(b) Access Point(c) WAP(d) Access PortThe question was posed to me in a national level competition.My doubt stems from Cyber Security Types in portion Cyber Security Types of Cyber Security |
|
Answer» The correct choice is (b) Access Point |
|
| 12. |
_________ is an old IEEE 802.11 standard from the year 1999.(a) WPA2(b) WPA3(c) WEP(d) WPAI had been asked this question in an internship interview.I would like to ask this question from Cyber Security Types in chapter Cyber Security Types of Cyber Security |
|
Answer» Correct OPTION is (c) WEP |
|
| 13. |
Which among the following is the least strong security encryption standard?(a) WEP(b) WPA(c) WPA2(d) WPA3I have been asked this question by my school principal while I was bunking the class.This key question is from Cyber Security Types topic in portion Cyber Security Types of Cyber Security |
|
Answer» The correct ANSWER is (a) WEP |
|
| 14. |
____________________ is the anticipation of unauthorized access or break to computers or data by means of wireless networks.(a) Wireless access(b) Wireless security(c) Wired Security(d) Wired device appsThis question was posed to me by my college professor while I was bunking the class.The doubt is from Cyber Security Types in section Cyber Security Types of Cyber Security |
|
Answer» The correct choice is (b) Wireless security |
|
| 15. |
Which among them has the strongest wireless security?(a) WEP(b) WPA(c) WPA2(d) WPA3The question was asked during an interview.Enquiry is from Cyber Security Types topic in division Cyber Security Types of Cyber Security |
|
Answer» CORRECT ANSWER is (d) WPA3 Explanation: The most EXTENSIVE TYPES of wireless securities are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2 and WPA3. WPA3 is the strongest and recently RELEASED. |
|
| 16. |
Which of the following is not a security issue for PDAs?(a) Password theft(b) Data theft(c) Reverse engineering(d) Wireless vulnerabilityThe question was asked in an online interview.This is a very interesting question from Cyber Security Types in division Cyber Security Types of Cyber Security |
|
Answer» Correct choice is (C) Reverse engineering |
|
| 17. |
BBProxy tool is used in which mobile OS?(a) Android(b) Symbian(c) Raspberry(d) BlackberryThe question was asked in an interview.My question is taken from Cyber Security Types topic in section Cyber Security Types of Cyber Security |
|
Answer» Correct choice is (d) Blackberry |
|
| 18. |
Which of the following tool is used for Blackjacking?(a) BBAttacker(b) BBProxy(c) Blackburried(d) BBJackingThis question was addressed to me by my college director while I was bunking the class.The query is from Cyber Security Types topic in division Cyber Security Types of Cyber Security |
|
Answer» The correct choice is (b) BBProxy |
|
| 19. |
Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.(a) Biometric(b) PIN-based(c) Alphanumeric(d) ShortI got this question in an internship interview.My enquiry is from Cyber Security Types topic in section Cyber Security Types of Cyber Security |
|
Answer» The CORRECT OPTION is (a) Biometric |
|
| 20. |
Activate _____________ when you’re required it to use, otherwise turn it off for security purpose.(a) Flash Light(b) App updates(c) Bluetooth(d) RotationI got this question in a national level competition.Query is from Cyber Security Types in section Cyber Security Types of Cyber Security |
|
Answer» CORRECT answer is (c) Bluetooth For EXPLANATION I WOULD SAY: Activate Bluetooth when you’re required it to use, otherwise turn it off for security purpose. This is because; there are various TOOLS and vulnerabilities that may gain access to your smart-phone using Bluetooth. |
|
| 21. |
App permissions can cause trouble as some apps may secretly access your memory card or contact data.(a) True(b) FalseI got this question by my college director while I was bunking the class.Asked question is from Cyber Security Types in chapter Cyber Security Types of Cyber Security |
|
Answer» Correct option is (a) True |
|
| 22. |
Hackers cannot do which of the following after compromising your phone?(a) Shoulder surfing(b) Accessing your voice mail(c) Steal your information(d) Use your app credentialsI have been asked this question during an internship interview.The question is from Cyber Security Types in section Cyber Security Types of Cyber Security |
|
Answer» Right ANSWER is (a) SHOULDER surfing |
|
| 23. |
Hackers cannot do which of the following after compromising your phone?(a) Steal your information(b) Rob your e-money(c) Shoulder surfing(d) SpyingThis question was addressed to me during an online exam.The origin of the question is Cyber Security Types topic in division Cyber Security Types of Cyber Security |
| Answer» | |
| 24. |
DDoS in mobile systems wait for the owner of the _____________ to trigger the attack.(a) worms(b) virus(c) botnets(d) programsThis question was addressed to me during an interview.This question is from Cyber Security Types in chapter Cyber Security Types of Cyber Security |
|
Answer» Correct OPTION is (C) BOTNETS |
|
| 25. |
Mobile security is also known as ____________(a) OS Security(b) Wireless security(c) Cloud security(d) Database securityI had been asked this question in an internship interview.Asked question is from Cyber Security Types topic in division Cyber Security Types of Cyber Security |
|
Answer» The correct option is (b) Wireless security |
|
| 26. |
