InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
_______ are deadly exploits where the vulnerability is known and found by cyber-criminals but not known and fixed by the owner of that application or company.(a) Unknown attacks(b) Secret attacks(c) Elite exploits(d) Zero-day exploitsI had been asked this question during an interview.My question is taken from Hacking Terminologies in section Cyber Security of Cyber Security |
|
Answer» Right answer is (d) Zero-day exploits |
|
| 2. |
Zero-day exploits are also called __________(a) zero-day attacks(b) hidden attacks(c) un-patched attacks(d) un-fixed exploitsI had been asked this question in an interview for internship.My question is taken from Hacking Terminologies topic in section Cyber Security of Cyber Security |
|
Answer» Correct CHOICE is (a) zero-day ATTACKS |
|
| 3. |
Point-of-sale intrusion does not deal with financial details and credit card information.(a) True(b) FalseThis question was addressed to me in quiz.Query is from Hacking Terminologies topic in section Cyber Security of Cyber Security |
|
Answer» Correct option is (b) False |
|
| 4. |
When you book online tickets by swiping your card, the details of the card gets stored in ______(a) database system(b) point-of-sale system(c) servers(d) hard drivesI got this question during an interview for a job.I want to ask this question from Hacking Terminologies topic in chapter Cyber Security of Cyber Security |
|
Answer» The CORRECT option is (b) point-of-sale system |
|
| 5. |
RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the hard drive.(a) True(b) FalseI had been asked this question in an interview.I'd like to ask this question from Hacking Terminologies topic in division Cyber Security of Cyber Security |
|
Answer» The correct OPTION is (a) True |
|
| 6. |
Identity theft is the term used when a cyber-thief uses anybody’s personal information to impersonate the victim for their benefit.(a) True(b) FalseI got this question by my college director while I was bunking the class.Question is from Hacking Terminologies topic in section Cyber Security of Cyber Security |
|
Answer» Right option is (a) True |
|
| 7. |
_________ is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic.(a) Cyber-replication(b) Mimicking(c) Website-Duplication(d) PharmingI got this question during an online exam.Enquiry is from Hacking Terminologies topic in portion Cyber Security of Cyber Security |
|
Answer» Right choice is (a) Cyber-replication |
|
| 8. |
______ is the term used for toolkits that are purchased and used for targeting different exploits.(a) Exploit bag(b) Exploit set(c) Exploit Toolkit(d) Exploit packThe question was asked in an online quiz.My question is based upon Hacking Terminologies topic in chapter Cyber Security of Cyber Security |
|
Answer» Right answer is (d) EXPLOIT pack |
|
| 9. |
____________ is the way or technique through which majority of the malware gets installed in our system.(a) Drive-by click(b) Drive-by redirection(c) Drive-by download(d) Drive-by injecting USB devicesI had been asked this question during an interview.I'd like to ask this question from Hacking Terminologies topic in division Cyber Security of Cyber Security |
|
Answer» RIGHT CHOICE is (C) Drive-by download To elaborate: An ACCIDENTAL yet dangerous action that takes place in the cyberspace which helps attackers place their malware into the victim’s system. This technique is called Drive-by download. |
|
| 10. |
__________ is the practice implemented to spy someone using technology for gathering sensitive information.(a) Cyber espionage(b) Cyber-spy(c) Digital Spying(d) SpywareThe question was asked in an online interview.This interesting question is from Hacking Terminologies in portion Cyber Security of Cyber Security |
|
Answer» Correct answer is (a) Cyber espionage |
|
| 11. |
_____________ is a technique used when artificial clicks are made which increases revenue because of pay-per-click.(a) Clickjacking(b) Clickfraud(c) Keylogging(d) Click-hackingI had been asked this question by my school principal while I was bunking the class.This question is from Hacking Terminologies topic in division Cyber Security of Cyber Security |
|
Answer» The CORRECT answer is (b) Clickfraud |
|
| 12. |
___________ is a device which secretly collects data from credit / debit cards.(a) Card Skimmer(b) Data Stealer(c) Card Copier(d) Card clonerThis question was addressed to me in an online quiz.I want to ask this question from Hacking Terminologies in portion Cyber Security of Cyber Security |
|
Answer» The correct ANSWER is (a) Card SKIMMER |
|
| 13. |
____________ is an attempt to steal, spy, damage or destroy computer systems, networks or their associated information.(a) Cyber-security(b) Cyber attack(c) Digital hacking(d) Computer securityI had been asked this question in class test.My question comes from Hacking Terminologies in portion Cyber Security of Cyber Security |
|
Answer» Correct OPTION is (b) Cyber attack |
|
| 14. |
____________ is a scenario when information is accessed without authorization.(a) Data infiltration(b) Data Hack(c) Information compromise(d) Data BreachThe question was asked in unit test.I need to ask this question from Hacking Terminologies in section Cyber Security of Cyber Security |
|
Answer» RIGHT OPTION is (d) Data Breach Explanation: Data breach is the TERM used when the cyber-security incident takes PLACE where sensitive information is accessed without authority. |
|
| 15. |
Whaling is the technique used to take deep and _________ information about any individual.(a) sensitive(b) powerful(c) useless(d) casualI had been asked this question in an interview.This intriguing question comes from Hacking Terminologies topic in portion Cyber Security of Cyber Security |
|
Answer» The correct choice is (a) sensitive |
|
| 16. |
_________ are a specific section of any virus or malware that performs illicit activities in a system.(a) Malicious programs(b) Worms(c) Spyware(d) PayloadI had been asked this question in my homework.I'd like to ask this question from Hacking Terminologies topic in chapter Cyber Security of Cyber Security |
|
