InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Phishing emails include fake notifications from banks and e-payment systems. |
|
Answer» PHISHING emails include fake NOTIFICATIONS from banks and e-payment systems. Choose the correct options from below list (1)False (2)TRUE Answer:-(2)True |
|
| 2. |
Threats can exploit assets if assets are not vulnerable. |
|
Answer» Threats can exploit assets if assets are not vulnerable. |
|
| 3. |
The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as ______ |
|
Answer» The process of converting a message to an unintelligible form with the help of an algorithm and a KEY is KNOWN as _______. |
|
| 4. |
An error message displayed on the system symbolizes virus infection. |
|
Answer» An ERROR message DISPLAYED on the system symbolizes VIRUS infection. |
|
| 5. |
_________ is a standalone software that does not need human help/host program to spread. |
|
Answer» _________ is a standalone software that does not need human help HOST program to spread. |
|
| 6. |
Hardware or Software that prevents outsiders from obtaining unauthorized access to the internal information resource is |
|
Answer» HARDWARE or Software that prevents outsiders from OBTAINING unauthorized access to the internal information resource is Choose the correct answer from below LIST (1)Antivirus (2)Firewall (3)Spyware Answer:-(2)Firewall |
|
| 7. |
Define various codes from a web application in term of cyber security? |
|
Answer» Define various codes from a web application in term of cyber security? |
|
| 8. |
How do we define RADIUS? |
|
Answer» How do we define RADIUS? |
|
| 9. |
Which of these is true with respect to passwords? |
|
Answer» Which of these is true with respect to passwords? |
|
| 10. |
Which of the following attributes is not a PII? |
|
Answer» Which of the following attributes is not a PII? |
|
| 11. |
Which of the following is an attack against availability? |
|
Answer» Which of the following is an ATTACK against availability? |
|
| 12. |
The type of malware that tricks users by making them believe that their computer has been infected with a virus is calle |
|
Answer» The TYPE of malware that tricks USERS by making them believe that their computer has been infected with a VIRUS is called __________. |
|
| 13. |
Which of the following malware is designed for advertising, such as pop-up screens? |
|
Answer» Which of the FOLLOWING malware is designed for ADVERTISING, such as pop-up SCREENS? |
|
| 14. |
A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attackers pov is called __ |
|
Answer» A process by which potential vulnerabilities and threats can be recognized, enumerated, and PRIORITIZED from a hypothetical attackers POV is called ___________. |
|
| 15. |
Which of these are Threats related to Email Security? |
|
Answer» Which of these are Threats related to Email Security? |
|
| 16. |
Which of the following attack method aims to gather confidential information by deceiving the victim? |
|
Answer» Which of the FOLLOWING attack METHOD aims to gather confidential information by deceiving the victim? |
|
| 17. |
As an email client, we should not use caution when opening emails and can download any attachments. |
|
Answer» As an email CLIENT, we should not USE CAUTION when opening emails and can download any attachments. |
|
| 18. |
Which encryption method is more suitable for quickly encrypting large amounts of data? |
|
Answer» Which encryption method is more suitable for QUICKLY encrypting LARGE AMOUNTS of data? |
|
| 19. |
Which of these are examples biometrics? |
|
Answer» Which of these are EXAMPLES biometrics? |
|
| 20. |
Malware cannot inflict physical damage to systems. |
|
Answer» Malware cannot inflict physical damage to systems. |
|
| 21. |
A ________ is a credit card sized card with an embedded chip, containing information about the user |
|
Answer» A ________ is a credit card SIZED card with an embedded chip, containing information about the user |
|
| 22. |
__________ is a proactive process to predict potential risks efficiently. |
|
Answer» __________ is a proactive process to PREDICT potential RISKS efficiently. |
|
| 23. |
Passive attacks are considered a threat to _______. |
|
Answer» Passive ATTACKS are considered a threat to _______. |
|
| 24. |
The method of protecting programs, networks, and systems from digital attacks is commonly known as __________. |
|
Answer» The method of protecting programs, networks, and systems from DIGITAL ATTACKS is commonly known as __________. |
|
| 25. |
What is Port Scanning |
|
Answer» What is Port Scanning |
|
| 26. |
Basic one line definition for Firewall? |
|
Answer» Basic one line DEFINITION for Firewall? |
|
| 27. |
If a student gains unauthorized access to the student database and modifies his/her marks, what type of violation would |
|
Answer» If a student gains unauthorized access to the student database and modifies his/her marks, what type of VIOLATION would it be? |
|
| 28. |
Which of the following is an intangible asset? |
|
Answer» Which of the following is an intangible ASSET? |
|
| 29. |
Which of the following is an effective solution to ensure confidentiality? |
|
Answer» Which of the following is an effective solution to ensure confidentiality? |
|
| 30. |
Programs that are specifically designed to disrupt the performance of computers/networks are commonly known as __________. |
|
Answer» Programs that are SPECIFICALLY DESIGNED to disrupt the performance of computers/networks are commonly known as __________. |
|
| 31. |
A type of assessment that is often performed in a sandbox virtual environment to prevent malware from actually |
|
Answer» A type of assessment that is often PERFORMED in a sandbox-virtual environment to prevent malware from actually infecting production SYSTEMS is KNOWN as _________. |
|
| 32. |
A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called ________ |
|
Answer» A kind of a network attack, where an UNAUTHORIZED person GAINS access to a network and remains there undetected for a long duration is called _________. |
|
| 33. |
The security posture of an organization is defined by the ______ link in the chain. |
|
Answer» The security posture of an organization is DEFINED by the ______ link in the chain. |
|
| 34. |
Which of the following are the three phases of Incident response maturity assessment? |
|
Answer» Which of the following are the three phases of Incident response maturity assessment? |
|
| 35. |
Hash functions can be leveraged to ensure ________. |
|
Answer» HASH functions can be leveraged to ENSURE ________. Choose CORRECT OPTION from below LIST (1)Availability (2)Confidentiality (3)Authentication (4)Integrity Answer:-(4)Integrity |
|
| 36. |
A proactive process to predict potential risks efficiently. |
|
Answer» A proactive process to predict potential risks efficiently. |
|
| 37. |
As an application of cryptography, digital Signatures and MACs can be used for_____________ |
|
Answer» As an application of cryptography, DIGITAL SIGNATURES and MACs can be used for_____________. |
|
| 38. |
Which of the following can be considered as an effective solution to ensure integrity? |
|
Answer» Which of the following can be CONSIDERED as an effective solution to ensure integrity? |
|
| 39. |
SABSA Framework is commonly represented as _______ SABSA matrix. |
|
Answer» SABSA Framework is commonly represented as _______ SABSA matrix. |
|
| 40. |
Which of the following is used to draw in users and infect them and deploy fast |
|
Answer» Which of the FOLLOWING is used to draw in users and INFECT them and deploy FAST changing infrastructures? |
|
| 41. |
What is PUP? |
|
Answer» What is PUP? |
|