InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Someone (from outside) who tests security issues for bugs before launching a system or application, and who is not a part of that organization or company are ______(a) Black Hat hacker(b) External penetration tester(c) Blue Hat hacker(d) White Hat HackerI had been asked this question in an interview.Asked question is from Ethical Hacking in division Introduction to Ethical Hacking of Cyber Security |
|
Answer» The correct answer is (c) Blue Hat hacker |
|
| 2. |
Governments hired some highly skilled hackers. These types of hackers are termed as _______(a) Special Hackers(b) Government Hackers(c) Cyber Intelligence Agents(d) Nation / State sponsored hackersThe question was posed to me at a job interview.My question is based upon Ethical Hacking in chapter Introduction to Ethical Hacking of Cyber Security |
|
Answer» CORRECT choice is (d) Nation / State sponsored hackers To explain I would SAY: Nation / State sponsored hackers are specific individuals who are employed or HIRED by the government of that nation or state and protect the nation from cyber terrorists and other groups or individuals and to reveal their PLANS, communications and actions. |
|
| 3. |
__________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud.(a) Database(b) Network(c) System(d) HardwareThis question was posed to me at a job interview.I would like to ask this question from Ethical Hacking in section Introduction to Ethical Hacking of Cyber Security |
|
Answer» The correct answer is (a) Database |
|
| 4. |
________ are senior level corporate employees who have the role and responsibilities of creating and designing secured network or security structures.(a) Ethical Hackers(b) Chief Technical Officer(c) IT Security Engineers(d) Security ArchitectI have been asked this question in an internship interview.Enquiry is from Ethical Hacking topic in section Introduction to Ethical Hacking of Cyber Security |
|
Answer» Right choice is (d) Security Architect |
|
| 5. |
Role of security auditor is to ____________(a) secure the network(b) probe for safety and security of organization’s security components and systems(c) detects and prevents cyber attacks and threats to organization(d) does penetration testing on different web applicationsThe question was posed to me in exam.I want to ask this question from Ethical Hacking in chapter Introduction to Ethical Hacking of Cyber Security |
|
Answer» Correct choice is (b) probe for SAFETY and security of organization’s security components and systems |
|
| 6. |
_________ are those individuals who maintain and handles IT security in any firm or organization.(a) IT Security Engineer(b) Cyber Security Interns(c) Software Security Specialist(d) Security AuditorI have been asked this question in a job interview.My query is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security |
|
Answer» Right option is (a) IT Security Engineer |
|
| 7. |
These types of hackers are the most skilled hackers in the hackers’ community. Who are “they” referred to?(a) White hat Hackers(b) Elite Hackers(c) Licensed Penetration Testers(d) Red Hat HackersI had been asked this question in quiz.My query is from Ethical Hacking topic in section Introduction to Ethical Hacking of Cyber Security |
|
Answer» The correct option is (b) Elite HACKERS |
|
| 8. |
One who disclose information to public of a company, organization, firm, government and private agency and he/she is the member or employee of that organization; such individuals are termed as ___________(a) Sponsored hackers(b) Crackers(c) Hactivist(d) WhistleblowersI got this question in my homework.This question is from Ethical Hacking topic in division Introduction to Ethical Hacking of Cyber Security |
|
Answer» Correct ANSWER is (d) WHISTLEBLOWERS |
|
| 9. |
Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________(a) State sponsored hackers(b) Blue Hat Hackers(c) Cyber Terrorists(d) Red Hat HackersI have been asked this question in an interview for internship.I need to ask this question from Ethical Hacking in section Introduction to Ethical Hacking of Cyber Security |
|
Answer» The correct ANSWER is (c) Cyber Terrorists |
|
| 10. |
The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________(a) Sponsored Hackers(b) Hactivists(c) Script Kiddies(d) Whistle BlowersThe question was asked during a job interview.Enquiry is from Ethical Hacking topic in section Introduction to Ethical Hacking of Cyber Security |
|
Answer» Right option is (c) Script KIDDIES |
|
| 11. |
________ are the combination of both white as well as black hat hackers.(a) Grey Hat hackers(b) Green Hat hackers(c) Blue Hat Hackers(d) Red Hat HackersThis question was posed to me during an online interview.I want to ask this question from Ethical Hacking in division Introduction to Ethical Hacking of Cyber Security |
|
Answer» RIGHT choice is (a) Grey Hat hackers Explanation: Grey Hat Hackers have a blending character of both ethical as well as un-ethical hacker. They hack other’s systems for fun but do not harm the SYSTEM, EXPLOITS bugs and vulnerabilities in network without the knowledge of the admin or the owner. |
|
| 12. |
Suicide Hackers are those _________(a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity(b) individuals with no knowledge of codes but an expert in using hacking tools(c) who know the consequences of their hacking activities and hence try to prevent them by erasing their digital footprints(d) who are employed in an organization to do malicious activities on other firmsThis question was posed to me in an online quiz.My enquiry is from Ethical Hacking topic in division Introduction to Ethical Hacking of Cyber Security |
|
Answer» Right answer is (a) who break a system for some specific purpose with or without keeping in mind that they MAY suffer long term imprisonment due to their malicious activity |
|
| 13. |
They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?(a) Gray Hat Hackers(b) White Hat Hackers(c) Hactivists(d) Black Hat HackersThe question was asked by my college professor while I was bunking the class.I would like to ask this question from Ethical Hacking in section Introduction to Ethical Hacking of Cyber Security |
