Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Phishing emails include fake notifications from banks and e-payment systems.

Answer» PHISHING emails include fake NOTIFICATIONS from banks and e-payment systems.
Choose the correct options from below list
(1)False
(2)TRUE

Answer:-(2)True
2.

Threats can exploit assets if assets are not vulnerable.

Answer»

Threats can exploit assets if assets are not vulnerable.
Choose the correct options from below LIST
(1)TRUE
(2)False

Answer:-(2)False

3.

The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as ______

Answer»

The process of converting a message to an unintelligible form with the help of an algorithm and a KEY is KNOWN as _______.
Choose correct option from below list
(1)Cryptography
(2)ENCRYPTION
(3)Cryptanalysis
(4)Cryptology

Answer:-(2)Encryption

4.

An error message displayed on the system symbolizes virus infection.

Answer»

An ERROR message DISPLAYED on the system symbolizes VIRUS infection.
Choose correct OPTION from below LIST
(1)False
(2)True

Answer:-(1)False

5.

_________ is a standalone software that does not need human help/host program to spread.

Answer»

_________ is a standalone software that does not need human help HOST program to spread.
CHOOSE correct option from below list
(1)Ransomware
(2)Worm
(3)TROJAN
(4)Virus

Answer:-(2)Worm

6.

Hardware or Software that prevents outsiders from obtaining unauthorized access to the internal information resource is

Answer» HARDWARE or Software that prevents outsiders from OBTAINING unauthorized access to the internal information resource is
Choose the correct answer from below LIST
(1)Antivirus
(2)Firewall
(3)Spyware

Answer:-(2)Firewall
7.

Define various codes from a web application in term of cyber security?

Answer»

Define various codes from a web application in term of cyber security?
Below are the DIFFERENT various codes from web application in term of cyber security:-
(1)1xx information responses
(2)2xx SUCCESS
(3)3xx REDIRECTION
(4)4XX client side error
(5)5xx server side error

8.

How do we define RADIUS?

Answer»

How do we define RADIUS?
CHOOSE the correct options from below list
(1)REMOTE Authorization Dial-In User Service.
(2)Remote Authentication Dial-In Unified Service.
(3)Remote Authentication Dial-In User Service.
(4)Remote Authentication Service.

Answer:-(3)Remote Authentication Dial-In User Service.

9.

Which of these is true with respect to passwords?

Answer»

Which of these is true with respect to passwords?
Choose the CORRECT options from below LIST
(1)Passwords need to be easy
(2)None of the options
(3)Passwords can be kept openly
(4)Passwords need to be at least 8 CHARS of LENGTH

Answer:-(4)Passwords need to be at least 8 chars of length

10.

Which of the following attributes is not a PII?

Answer»

Which of the following attributes is not a PII?
Choose correct option from below LIST
(1)IP Address
(2)Account NUMBERS
(3)Social Security NUMBER
(4)Credit CARD Information
(5)Date of Birth

Answer:-(1)IP Address

11.

Which of the following is an attack against availability?

Answer»

Which of the following is an ATTACK against availability?
Choose correct option from below list
(1)DoS Attack
(2)Birthday Attack
(3)ZERO Day Attack
(4)Man in the Middle Attack

Answer:-(1)DoS Attack

12.

The type of malware that tricks users by making them believe that their computer has been infected with a virus is calle

Answer»

The TYPE of malware that tricks USERS by making them believe that their computer has been infected with a VIRUS is called __________.
CHOOSE correct option from below list
(1)SPYWARE
(2)Ransomware
(3)Scareware
(4)Rootkits

Answer:-(3)Scareware

13.

Which of the following malware is designed for advertising, such as pop-up screens?

Answer»

Which of the FOLLOWING malware is designed for ADVERTISING, such as pop-up SCREENS?
CHOOSE correct option from below list
(1)Viruses
(2)Ransomware
(3)Adware
(4)Spyware

Answer:-(3)Adware

14.

A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attackers pov is called __

Answer»

A process by which potential vulnerabilities and threats can be recognized, enumerated, and PRIORITIZED from a hypothetical attackers POV is called ___________.
Choose the CORRECT options from below LIST
(1)Threat Hunting
(2)Threat Modeling
(3)Threat Landscaping
(4)Threat Analysis

Answer:-(2)Threat Modeling

15.

