Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Someone (from outside) who tests security issues for bugs before launching a system or application, and who is not a part of that organization or company are ______(a) Black Hat hacker(b) External penetration tester(c) Blue Hat hacker(d) White Hat HackerI had been asked this question in an interview.Asked question is from Ethical Hacking in division Introduction to Ethical Hacking of Cyber Security

Answer»

The correct answer is (c) Blue Hat hacker

To elaborate: Blue Hat Hackers are outsiders yet security testers who are TEMPORARILY hired for performing outsourced security test for BUGS and vulnerabilities in any system before launching it to the market or making the APPLICATION live.

2.

Governments hired some highly skilled hackers. These types of hackers are termed as _______(a) Special Hackers(b) Government Hackers(c) Cyber Intelligence Agents(d) Nation / State sponsored hackersThe question was posed to me at a job interview.My question is based upon Ethical Hacking in chapter Introduction to Ethical Hacking of Cyber Security

Answer» CORRECT choice is (d) Nation / State sponsored hackers

To explain I would SAY: Nation / State sponsored hackers are specific individuals who are employed or HIRED by the government of that nation or state and protect the nation from cyber terrorists and other groups or individuals and to reveal their PLANS, communications and actions.
3.

__________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud.(a) Database(b) Network(c) System(d) HardwareThis question was posed to me at a job interview.I would like to ask this question from Ethical Hacking in section Introduction to Ethical Hacking of Cyber Security

Answer»

The correct answer is (a) Database

Best explanation: Database Security consultants are specific individuals hired in order to monitor and SCAN the database systems and keep them secured from unwanted THREATS and attacks by giving access to RESTRICTED users, blocking unwanted files, multi-factor access control ETC.

4.

________ are senior level corporate employees who have the role and responsibilities of creating and designing secured network or security structures.(a) Ethical Hackers(b) Chief Technical Officer(c) IT Security Engineers(d) Security ArchitectI have been asked this question in an internship interview.Enquiry is from Ethical Hacking topic in section Introduction to Ethical Hacking of Cyber Security

Answer»

Right choice is (d) Security Architect

The explanation: Security architect are those senior grade employees of an organization who are in charge of building, designing, IMPLEMENTING and testing of secured network TOPOLOGIES, PROTOCOLS as WELL as secured computers in an organization.

5.

Role of security auditor is to ____________(a) secure the network(b) probe for safety and security of organization’s security components and systems(c) detects and prevents cyber attacks and threats to organization(d) does penetration testing on different web applicationsThe question was posed to me in exam.I want to ask this question from Ethical Hacking in chapter Introduction to Ethical Hacking of Cyber Security

Answer»

Correct choice is (b) probe for SAFETY and security of organization’s security components and systems

For explanation: Security auditors are those who conduct auditing of VARIOUS computer and network systems on an organization or company and reports the safety and security ISSUES as well as helps in suggesting improvements or ENHANCEMENTS in any PARTICULAR system that is threat prone.

6.

_________ are those individuals who maintain and handles IT security in any firm or organization.(a) IT Security Engineer(b) Cyber Security Interns(c) Software Security Specialist(d) Security AuditorI have been asked this question in a job interview.My query is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security

Answer»

Right option is (a) IT Security Engineer

The explanation is: This is an INTERMEDIARY level of position of an INDIVIDUAL in an organization or firm who builds and PRESERVES different SYSTEMS and its associated security TOOLS of the firm of organization to which he/she belongs.

7.

These types of hackers are the most skilled hackers in the hackers’ community. Who are “they” referred to?(a) White hat Hackers(b) Elite Hackers(c) Licensed Penetration Testers(d) Red Hat HackersI had been asked this question in quiz.My query is from Ethical Hacking topic in section Introduction to Ethical Hacking of Cyber Security

Answer»

The correct option is (b) Elite HACKERS

Explanation: The tag “Elite hackers” are considered AMONGST the most reputed hackers who possess most of the HACKING and SECURITY skills. They are treated with utmost respect in the hackers’ community. Zero day vulnerabilities, serious hacking tools and newly introduced bugs are found and developed by them.

8.