|
Answer» Correct ANSWER is (d) Black Hat Hackers |
|
| 14. |
Which is the legal form of hacking based on which jobs are provided in IT industries and firms?(a) Cracking(b) Non ethical Hacking(c) Ethical hacking(d) HactivismI have been asked this question in a national level competition.Enquiry is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security |
|
Answer» Right answer is (c) Ethical hacking |
|
| 15. |
Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________(a) Black Hat hackers(b) White Hat Hackers(c) Grey Hat Hackers(d) Red Hat HackersI had been asked this question in a national level competition.My question is from Ethical Hacking in section Introduction to Ethical Hacking of Cyber Security |
|
Answer» Correct option is (B) WHITE Hat Hackers |
|
| 16. |
Who was the first individual to distribute computer worms through internet?(a) Vladimir Levin(b) Bill Landreth(c) Richard Stallman(d) Robert T. MorrisI got this question in a job interview.My question comes from Ethical Hacking topic in section Introduction to Ethical Hacking of Cyber Security |
|
Answer» Correct choice is (d) Robert T. MORRIS |
|
| 17. |
_____ is a powerful encryption tool released by Philip Zimmerman in the year 1991.(a) PGP (Protected Good Privacy)(b) AES (Advanced Encryption Standard)(c) PGP (Pretty Good Privacy)(d) DES (Data Encryption Standard)This question was addressed to me during an interview for a job.My question comes from Ethical Hacking in division Introduction to Ethical Hacking of Cyber Security |
|
Answer» Correct answer is (c) PGP (Pretty Good Privacy) |
|
| 18. |
In which year the Computer Fraud & Abuse Act was adopted in the United States?(a) 1983(b) 1984(c) 1987(d) 1988This question was posed to me in an interview for job.Asked question is from Ethical Hacking topic in chapter Introduction to Ethical Hacking of Cyber Security |
|
Answer» Correct answer is (b) 1984 |
|
| 19. |
In which year computer scientists try to integrate encryption techniques in TCP/IP protocol?(a) 1978(b) 1980(c) 1982(d) 1984The question was posed to me in an interview for internship.The question is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security |
|
Answer» Right option is (a) 1978 |
|
| 20. |
Who coined the term “cyberspace”?(a) Andrew Tannenbaum(b) Scott Fahlman(c) William Gibson(d) Richard StallmanI had been asked this question by my college director while I was bunking the class.My question is taken from Ethical Hacking in section Introduction to Ethical Hacking of Cyber Security |
|
Answer» Right choice is (c) William Gibson |
|
| 21. |
Name the hacker who breaks the ARPANET systems?(a) Jon von Neumann(b) Kevin Poulsen(c) Kevin Mitnick(d) John DraperThis question was posed to me in an online quiz.My doubt stems from Ethical Hacking in chapter Introduction to Ethical Hacking of Cyber Security |
|
Answer» RIGHT answer is (B) Kevin Poulsen Easiest EXPLANATION: The ARPANET (Advanced Research Project Agency Network) got HACKED by Kevin Poulsen as he breaks into the Pentagon network and their associated system but got caught immediately in the year 1983. |
|
| 22. |
Who was the first individual who performed a major hacking in the year 1971?(a) Steve Wozniak(b) Steve Jobs(c) Kevin Mitnick(d) John DraperI have been asked this question in quiz.Query is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security |
|
Answer» Right option is (d) John Draper |
|
| 23. |
In which year, hacking became a practical crime and a matter of concern in the field of technology?(a) 1971(b) 1973(c) 1970(d) 1974The question was asked in final exam.My question is from Ethical Hacking topic in portion Introduction to Ethical Hacking of Cyber Security |
|
Answer» Correct CHOICE is (C) 1970 |
|
| 24. |
In which year, first practical technology hacking came into origin?(a) 1878(b) 1890(c) 1895(d) 1876I had been asked this question in an online interview.I'm obligated to ask this question of Ethical Hacking topic in portion Introduction to Ethical Hacking of Cyber Security |
|
Answer» Right option is (a) 1878 |
|
| 25. |
_______ is the oldest phone hacking techniques used by hackers to make free calls(a) Phishing(b) Spamming(c) Phreaking(d) CrackingI had been asked this question during an internship interview.The question is from Ethical Hacking topic in division Introduction to Ethical Hacking of Cyber Security |
|
Answer» The correct choice is (c) Phreaking |
|
| 26. |
What is the name of the first hacker’s conference?(a) DEFCON(b) OSCON(c) DEVCON(d) SECCONI have been asked this question in an online quiz.I'm obligated to ask this question of Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security |
|
Answer» Correct answer is (a) DEFCON |
|
| 27. |
What is the one thing that old hackers were fond of or find interests in?(a) Breaking Other’s system(b) Voracious thirst for knowledge(c) Cracking Phone calls(d) Learning new languagesThis question was addressed to me in examination.I want to ask this question from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security |
|
Answer» Right option is (b) Voracious THIRST for KNOWLEDGE |
|
| 28. |
In which year the first popular hacker conference took place?(a) 1994(b) 1995(c) 1993(d) 1992I have been asked this question in class test.The question is from Ethical Hacking in division Introduction to Ethical Hacking of Cyber Security |
|
Answer» The correct answer is (c) 1993 |
|
| 29. |
In which year the term hacking was coined?(a) 1965-67(b) 1955-60(c) 1970-80(d) 1980-82I have been asked this question in examination.Question is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security |
|
Answer» The CORRECT CHOICE is (b) 1955-60 |
|
| 30. |
From where the term ‘hacker’ first came to existence?(a) MIT(b) Stanford University(c) California(d) Bell’s LabThe question was asked in unit test.Asked question is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security |
|
Answer» Correct answer is (a) MIT |
|