Which of these are Threats related to Email Security?

Answer»

Which of these are Threats related to Email Security?
CHOOSE the correct OPTIONS from below list
(1)Spam
(2)Pharming
(3)PHISHING
(4)All the options
(5)Spoofing

Answer:-(4)All the options

16.

Which of the following attack method aims to gather confidential information by deceiving the victim?

Answer»

Which of the FOLLOWING attack METHOD aims to gather confidential information by deceiving the victim?
CHOOSE correct option from below list
(1)Spoofing
(2)PHISHING
(3)Drive-by Download
(4)Spamming

Answer:-(2)Phishing

17.

As an email client, we should not use caution when opening emails and can download any attachments.

Answer»

As an email CLIENT, we should not USE CAUTION when opening emails and can download any attachments.
Choose the correct options from below LIST
(1)TRUE
(2)False

Answer:-(2)False

18.

Which encryption method is more suitable for quickly encrypting large amounts of data?

Answer»

Which encryption method is more suitable for QUICKLY encrypting LARGE AMOUNTS of data?
Choose the correct options from below list
(1)SYMMETRIC Key Encryption
(2)Assymmetric Key Encryption

Answer:-(1)Symmetric Key Encryption

19.

Which of these are examples biometrics?

Answer»

Which of these are EXAMPLES biometrics?
CHOOSE the correct options from below list
(1)All the options
(2)Signature
(3)IRIS
(4)Gait

Answer:-(1)All the options

20.

Malware cannot inflict physical damage to systems.

Answer»

Malware cannot inflict physical damage to systems.
Choose CORRECT OPTION from below list
(1)TRUE
(2)False

Answer:-(2)False

21.

A ________ is a credit card sized card with an embedded chip, containing information about the user

Answer»

A ________ is a credit card SIZED card with an embedded chip, containing information about the user
Choose the correct options from below list
(1)MEMORY Card
(2)Smart Card
(3)Credit Card
(4)DEBIT Card

Answer:-(2)Smart Card

22.

__________ is a proactive process to predict potential risks efficiently.

Answer»

__________ is a proactive process to PREDICT potential RISKS efficiently.
Choose the correct options from below list
(1)Threat Hunting
(2)Threat Landscaping
(3)Threat Analysin
(4)Threat Modeling

Answer:-(1)Threat Hunting

23.

Passive attacks are considered a threat to _______.

Answer»

Passive ATTACKS are considered a threat to _______.
Choose the correct options from below list
(1)AVAILABILITY
(2)INTEGRITY
(3)Authenticity
(4)Confidentiality

Answer:-(4)Confidentiality

24.

The method of protecting programs, networks, and systems from digital attacks is commonly known as __________.

Answer»

The method of protecting programs, networks, and systems from DIGITAL ATTACKS is commonly known as __________.
Choose CORRECT option from below list
(1)CRYPTOGRAPHY
(2)Cryptanalysis
(3)Cybersecurity
(4)Cryptology

Answer:-(3)Cybersecurity

25.

What is Port Scanning

Answer»

What is Port Scanning
Port scanning is a method to determine which ports on a specific network are open and COULD also SEND or receive data. In other we can also SAY that it is a PROCESS for sending packets to some specific ports on a host and we can also analyze RESPONSE to identify vulnerabilities.

26.

Basic one line definition for Firewall?

Answer»

Basic one line DEFINITION for Firewall?
Firewall is a device that either ALLOWS or block traffic as per defined some set of rules. And these device are placed on the boundary of any trusted or untrusted NETWORKS.

27.

If a student gains unauthorized access to the student database and modifies his/her marks, what type of violation would

Answer»

If a student gains unauthorized access to the student database and modifies his/her marks, what type of VIOLATION would it be?
Choose correct OPTION from below LIST
(1)Confidentiality
(2)Both the options
(3)Integrity

Answer:-(2)Both the options

28.

Which of the following is an intangible asset?

Answer»

Which of the following is an intangible ASSET?
CHOOSE correct option from below list
(1)Hardware components
(2)Business Premises
(3)Inventory and Machinery
(4)Trade SECRETS

Answer:-(4)Trade Secrets

29.

Which of the following is an effective solution to ensure confidentiality?