One who disclose information to public of a company, organization, firm, government and private agency and he/she is the member or employee of that organization; such individuals are termed as ___________(a) Sponsored hackers(b) Crackers(c) Hactivist(d) WhistleblowersI got this question in my homework.This question is from Ethical Hacking topic in division Introduction to Ethical Hacking of Cyber Security

Answer»

Correct ANSWER is (d) WHISTLEBLOWERS

The explanation: Whistleblowers are those INDIVIDUALS who is a member or an employee of any specific organization and is RESPONSIBLE for DISCLOSING private information of those organizations, firms, either government or private.

9.

Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________(a) State sponsored hackers(b) Blue Hat Hackers(c) Cyber Terrorists(d) Red Hat HackersI have been asked this question in an interview for internship.I need to ask this question from Ethical Hacking in section Introduction to Ethical Hacking of Cyber Security

Answer»

The correct ANSWER is (c) Cyber Terrorists

To explain: Cyber Terrorists are very expert programmers and cyber CRIMINALS who hide themselves while doing MALICIOUS activities over the internet and they are smart ENOUGH to hide themselves or their tracks of action. They are hired for gaining UNAUTHORISED access to nation’s data centres or break into the network of intelligence agencies.

10.

The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________(a) Sponsored Hackers(b) Hactivists(c) Script Kiddies(d) Whistle BlowersThe question was asked during a job interview.Enquiry is from Ethical Hacking topic in section Introduction to Ethical Hacking of Cyber Security

Answer»

Right option is (c) Script KIDDIES

To elaborate: Script Kiddies are new to hacking and at the same time do not have many interests in developing CODING skills or find bugs of their own in systems; rather they prefer downloading of AVAILABLE tools (developed by ELITE HACKERS) and use them to break any system or network. They just try to gain attention of their friend circles.

11.

________ are the combination of both white as well as black hat hackers.(a) Grey Hat hackers(b) Green Hat hackers(c) Blue Hat Hackers(d) Red Hat HackersThis question was posed to me during an online interview.I want to ask this question from Ethical Hacking in division Introduction to Ethical Hacking of Cyber Security

Answer» RIGHT choice is (a) Grey Hat hackers

Explanation: Grey Hat Hackers have a blending character of both ethical as well as un-ethical hacker. They hack other’s systems for fun but do not harm the SYSTEM, EXPLOITS bugs and vulnerabilities in network without the knowledge of the admin or the owner.
12.

Suicide Hackers are those _________(a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity(b) individuals with no knowledge of codes but an expert in using hacking tools(c) who know the consequences of their hacking activities and hence try to prevent them by erasing their digital footprints(d) who are employed in an organization to do malicious activities on other firmsThis question was posed to me in an online quiz.My enquiry is from Ethical Hacking topic in division Introduction to Ethical Hacking of Cyber Security

Answer»

Right answer is (a) who break a system for some specific purpose with or without keeping in mind that they MAY suffer long term imprisonment due to their malicious activity

For explanation: Suicide hackers are those who break into any network or system with or without knowing the CONSEQUENCES of the cyber crime and its penalty. There are some suicide hackers who intentionally do CRIMES and GET caught to bring their names in the headlines.

13.

They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?(a) Gray Hat Hackers(b) White Hat Hackers(c) Hactivists(d) Black Hat HackersThe question was asked by my college professor while I was bunking the class.I would like to ask this question from Ethical Hacking in section Introduction to Ethical Hacking of Cyber Security

Answer»

Correct ANSWER is (d) Black Hat Hackers

Explanation: Black Hat hackers ALSO termed as ‘crackers’ and are a major type of cyber CRIMINALS who TAKE unauthorized ACCESS in user’s account or system and steal sensitive data or inject malware into the system for their profit or to harm the organization.

14.

Which is the legal form of hacking based on which jobs are provided in IT industries and firms?(a) Cracking(b) Non ethical Hacking(c) Ethical hacking(d) HactivismI have been asked this question in a national level competition.Enquiry is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security

Answer»

Right answer is (c) Ethical hacking

The EXPLANATION: Ethical Hacking is an ethical form of hacking DONE by white-hat HACKERS for performing penetration tests and identifying potential threats in any ORGANIZATIONS and firms.

