Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

_______ are deadly exploits where the vulnerability is known and found by cyber-criminals but not known and fixed by the owner of that application or company.(a) Unknown attacks(b) Secret attacks(c) Elite exploits(d) Zero-day exploitsI had been asked this question during an interview.My question is taken from Hacking Terminologies in section Cyber Security of Cyber Security

Answer»

Right answer is (d) Zero-day exploits

Easy explanation: Zero-day exploits are USED to ATTACK a system as soon as cyber-criminals came to know about the weakness or the day the weaknesses are discovered in a system. HACKERS exploit these types of vulnerabilities before the CREATOR releases the patch or fix the issue.

2.

Zero-day exploits are also called __________(a) zero-day attacks(b) hidden attacks(c) un-patched attacks(d) un-fixed exploitsI had been asked this question in an interview for internship.My question is taken from Hacking Terminologies topic in section Cyber Security of Cyber Security

Answer»

Correct CHOICE is (a) zero-day ATTACKS

Easiest explanation: Zero-day exploits are also CALLED zero-day attacks where the vulnerability is known and found by cyber-criminals or ETHICAL hackers but not known and FIXED by the creator/owner of that application or company.

3.

Point-of-sale intrusion does not deal with financial details and credit card information.(a) True(b) FalseThis question was addressed to me in quiz.Query is from Hacking Terminologies topic in section Cyber Security of Cyber Security

Answer»

Correct option is (b) False

For explanation: Point-of-sale intrusion is an attack that DEALS with financial details and credit card information, where the payment SYSTEM of the COMPANY or retailer is compromised and left with customer’s financial information at risk.

4.

When you book online tickets by swiping your card, the details of the card gets stored in ______(a) database system(b) point-of-sale system(c) servers(d) hard drivesI got this question during an interview for a job.I want to ask this question from Hacking Terminologies topic in chapter Cyber Security of Cyber Security

Answer»

The CORRECT option is (b) point-of-sale system

The explanation is: The point-of-sale system is a system where the retailer or company stores financial records and card details of the e-commerce system or ONLINE BUSINESS transactions.

5.

RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the hard drive.(a) True(b) FalseI had been asked this question in an interview.I'd like to ask this question from Hacking Terminologies topic in division Cyber Security of Cyber Security

Answer»

The correct OPTION is (a) True

Explanation: It is a SPECIAL kind of malware that looks for SENSITIVE data that you’ve stored in your hard drive. RAM-scraping is one of those KINDS.

6.

Identity theft is the term used when a cyber-thief uses anybody’s personal information to impersonate the victim for their benefit.(a) True(b) FalseI got this question by my college director while I was bunking the class.Question is from Hacking Terminologies topic in section Cyber Security of Cyber Security

Answer»

Right option is (a) True

The BEST I can explain: IDENTITY theft is the term used when a cyber-thief uses anybody’s personal information to impersonate the victim for their BENEFIT. In this type of cyber-crime, information like social security NUMBER, personal details, and images, hobbies and passion details, driving license number and address details are COMPROMISED.

7.

_________ is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic.(a) Cyber-replication(b) Mimicking(c) Website-Duplication(d) PharmingI got this question during an online exam.Enquiry is from Hacking Terminologies topic in portion Cyber Security of Cyber Security

Answer»

Right choice is (a) Cyber-replication

To elaborate: The technique and approach through which cyber-crooks DEVELOP FAKE web pages and SITES to trick people for gaining personal DETAILS such as login ID and PASSWORD as well as personal information, is known as pharming.

8.

______ is the term used for toolkits that are purchased and used for targeting different exploits.(a) Exploit bag(b) Exploit set(c) Exploit Toolkit(d) Exploit packThe question was asked in an online quiz.My question is based upon Hacking Terminologies topic in chapter Cyber Security of Cyber Security

Answer»

Right answer is (d) EXPLOIT pack

To ELABORATE: Exploit pack or Exploit kit is the term USED for toolkits that are purchased and used for TARGETING different exploits.

9.

____________ is the way or technique through which majority of the malware gets installed in our system.(a) Drive-by click(b) Drive-by redirection(c) Drive-by download(d) Drive-by injecting USB devicesI had been asked this question during an interview.I'd like to ask this question from Hacking Terminologies topic in division Cyber Security of Cyber Security

Answer» RIGHT CHOICE is (C) Drive-by download

To elaborate: An ACCIDENTAL yet dangerous action that takes place in the cyberspace which helps attackers place their malware into the victim’s system. This technique is called Drive-by download.
10.

__________ is the practice implemented to spy someone using technology for gathering sensitive information.(a) Cyber espionage(b) Cyber-spy(c) Digital Spying(d) SpywareThe question was asked in an online interview.This interesting question is from Hacking Terminologies in portion Cyber Security of Cyber Security

Answer»

Correct answer is (a) Cyber espionage

For EXPLANATION: Cyber espionage is a practice done by both ethical and non-ethical hackers to SPY on OTHERS for gathering CONFIDENTIAL information.