Answer»

Which of the following is an effective solution to ensure confidentiality?
Choose correct OPTION from below list
(1)LOGGING and Auditing
(2)Data Hiding
(3)Network Monitoring
(4)ENCRYPTION

Answer:-(4)Encryption

30.

Programs that are specifically designed to disrupt the performance of computers/networks are commonly known as __________.

Answer»

Programs that are SPECIFICALLY DESIGNED to disrupt the performance of computers/networks are commonly known as __________.
Choose correct option from below list
(1)Ransomware
(2)Trojans
(3)Virus
(4)Malware

Answer:-(1)Ransomware

31.

A type of assessment that is often performed in a sandbox virtual environment to prevent malware from actually

Answer»

A type of assessment that is often PERFORMED in a sandbox-virtual environment to prevent malware from actually infecting production SYSTEMS is KNOWN as _________.
Choose the correct answer from below list
(1)Black Box Testing
(2)STATIC Analysis
(3)Dynamic Analysis
(4)Penetration Testing

Answer:-(3)Dynamic Analysis

32.

A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called ________

Answer»

A kind of a network attack, where an UNAUTHORIZED person GAINS access to a network and remains there undetected for a long duration is called _________.
Choose the correct options from below LIST
(1)Hidden THREATS
(2)Invisible Threats
(3)MALICIOUS threats
(4)Advanced Persistent Threats

Answer:-(4)Advanced Persistent Threats

33.

The security posture of an organization is defined by the ______ link in the chain.

Answer»

The security posture of an organization is DEFINED by the ______ link in the chain.
Choose the correct ANSWER from below LIST
(1)WEAKEST
(2)Strongest
(3)Average

Answer:-(1)Weakest

34.

Which of the following are the three phases of Incident response maturity assessment?

Answer»

Which of the following are the three phases of Incident response maturity assessment?
CHOOSE the CORRECT options from below list
(1)IDENTIFY, Decompose, and Mitigate
(2)Prepare, Identify, and analyze
(3)Prepare, Response, and Follow-up
(4)Reconnaissance, Installation, COMMAND, and control

Answer:-(3)Prepare, Response, and Follow-up

35.

Hash functions can be leveraged to ensure ________.

Answer» HASH functions can be leveraged to ENSURE ________.
Choose CORRECT OPTION from below LIST
(1)Availability
(2)Confidentiality
(3)Authentication
(4)Integrity

Answer:-(4)Integrity
36.

A proactive process to predict potential risks efficiently.

Answer»

A proactive process to predict potential risks efficiently.
Choose the correct answer from below LIST
(1)Threat ANALYSIS
(2)Threat MODELING
(3)Threat HUNTING
(4)Threat Landscaping

Answer:-(3)Threat Hunting

37.

As an application of cryptography, digital Signatures and MACs can be used for_____________

Answer»

As an application of cryptography, DIGITAL SIGNATURES and MACs can be used for_____________.
Choose correct option from below LIST
(1)Authentication
(2)CONFIDENTIALITY
(3)Integrity
(4)Availability

Answer:-(1)Authentication

38.

Which of the following can be considered as an effective solution to ensure integrity?

Answer»

Which of the following can be CONSIDERED as an effective solution to ensure integrity?
Choose the correct answer from below list
(1)Encryption
(2)Intrusion Detection SYSTEMS
(3)DATA Hiding
(4)Abstraction

Answer:-(2)Intrusion Detection Systems

39.

SABSA Framework is commonly represented as _______ SABSA matrix.

Answer»

SABSA Framework is commonly represented as _______ SABSA matrix.
Choose the correct OPTIONS from below list
(1)6X6
(2)8x8
(3)4x4
(4)5x5

Answer:-(1)6x6

40.

Which of the following is used to draw in users and infect them and deploy fast

Answer»

Which of the FOLLOWING is used to draw in users and INFECT them and deploy FAST changing infrastructures?
CHOOSE correct option from below LIST
(1)Malnet
(2)Botnet
(3)Honeynet
(4)Trojans

Answer:-(1)Malnet

41.

What is PUP?

Answer»

What is PUP?
Choose CORRECT option from below list
(1)PRACTICALLY Unrelated Program
(2)Practially UNWANTED Program
(3)Potentially Unwanted Program
(4)Potentially Unwanted Procss

Answer:-(3)Potentially Unwanted Program