____________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs.(a) OS Security(b) Database security(c) Cloud security(d) Mobile securityThe question was asked in a national level competition.Enquiry is from Cyber Security Types in chapter Cyber Security Types of Cyber Security |
|
Answer» Right ANSWER is (d) Mobile security |
|
| 27. |
____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.(a) Worms(b) Antivirus(c) Malware(d) Multimedia filesI got this question during an interview for a job.This interesting question is from Cyber Security Types in portion Cyber Security Types of Cyber Security |
|
Answer» CORRECT option is (c) Malware The best explanation: Malware GETS propagated through networks and technologies like SMS, Bluetooth, wireless MEDIUM, USBS and infrared to AFFECT mobile phones. |
|
| 28. |
Mobile Phone OS contains open APIs that may be _____________ attack.(a) useful for(b) vulnerable to(c) easy to(d) meant forI got this question during an interview for a job.The query is from Cyber Security Types topic in chapter Cyber Security Types of Cyber Security |
|
Answer» Right option is (b) VULNERABLE to |
|
| 29. |
Which of the following is not an OS for mobile?(a) Palm(b) Windows(c) Mango(d) AndroidThis question was addressed to me in quiz.This key question is from Cyber Security Types in chapter Cyber Security Types of Cyber Security |
|
Answer» CORRECT answer is (c) Mango To explain I WOULD say: A mobile/smart-phone operating system is SOFTWARE which ALLOWS smart-phones, TABLETS, phablets & other devices to run apps & programs within it. Palm OS, Windows OS, and Android OS are some of the examples of Mobile OS. |
|
| 30. |
Which of the following is not an appropriate way of targeting a mobile phone for hacking?(a) Target mobile hardware vulnerabilities(b) Target apps’ vulnerabilities(c) Setup Keyloggers and spyware in smart-phones(d) Snatch the phoneI have been asked this question in a national level competition.My question is based upon Cyber Security Types in portion Cyber Security Types of Cyber Security |
|
Answer» Right choice is (d) Snatch the phone |
|
| 31. |
____________ is an application which now comes built-in Windows OS & it allows Windows users to encrypt all drive for security purpose.(a) MS Windows Defender(b) MSE(c) BitLocker(d) MS OfficeThis question was posed to me in examination.I need to ask this question from Cyber Security Types in section Cyber Security Types of Cyber Security |
|
Answer» Correct choice is (C) BitLocker |
|
| 32. |
A __________ is a dedicatedly designed chip on an endpoint device which stores RSA encryption keys particular to the host system for the purpose of hardware authentication.(a) Trusted Platform Mode(b) Trusted Protocol Module(c) Trusted Privacy Module(d) Trusted Platform ModuleThis question was addressed to me in my homework.I need to ask this question from Cyber Security Types topic in section Cyber Security Types of Cyber Security |
|
Answer» The correct option is (d) Trusted Platform Module |
|
| 33. |
TPM is abbreviated as ____________(a) Trusted Platform Mode(b) Trusted Platform Module(c) Trusted Privacy Module(d) True Platform ModuleThe question was posed to me in an interview for internship.My question is from Cyber Security Types topic in section Cyber Security Types of Cyber Security |
|
Answer» CORRECT choice is (B) TRUSTED Platform Module Easiest explanation: Port knocking is quite an esoteric process for preventing session CREATION through a particular port. Port knocking is not presently used by default in any STACK, but soon patches will come to allow the use of knocking protocols. |
|
| 34. |
The ______________ account and the __________ account have the same file privileges, but their working and functionalities have difference.(a) system, administrator(b) system, user(c) group, user(d) user, administratorThe question was asked in exam.My query is from Cyber Security Types in division Cyber Security Types of Cyber Security |
|
Answer» CORRECT choice is (a) system, administrator For explanation I would say: The system ACCOUNT and the administrator account have the same FILE privileges, but their working and functionalities have a difference. Actually, the system account is used by the OS & by services which run under Windows. And, administrator account gives the USER full CONTROL to their files, directories, services. |
|
| 35. |
________________ is an anti-malware tool found in newer OS which is designed for protecting computers from viruses, spyware & other malware.(a) Norton Antivirus(b) Windows Defender(c) Anti-malware(d) Microsoft Security EssentialsI got this question in an international level competition.My question is taken from Cyber Security Types in chapter Cyber Security Types of Cyber Security |
|
Answer» The correct option is (b) Windows Defender |
|
| 36. |
The _______________ is a security app by Microsoft which is a built-in one into Windows OS that is designed to filter network data from your Windows system & block harmful communications or the programs which are initiating them.(a) Windows Security Essentials(b) Windows Firewall(c) Windows app blocker(d) Windows 10This question was addressed to me in final exam.Question is from Cyber Security Types topic in division Cyber Security Types of Cyber Security |
|
Answer» Correct CHOICE is (b) Windows Firewall |
|
| 37. |
_____________ are essential because they frequently comprises of critical patches to security holes.(a) System software(b) Utility Software(c) Software executables(d) Software updatesI had been asked this question at a job interview.Origin of the question is Cyber Security Types in portion Cyber Security Types of Cyber Security |
|