11.

_____________ is a technique used when artificial clicks are made which increases revenue because of pay-per-click.(a) Clickjacking(b) Clickfraud(c) Keylogging(d) Click-hackingI had been asked this question by my school principal while I was bunking the class.This question is from Hacking Terminologies topic in division Cyber Security of Cyber Security

Answer»

The CORRECT answer is (b) Clickfraud

Easy explanation: Clickfraud is an attack technique USED when ARTIFICIAL clicks get GENERATED to increase the REVENUE in ad-campaigns online.

12.

___________ is a device which secretly collects data from credit / debit cards.(a) Card Skimmer(b) Data Stealer(c) Card Copier(d) Card clonerThis question was addressed to me in an online quiz.I want to ask this question from Hacking Terminologies in portion Cyber Security of Cyber Security

Answer»

The correct ANSWER is (a) Card SKIMMER

The best I can explain: Card skimmer is hardware that is installed and setup in ATMS secretly so that when any user will swipe or INSERT their card in the ATM, the skimmer will fetch all information from the magnetic STRIP.

13.

____________ is an attempt to steal, spy, damage or destroy computer systems, networks or their associated information.(a) Cyber-security(b) Cyber attack(c) Digital hacking(d) Computer securityI had been asked this question in class test.My question comes from Hacking Terminologies in portion Cyber Security of Cyber Security

Answer»

Correct OPTION is (b) Cyber attack

For explanation: Cyber attack can be defined as an attempt to steal, spy, damage or destroy DIFFERENT COMPONENTS of CYBERSPACE such as computer systems, associated PERIPHERALS, network systems, and information.

14.

____________ is a scenario when information is accessed without authorization.(a) Data infiltration(b) Data Hack(c) Information compromise(d) Data BreachThe question was asked in unit test.I need to ask this question from Hacking Terminologies in section Cyber Security of Cyber Security

Answer» RIGHT OPTION is (d) Data Breach

Explanation: Data breach is the TERM used when the cyber-security incident takes PLACE where sensitive information is accessed without authority.
15.

Whaling is the technique used to take deep and _________ information about any individual.(a) sensitive(b) powerful(c) useless(d) casualI had been asked this question in an interview.This intriguing question comes from Hacking Terminologies topic in portion Cyber Security of Cyber Security

Answer»

The correct choice is (a) sensitive

The explanation is: Whaling uses phishing technique which helps hackers in stealing deep and sensitive information about any member of an organization. The information can be private addresses, PHONE number, FUTURE plans and projects, SALARY and BONUSES.

16.

_________ are a specific section of any virus or malware that performs illicit activities in a system.(a) Malicious programs(b) Worms(c) Spyware(d) PayloadI had been asked this question in my homework.I'd like to ask this question from Hacking Terminologies topic in chapter Cyber Security of Cyber Security

Answer» CORRECT choice is (d) Payload

To explain I would SAY: Payloads are parts of a VIRUS that helps in performing MALICIOUS ACTIVITIES such as destroying information, blocking network traffic, compromising data, steal and spy for sensitive information.
17.

In IP address, IP is abbreviated as __________(a) Internet Program(b) Internet Protocol(c) Intuition Programs(d) Internet PathwayThis question was addressed to me by my school teacher while I was bunking the class.The question is from Hacking Terminologies topic in portion Cyber Security of Cyber Security

Answer»

Correct option is (b) Internet Protocol

The explanation: In IP ADDRESS, IP is ABBREVIATED as Internet Protocol. It acts as a unique address or IDENTIFIER of any COMPUTER or device in the internet.

18.

Finding & publishing any user’s identity with the help of different personal details is called ________(a) Doxing(b) Data breaching(c) Personal data copying(d) Secure File Transferring ProtocolThis question was addressed to me in an interview for internship.My doubt is from Hacking Terminologies topic in division Cyber Security of Cyber Security

Answer» RIGHT OPTION is (a) Doxing

Easy explanation: When an IDENTITY of internet USER is discovered and published by following his/her details over the internet is CALLED doxing.
19.

Backdoors are also known as ____________(a) Trap doors(b) Front doors(c) Cover doors(d) Back entryI have been asked this question during an internship interview.This interesting question is from Hacking Terminologies topic in division Cyber Security of Cyber Security

Answer»

Right option is (a) TRAP doors

The explanation: Trap-doors are hidden ENTRY POINTS in any already hacked SYSTEM that is set to bypass SECURITY measures.

20.

________ automates an action or attack so that repetitive tasks are done at a faster rate.(a) Auto-bots(b) Cookie-bots(c) Robots(d) BotsI have been asked this question by my college director while I was bunking the class.This intriguing question comes from Hacking Terminologies in section Cyber Security of Cyber Security

Answer»

The correct answer is (d) BOTS

The best explanation: Bots are a set of CODES WRITTEN which helps to perform REPETITIVE TASKS at a much faster rate than humans.