15.

Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________(a) Black Hat hackers(b) White Hat Hackers(c) Grey Hat Hackers(d) Red Hat HackersI had been asked this question in a national level competition.My question is from Ethical Hacking in section Introduction to Ethical Hacking of Cyber Security

Answer»

Correct option is (B) WHITE Hat Hackers

The explanation is: White Hat Hackers are cyber security analysts and consultants who have the intent to HELP firms and Governments in the IDENTIFICATION of loopholes as well as help to perform PENETRATION tests for securing a system.

16.

Who was the first individual to distribute computer worms through internet?(a) Vladimir Levin(b) Bill Landreth(c) Richard Stallman(d) Robert T. MorrisI got this question in a job interview.My question comes from Ethical Hacking topic in section Introduction to Ethical Hacking of Cyber Security

Answer»

Correct choice is (d) Robert T. MORRIS

For explanation: RobertTappan Morris, a Cornell University graduate student DEVELOPED Morris WORM in 1988 and was accused of the crime (under US Computer FRAUD and Abuse Act.) for spreading computer WORMS through Internet.

17.

_____ is a powerful encryption tool released by Philip Zimmerman in the year 1991.(a) PGP (Protected Good Privacy)(b) AES (Advanced Encryption Standard)(c) PGP (Pretty Good Privacy)(d) DES (Data Encryption Standard)This question was addressed to me during an interview for a job.My question comes from Ethical Hacking in division Introduction to Ethical Hacking of Cyber Security

Answer»

Correct answer is (c) PGP (Pretty Good Privacy)

Explanation: This encryption program package name PGP (Pretty Good Privacy) became popular ACROSS the globe because it helps in providing authentication in data communication as WELL as help in maintaining privacy through cryptographic algorithms by encryption & decryption of plain TEXTS (in emails and files) to CIPHER texts and vice versa.

18.

In which year the Computer Fraud & Abuse Act was adopted in the United States?(a) 1983(b) 1984(c) 1987(d) 1988This question was posed to me in an interview for job.Asked question is from Ethical Hacking topic in chapter Introduction to Ethical Hacking of Cyber Security

Answer»

Correct answer is (b) 1984

The best explanation: This Cyber security bill got passed in the US in the year 1984 keeping this in concern that any COMPUTER RELATED CRIMES do not go unpunished. This LAW also restricts users from unauthorized access of computer or data associated with it.

19.

In which year computer scientists try to integrate encryption techniques in TCP/IP protocol?(a) 1978(b) 1980(c) 1982(d) 1984The question was posed to me in an interview for internship.The question is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security

Answer»

Right option is (a) 1978

The explanation is: TCP/IP suite needs prior security as it is one of the most POPULARLY used protocol SUITES and hence some computer SCIENTISTS in the year 1978, ATTEMPTS to INTEGRATE the security algorithms though they face many impediments in this regard.

20.

Who coined the term “cyberspace”?(a) Andrew Tannenbaum(b) Scott Fahlman(c) William Gibson(d) Richard StallmanI had been asked this question by my college director while I was bunking the class.My question is taken from Ethical Hacking in section Introduction to Ethical Hacking of Cyber Security

Answer»

Right choice is (c) William Gibson

Easy explanation: In the year 1821, an American – Canadian fiction PIONEER cum writer, William Gibson explored the different streams of technologies and coined the term “cyberspace”. The term DEFINES interconnected technologies that help in sharing information, interact with digital DEVICES, storage and digital entertainment, computer and network SECURITY and stuff RELATED to information technology.

21.

Name the hacker who breaks the ARPANET systems?(a) Jon von Neumann(b) Kevin Poulsen(c) Kevin Mitnick(d) John DraperThis question was posed to me in an online quiz.My doubt stems from Ethical Hacking in chapter Introduction to Ethical Hacking of Cyber Security

Answer» RIGHT answer is (B) Kevin Poulsen

Easiest EXPLANATION: The ARPANET (Advanced Research Project Agency Network) got HACKED by Kevin Poulsen as he breaks into the Pentagon network and their associated system but got caught immediately in the year 1983.
22.