Answer» Right CHOICE is (d) Software updates |
|
| 38. |
As a backup for securing your device, it is necessary to create a _____________(a) backup point(b) copy of files in separate drives(c) copy of files in the same drives(d) restore pointThis question was posed to me during an interview for a job.Origin of the question is Cyber Security Types topic in division Cyber Security Types of Cyber Security |
|
Answer» CORRECT answer is (d) restore POINT Easiest explanation: As a backup for securing your DEVICE, it is necessary to CREATE a restore point so that you can roll-back all the changes and programs installed by restoring the system to the state before those changes. |
|
| 39. |
Find out, select & uninstall all ________________ programs from your computer.(a) useful(b) pre-installed(c) unwanted(d) utilityThe question was posed to me in quiz.I need to ask this question from Cyber Security Types in section Cyber Security Types of Cyber Security |
|
Answer» Correct choice is (c) unwanted |
|
| 40. |
Most computers have BIOS which can be configured so that it can ask for a password once the system starts.(a) True(b) FalseThis question was posed to me by my college director while I was bunking the class.This is a very interesting question from Cyber Security Types topic in division Cyber Security Types of Cyber Security |
|
Answer» The CORRECT option is (a) True |
|
| 41. |
BIOS is abbreviated as _______________(a) Basic Input Output Server(b) Basic Internet Output Systems(c) Basic Input Output System(d) Battery-based Input Output SystemThis question was posed to me in class test.Query is from Cyber Security Types topic in division Cyber Security Types of Cyber Security |
|
Answer» Right OPTION is (c) Basic Input Output System |
|
| 42. |
__________ passwords are next level of security.(a) BIOS(b) CMOS(c) SMOS(d) BOISI had been asked this question by my college professor while I was bunking the class.Enquiry is from Cyber Security Types topic in portion Cyber Security Types of Cyber Security |
|
Answer» The correct CHOICE is (a) BIOS |
|
| 43. |
Which of the following is not an example of non-technical attack techniques?(a) Shoulder surfing(b) Keyboard sniffing(c) Phishing(d) Social engineeringThe question was asked during an online interview.This interesting question is from Password Cracking and Security Measures in section Cyber Security Types of Cyber Security |
|
Answer» CORRECT choice is (c) Phishing The best explanation: In the non-technical type of attacks, it is not REQUIRED to have any technical knowledge to ATTACK your target victim. Examples of such types of attacks are shoulder surfing, keyboard SNIFFING, and social engineering. |
|
| 44. |
_____________ are based on dictionary attack techniques where the dictionary attack is mixed with some numerals and special symbols.(a) Syllable attack(b) Rule-based attack(c) Offline attack(d) Hybrid attackThe question was asked in a job interview.I want to ask this question from Password Cracking and Security Measures topic in portion Cyber Security Types of Cyber Security |
|
Answer» The CORRECT option is (d) Hybrid attack |
|
| 45. |
_______________ are based on dictionary attack techniques.(a) Hybrid attacks(b) Network attacks(c) TCP attacks(d) Database attacksI have been asked this question in an online interview.Origin of the question is Password Cracking and Security Measures in division Cyber Security Types of Cyber Security |
|
Answer» The correct option is (a) Hybrid attacks |
|
| 46. |
Attackers can use the _______________ when he/she gets some information or hint regarding password he/she wants to crack.(a) Syllable attack(b) Rule-based attack(c) Offline attack(d) Hybrid attackI had been asked this question by my school principal while I was bunking the class.This intriguing question comes from Password Cracking and Security Measures in chapter Cyber Security Types of Cyber Security |
|
Answer» The CORRECT option is (b) Rule-based attack |
|
| 47. |
____________ attack is a combination of Dictionary attack & brute force attack.(a) Syllable(b) Syllabi(c) Database(d) PhishingI got this question in examination.My question is from Password Cracking and Security Measures in portion Cyber Security Types of Cyber Security |
|
Answer» Correct option is (a) Syllable |
|
| 48. |
A _____________ attack one of the simplest processes of gaining access to any password-protected system.(a) Clickjacking(b) Brute force(c) Eavesdropping(d) WaterholeThis question was addressed to me in exam.Enquiry is from Password Cracking and Security Measures in chapter Cyber Security Types of Cyber Security |
|
Answer» Right choice is (b) Brute FORCE |
|
| 49. |
The hybrid attack is a combination of dictionary attack followed by inserting entropy & performs brute force.(a) True(b) FalseThis question was addressed to me during an interview for a job.The doubt is from Password Cracking and Security Measures in chapter Cyber Security Types of Cyber Security |
|
Answer» Right choice is (a) True |
|
| 50. |
Brute force attack is ______________(a) fast(b) inefficient(c) slow(d) complex to understandThis question was posed to me in an interview for internship.My enquiry is from Password Cracking and Security Measures in division Cyber Security Types of Cyber Security |
|
Answer» Right choice is (c) SLOW |
|