Answer» CORRECT choice is (d) Payload To explain I would SAY: Payloads are parts of a VIRUS that helps in performing MALICIOUS ACTIVITIES such as destroying information, blocking network traffic, compromising data, steal and spy for sensitive information. |
|
| 17. |
In IP address, IP is abbreviated as __________(a) Internet Program(b) Internet Protocol(c) Intuition Programs(d) Internet PathwayThis question was addressed to me by my school teacher while I was bunking the class.The question is from Hacking Terminologies topic in portion Cyber Security of Cyber Security |
|
Answer» Correct option is (b) Internet Protocol |
|
| 18. |
Finding & publishing any user’s identity with the help of different personal details is called ________(a) Doxing(b) Data breaching(c) Personal data copying(d) Secure File Transferring ProtocolThis question was addressed to me in an interview for internship.My doubt is from Hacking Terminologies topic in division Cyber Security of Cyber Security |
|
Answer» RIGHT OPTION is (a) Doxing Easy explanation: When an IDENTITY of internet USER is discovered and published by following his/her details over the internet is CALLED doxing. |
|
| 19. |
Backdoors are also known as ____________(a) Trap doors(b) Front doors(c) Cover doors(d) Back entryI have been asked this question during an internship interview.This interesting question is from Hacking Terminologies topic in division Cyber Security of Cyber Security |
|
Answer» Right option is (a) TRAP doors |
|
| 20. |
________ automates an action or attack so that repetitive tasks are done at a faster rate.(a) Auto-bots(b) Cookie-bots(c) Robots(d) BotsI have been asked this question by my college director while I was bunking the class.This intriguing question comes from Hacking Terminologies in section Cyber Security of Cyber Security |
|
Answer» The correct answer is (d) BOTS |
|
| 21. |
Adware are pre-chosen _______ developed to display ads.(a) banner(b) software(c) malware(d) sharewareI had been asked this question in semester exam.I want to ask this question from Hacking Terminologies in division Cyber Security of Cyber Security |
|
Answer» Right option is (B) software |
|
| 22. |
________ is an attack technique occurs when excess data gets written to a memory block.(a) Over buffering(b) Buffering(c) Buffer overflow(d) Memory fullThis question was addressed to me by my school principal while I was bunking the class.Origin of the question is Hacking Terminologies topic in division Cyber Security of Cyber Security |
|
Answer» CORRECT choice is (C) BUFFER overflow The best explanation: Buffer overflow is a flaw that occurs in memory when excessive DATA is written which makes the buffer allocated to seize. |
|
| 23. |
Data masking is also known as _________(a) Data obfuscation(b) Data copying(c) Data breaching(d) Data duplicatingI have been asked this question in my homework.This intriguing question comes from Hacking Terminologies in portion Cyber Security of Cyber Security |
|
Answer» RIGHT answer is (a) Data obfuscation Best explanation: Data obfuscation is the alternate TERM USED for data masking, that is used for developing or creating a structurally SIMILAR version of data of any ORGANIZATION that is not authentic. These types of unauthentic data are purposefully created for protecting the actual data. |
|
| 24. |
_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.(a) Data copying(b) Data masking(c) Data breaching(d) Data duplicatingThe question was posed to me by my college professor while I was bunking the class.Question is taken from Hacking Terminologies in chapter Cyber Security of Cyber Security |
|
Answer» Right choice is (B) Data masking |
|
| 25. |
_________ is an act of hacking by the means of which a political or social message is conveyed.(a) Hacktivism(b) Whistle-blowing(c) Surveillance(d) PseudonymizationI had been asked this question in unit test.This interesting question is from Hacking Terminologies topic in chapter Cyber Security of Cyber Security |
|
Answer» The correct choice is (a) Hacktivism |
|
| 26. |
________ is a way to breach the security by using the vulnerability of that system.(a) Threat(b) Vulnerability(c) Exploit(d) AttackThis question was posed to me by my school teacher while I was bunking the class.Asked question is from Hacking Terminologies topic in portion Cyber Security of Cyber Security |
|
Answer» The correct answer is (C) Exploit |
|
| 27. |
An/A ________ is an act that violates cyber-security.(a) Threat(b) Vulnerability(c) Exploit(d) AttackThis question was addressed to me in an online interview.I'm obligated to ask this question of Hacking Terminologies in portion Cyber Security of Cyber Security |
|
Answer» The correct answer is (d) Attack |
|
| 28. |
When any IT product, system or network is in need for testing for security reasons, then the term used is called _________(a) Threat(b) Vulnerability(c) Target of Evaluation(d) AttackThis question was addressed to me by my college director while I was bunking the class.The above asked question is from Hacking Terminologies topic in section Cyber Security of Cyber Security |
|
Answer» Correct option is (C) Target of Evaluation |
|
| 29. |
Existence of weakness in a system or network is called _______(a) Threat(b) Vulnerability(c) Exploit(d) AttackThe question was asked in examination.This interesting question is from Hacking Terminologies topic in chapter Cyber Security of Cyber Security |
|
Answer» CORRECT answer is (b) Vulnerability To EXPLAIN: Vulnerability is the term used to define WEAKNESS in any network or system that can get exploited by an attacker. Exploiting the weakness can lead to the UNEXPECTED & UNDESIRABLE event in cyber security. |
|
| 30. |
________ is any action that might compromise cyber-security.(a) Threat(b) Vulnerability(c) Exploit(d) AttackI have been asked this question during an interview for a job.Asked question is from Hacking Terminologies in division Cyber Security of Cyber Security |
|
Answer» Right CHOICE is (a) Threat |
|