Who was the first individual who performed a major hacking in the year 1971?(a) Steve Wozniak(b) Steve Jobs(c) Kevin Mitnick(d) John DraperI have been asked this question in quiz.Query is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security

Answer»

Right option is (d) John Draper

For explanation I would say: In the YEAR 1971,a VIETNAM guy name John Draper figured it out as how to MAKE phone calls free of cost. This type of phone hacking is termed Phreaking.

23.

In which year, hacking became a practical crime and a matter of concern in the field of technology?(a) 1971(b) 1973(c) 1970(d) 1974The question was asked in final exam.My question is from Ethical Hacking topic in portion Introduction to Ethical Hacking of Cyber Security

Answer»

Correct CHOICE is (C) 1970

Easy explanation: For hackers 1970 was that era when hackers and cyber criminals figured out how wired technologies work and how these technologies can be EXPLOITED in order to gain additional advantage or misuse the TECHNOLOGY.

24.

In which year, first practical technology hacking came into origin?(a) 1878(b) 1890(c) 1895(d) 1876I had been asked this question in an online interview.I'm obligated to ask this question of Ethical Hacking topic in portion Introduction to Ethical Hacking of Cyber Security

Answer»

Right option is (a) 1878

The explanation: The first hacking (RELATED to telephone TECHNOLOGY) was done when the PHONE company – named Bell Telephone STARTED in the year 1878.

25.

_______ is the oldest phone hacking techniques used by hackers to make free calls(a) Phishing(b) Spamming(c) Phreaking(d) CrackingI had been asked this question during an internship interview.The question is from Ethical Hacking topic in division Introduction to Ethical Hacking of Cyber Security

Answer»

The correct choice is (c) Phreaking

Easy explanation: Phreaking which is abbreviated as phone-hacking is aslang term and old hacking technique where SKILLED professionals study, explore & experiment TELEPHONE NETWORKS in order to acquire the free calling facility.

26.

What is the name of the first hacker’s conference?(a) DEFCON(b) OSCON(c) DEVCON(d) SECCONI have been asked this question in an online quiz.I'm obligated to ask this question of Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security

Answer»

Correct answer is (a) DEFCON

The explanation is: DEFCON is one of the most popular and largest hacker’s as well as a security consultant’s conference that TAKES place every YEAR in Las Vegas, Nevada, where government agents, security professionals, BLACK and white hat hackers from all over the WORLD attend that conference.

27.

What is the one thing that old hackers were fond of or find interests in?(a) Breaking Other’s system(b) Voracious thirst for knowledge(c) Cracking Phone calls(d) Learning new languagesThis question was addressed to me in examination.I want to ask this question from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security

Answer»

Right option is (b) Voracious THIRST for KNOWLEDGE

To explain: Hackers of the old era were CONSIDERED the most INFLUENTIAL individuals of society with intellectual learning inclination and thirst for knowledge.

28.

In which year the first popular hacker conference took place?(a) 1994(b) 1995(c) 1993(d) 1992I have been asked this question in class test.The question is from Ethical Hacking in division Introduction to Ethical Hacking of Cyber Security

Answer»

The correct answer is (c) 1993

The explanation: The FIRST EVER internationally recognized hacker’s conference took place in the YEAR 1993 at Las VEGAS, Nevada.

29.

In which year the term hacking was coined?(a) 1965-67(b) 1955-60(c) 1970-80(d) 1980-82I have been asked this question in examination.Question is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security

Answer»

The CORRECT CHOICE is (b) 1955-60

To explain: The term came to origin in the year 1960s when very highly skilled PROFESSIONALS and INDIVIDUALS practice complex programming approaches to SOLVE different problems.

30.

From where the term ‘hacker’ first came to existence?(a) MIT(b) Stanford University(c) California(d) Bell’s LabThe question was asked in unit test.Asked question is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security

Answer»

Correct answer is (a) MIT

To explain: At MIT (Massachusetts Institute of Technology), the term ‘hacker’ first came into origin because individuals and high skilled professionals solve different problems USING programming languages. Some similar terms were ALSO COINED in this regard such as – geeks & NERDS.