21.

Adware are pre-chosen _______ developed to display ads.(a) banner(b) software(c) malware(d) sharewareI had been asked this question in semester exam.I want to ask this question from Hacking Terminologies in division Cyber Security of Cyber Security

Answer»

Right option is (B) software

The explanation is: ADWARE is software that is DISPLAYED on system or web pages for SHOWING pre-chosen ADS.

22.

________ is an attack technique occurs when excess data gets written to a memory block.(a) Over buffering(b) Buffering(c) Buffer overflow(d) Memory fullThis question was addressed to me by my school principal while I was bunking the class.Origin of the question is Hacking Terminologies topic in division Cyber Security of Cyber Security

Answer» CORRECT choice is (C) BUFFER overflow

The best explanation: Buffer overflow is a flaw that occurs in memory when excessive DATA is written which makes the buffer allocated to seize.
23.

Data masking is also known as _________(a) Data obfuscation(b) Data copying(c) Data breaching(d) Data duplicatingI have been asked this question in my homework.This intriguing question comes from Hacking Terminologies in portion Cyber Security of Cyber Security

Answer» RIGHT answer is (a) Data obfuscation

Best explanation: Data obfuscation is the alternate TERM USED for data masking, that is used for developing or creating a structurally SIMILAR version of data of any ORGANIZATION that is not authentic. These types of unauthentic data are purposefully created for protecting the actual data.
24.

_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.(a) Data copying(b) Data masking(c) Data breaching(d) Data duplicatingThe question was posed to me by my college professor while I was bunking the class.Question is taken from Hacking Terminologies in chapter Cyber Security of Cyber Security

Answer»

Right choice is (B) Data masking

To elaborate: Data masking is the method used for developing or CREATING a structurally similar VERSION of data of any organization that is not authentic. These TYPES of unauthentic data are purposefully created for protecting the actual data.

25.

_________ is an act of hacking by the means of which a political or social message is conveyed.(a) Hacktivism(b) Whistle-blowing(c) Surveillance(d) PseudonymizationI had been asked this question in unit test.This interesting question is from Hacking Terminologies topic in chapter Cyber Security of Cyber Security

Answer»

The correct choice is (a) Hacktivism

Explanation: Hacktivism is an ACT of defacing a WEBSITE, or any network or SYSTEM. Systems and networks are compromised with a political or social AGENDA.

26.

________ is a way to breach the security by using the vulnerability of that system.(a) Threat(b) Vulnerability(c) Exploit(d) AttackThis question was posed to me by my school teacher while I was bunking the class.Asked question is from Hacking Terminologies topic in portion Cyber Security of Cyber Security

Answer»

The correct answer is (C) Exploit

To elaborate: An exploit can be any data, piece of code, a PROGRAM, SEQUENCE of commands or any SOFTWARE that uses the vulnerability or flaw of a SYSTEM and helps attackers or cyber-criminals cause unanticipated behaviour.

27.

An/A ________ is an act that violates cyber-security.(a) Threat(b) Vulnerability(c) Exploit(d) AttackThis question was addressed to me in an online interview.I'm obligated to ask this question of Hacking Terminologies in portion Cyber Security of Cyber Security

Answer»

The correct answer is (d) Attack

The explanation: An “attack” or “cyber-attack” is an attempt taken by attackers to ALTER, DELETE, steal or EXPOSE any SPECIFIC data by gaining unauthorized access.

28.

When any IT product, system or network is in need for testing for security reasons, then the term used is called _________(a) Threat(b) Vulnerability(c) Target of Evaluation(d) AttackThis question was addressed to me by my college director while I was bunking the class.The above asked question is from Hacking Terminologies topic in section Cyber Security of Cyber Security

Answer»

Correct option is (C) Target of Evaluation

For explanation I would SAY: Target of Evaluation is the term used when any IT infrastructure, system, NETWORK require evaluation for SECURITY reasons or for FIXING any bugs after being tested by penetration testers.

29.

Existence of weakness in a system or network is called _______(a) Threat(b) Vulnerability(c) Exploit(d) AttackThe question was asked in examination.This interesting question is from Hacking Terminologies topic in chapter Cyber Security of Cyber Security

Answer» CORRECT answer is (b) Vulnerability

To EXPLAIN: Vulnerability is the term used to define WEAKNESS in any network or system that can get exploited by an attacker. Exploiting the weakness can lead to the UNEXPECTED & UNDESIRABLE event in cyber security.
30.

________ is any action that might compromise cyber-security.(a) Threat(b) Vulnerability(c) Exploit(d) AttackI have been asked this question during an interview for a job.Asked question is from Hacking Terminologies in division Cyber Security of Cyber Security

Answer»

Right CHOICE is (a) Threat

Explanation: Threat can be termed as a possible DANGER that may lead to BREACH the cyber SECURITY and may cause possible harm to the system or the NETWORK.