InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
CVE is a directory of lists of publicly recognized information security vulnerabilities as well as exposures.(a) True(b) FalseI had been asked this question in quiz.The above asked question is from Exploits and Exploitation in section Cyber Security of Cyber Security |
|
Answer» CORRECT choice is (a) True For EXPLANATION: CVE is a directory of lists of publicly recognized information security VULNERABILITIES as well as exposures. It is available from the LINK https://cve.mitre.org. |
|
| 2. |
National Vulnerability Database (NVD) is _________________ repository of data regarding vulnerability standards.(a) U.S. government(b) India government(c) Russian government(d) China GovernmentI had been asked this question in unit test.Origin of the question is Exploits and Exploitation topic in division Cyber Security of Cyber Security |
|
Answer» Correct OPTION is (a) U.S. GOVERNMENT |
|
| 3. |
___________________ are some very frequent updates that come for every anti-virus.(a) Patch update(b) Data update(c) Code update(d) Definition updateThis question was posed to me in a national level competition.Enquiry is from Exploits and Exploitation topic in portion Cyber Security of Cyber Security |
|
Answer» Right choice is (d) Definition update |
|
| 4. |
Known bugs can be solved or removed by __________________ develop by the vendors of the application.(a) removing the application(b) changing the software(c) installing security patches(d) installing database patchesThe question was asked at a job interview.The origin of the question is Exploits and Exploitation topic in division Cyber Security of Cyber Security |
|
Answer» The CORRECT choice is (C) installing security patches |
|
| 5. |
A ____________ is a set of changes done to any program or its associated data designed for updating, fixing, or improving it.(a) scratch(b) patch(c) fixer(d) resolverThe question was asked in an interview for job.The query is from Exploits and Exploitation in chapter Cyber Security of Cyber Security |
|
Answer» The correct option is (b) patch |
|
| 6. |
Fixing of security vulnerabilities in a system by additional programs is known as __________ patches.(a) hacking(b) database(c) server(d) securityThis question was addressed to me by my college professor while I was bunking the class.My question is based upon Exploits and Exploitation topic in portion Cyber Security of Cyber Security |
|
Answer» RIGHT option is (d) security To ELABORATE: Fixing of security vulnerabilities in a system by additional programs is known as security patches. These type of patches HELPS in fixing security BUGS and improving the overall security of the system. |
|
| 7. |
Known exploits have a confirmation of and measures can be taken against it to resolve them.(a) True(b) FalseI have been asked this question in examination.This key question is from Exploits and Exploitation in section Cyber Security of Cyber Security |
|
Answer» CORRECT option is (a) True Easiest EXPLANATION: Known exploits have a confirmation of and measures can be TAKEN against it to resolve them. These types of vulnerabilities and exploit details are AVAILABLE online in blogs and sites. |
|
| 8. |
Unknown exploits are those exploits that have not yet been reported openly and hence present a straightforward attack at firms and the government agencies.(a) True(b) FalseThis question was addressed to me in an internship interview.The question is from Exploits and Exploitation in section Cyber Security of Cyber Security |
|
Answer» Correct OPTION is (a) True |
|
| 9. |
How many types of exploits are there based on their nature from hacking’s perspective?(a) 4(b) 3(c) 2(d) 5This question was posed to me by my school principal while I was bunking the class.This intriguing question comes from Exploits and Exploitation in portion Cyber Security of Cyber Security |
|
Answer» Right option is (c) 2 |
|
| 10. |
There are __________ types of exploits based on their working.(a) two(b) three(c) four(d) fiveThis question was addressed to me in unit test.I'm obligated to ask this question of Exploits and Exploitation topic in portion Cyber Security of Cyber Security |
|
Answer» The correct option is (a) two |
|
| 11. |
Which of the following are not a vulnerability-listed site/database?(a) Exploit-db(b) Common Vulnerabilities and Exposures (CVE)(c) National Vulnerability Database (NVD)(d) Bing Vulnerability database (BVD)I have been asked this question during an online interview.This intriguing question comes from Exploits and Exploitation in section Cyber Security of Cyber Security |
|
Answer» Correct answer is (d) BING Vulnerability database (BVD) |
|
| 12. |
__________ is the specific search engine for exploits where anyone can find all the exploits associated to vulnerability.(a) Google(b) Bing(c) Exploit-db(d) Exploit-engineI had been asked this question during an internship interview.Asked question is from Exploits and Exploitation in chapter Cyber Security of Cyber Security |
|
Answer» The correct option is (C) Exploit-db |
|
| 13. |
Which of them is not a powerful vulnerability detecting tool?(a) Nessus(b) Nexpose(c) Metasploit(d) NmapThis question was posed to me during an internship interview.This interesting question is from Exploits and Exploitation in division Cyber Security of Cyber Security |
|
Answer» Correct answer is (d) Nmap |
|
| 14. |
The process of finding vulnerabilities and exploiting them using exploitable scripts or programs are known as _____________(a) infiltrating(b) exploitation(c) cracking(d) hackingThis question was addressed to me in class test.My doubt is from Exploits and Exploitation in portion Cyber Security of Cyber Security |
|
Answer» The correct option is (b) exploitation |
|
| 15. |
________________ are piece of programs or scripts that allow hackers to take control over any system.(a) Exploits(b) Antivirus(c) Firewall by-passers(d) WormsThe question was asked in my homework.My doubt is from Exploits and Exploitation topic in section Cyber Security of Cyber Security |
|
Answer» The correct choice is (a) Exploits |
|