Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

Spywares can be used to steal _______________ from the attacker’s browser.(a) browsing history(b) company details(c) plug-ins used(d) browser detailsI had been asked this question in an interview for internship.The origin of the question is Information Gathering Phase & Techniques in section Phases of Security of Cyber Security

Answer» CORRECT choice is (a) browsing HISTORY

The explanation is: Spywares can be USED to steal browsing history, browsing habits and other related searches from the attacker’s browser. Google chrome itself has a search box in the address bar which the spyware MIGHT monitor to take search results as INFORMATION for the attacker.
52.

Footprinting is used to collect information such as namespace, employee info, phone number and emails, job details.(a) True(b) FalseThis question was posed to me by my school teacher while I was bunking the class.I want to ask this question from Information Gathering Phase & Techniques in portion Phases of Security of Cyber Security

Answer»

Correct option is (a) True

To explain I WOULD say: Footprinting is USED to COLLECT information such as namespace, employee info, phone number and emails, JOB details, IP ADDRESS domain name, geo-location, browsing history etc.

53.

Which of them is not an information source over the internet for target attackers?(a) Whois(b) YouTube(c) Nslookup(d) Archive sitesThe question was posed to me in an online quiz.Query is from Information Gathering Phase & Techniques topic in portion Phases of Security of Cyber Security

Answer»

Right OPTION is (B) YouTube

Easiest explanation: Information can be AVAILABLE FREE from some sites and DATABASES residing on the internet. These services and sites are – Whois, Nslookup, Archive Sites, open-source software sites etc.

54.

Which of the following is not a spot from where attackers seek information?(a) Domain name(b) IP address(c) System enumeration(d) Document filesThis question was posed to me in quiz.My enquiry is from Information Gathering Phase & Techniques in portion Phases of Security of Cyber Security

Answer»

Correct ANSWER is (d) Document files

Explanation: Internet is a common medium for gathering information such as from Domain name, IP address of the target USER, ENUMERATION of victim’s system, IDSes running, TCP & UDP SERVICES etc.

55.

_______________ is necessary to methodically & systematically ensure all pieces of information related to target.(a) Fingerprinting(b) 3D printing(c) Footprinting(d) Data printingThe question was asked in examination.This interesting question is from Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security

Answer»

Right option is (c) Footprinting

Best explanation: Footprinting is a COMPONENT of the reconnaissance stage which is necessary to methodically & SYSTEMATICALLY ensure all pieces of information related to the TARGET. It can be either active or PASSIVE footprinting.

56.

________________ is one of the 3 pre-attacking phase.(a) Fingerprinting(b) 3D printing(c) Footprinting(d) Data printingI have been asked this question in an interview.I'm obligated to ask this question of Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security

Answer»

Right option is (c) Footprinting

Easy explanation: Footprinting is a component of the reconnaissance stage that is used to gather POSSIBLE information for a target COMPUTER SYSTEM or network. It can be either active or passive footprinting.

57.

A/An ______________ spends 85% of his/her time in profiling an organization and rest amount in launching the attack.(a) security analyst(b) attacker(c) auditor(d) network engineerI had been asked this question in a job interview.Enquiry is from Information Gathering Phase & Techniques topic in section Phases of Security of Cyber Security

Answer»

The CORRECT option is (b) attacker

Explanation: An attacker SPENDS 85% of his/her TIME in profiling an ORGANIZATION and rest amount in launching the attack. Footprinting results in a unique organization profile with respect to the networks.

58.

________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network.(a) Fingerprinting(b) 3D printing(c) Footprinting(d) Data printingI got this question in class test.I'm obligated to ask this question of Information Gathering Phase & Techniques topic in division Phases of Security of Cyber Security

Answer»

Correct answer is (c) Footprinting

Explanation: Footprinting is a component of the reconnaissance stage that is used to GATHER POSSIBLE information for a TARGET computer system or NETWORK. It can be either ACTIVE or passive footprinting.

59.

How many types of footprinting are there?(a) 5(b) 4(c) 3(d) 2This question was posed to me in an interview for internship.This intriguing question comes from Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security

Answer»

Correct option is (d) 2

For explanation I would say: Footprinting is a component of the reconnaissance stage that is used to gather possible information for a target COMPUTER system or network. It can be of 2 TYPES: ACTIVE or passive footprinting.

60.

Mapping of data-flow in an organization is very useful in understanding the risk better due to actual & potential data leakage.(a) True(b) FalseI got this question in an internship interview.Asked question is from Security Phases topic in portion Phases of Security of Cyber Security

Answer»

The CORRECT option is (a) True

Explanation: Mapping of data-flow in an organization from DIFFERENT systems (to RECORD the downstream and upstream SOURCES) is very useful in understanding the risk better DUE to actual & potential data leakage.

61.

_____________ focuses on the detection & prevention of sensitive data exfiltration and lost data.(a) Data loss prevention(b) Data loss measurement(c) Data stolen software(d) Data leak preventionThis question was posed to me in exam.The doubt is from Security Phases topic in portion Phases of Security of Cyber Security

Answer»

The correct OPTION is (a) DATA loss PREVENTION

Explanation: Data loss prevention focuses on the detection & prevention of sensitive data exfiltration and lost data. It also DEALS with lost & stolen thumb drive or data blocked by ransomware ATTACKS.

62.

Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat?(a) Data leak by 3rd Party apps(b) Data leak by partners(c) Data leak by employees(d) Data leak from stolen credentials from the deskThe question was asked in examination.My query is from Security Phases in division Phases of Security of Cyber Security

Answer» CORRECT ANSWER is (a) Data leak by 3rd Party apps

Easy explanation: Data leak by 3rd Party apps is an example of malicious outsider threat that falsely gained access by MASQUERADING itself. Data leak by BUSINESS PARTNERS, employees or from stolen credentials are insider’s data-leakage threats.
63.

Data leakage prevention is based on factors like access controls, persistent, encryption, alerting, tokenization, blocking dynamic data masking, etc.(a) True(b) FalseI got this question in class test.This is a very interesting question from Security Phases in division Phases of Security of Cyber Security

Answer»

Right answer is (a) True

To explain I would say: Data leakage prevention is based on factors LIKE access controls, persistent, ENCRYPTION, alerting, tokenization, blocking dynamic data MASKING, ETC. Like data loss prevention, data leakage also needs concern and care for data safety.

64.

Which of the following is not a step of data-loss prevention?(a) Identify(b) Manage(c) Classify(d) DiscoverI got this question in an interview for internship.I want to ask this question from Security Phases in division Phases of Security of Cyber Security

Answer»

Correct choice is (b) Manage

The best I can explain: The three steps of data loss prevention are – Identify, Discover and CLASSIFY. First, you have to identify the SYSTEMS of records. Then you’ve to classify what comprises of sensitive data on those systems & discover the data ELEMENTS which are sensitive depending on those classifications.

65.

______________ is the unauthorized movement of data.(a) Data exfiltration(b) Data infiltration(c) Data cracking(d) Database hackingI got this question during an interview for a job.My question is taken from Security Phases in portion Phases of Security of Cyber Security

Answer»

Right option is (a) DATA exfiltration

The EXPLANATION: Data exfiltration is the unauthorized movement of data. It comprises data exportation, data EXTRUSION, data LEAKAGE, and data theft and all of them come under data HACKING.

66.

The three steps of data loss prevention are – Identify, Discover and______________(a) Classify(b) Clarify(c) Deletion(d) DetectionThis question was addressed to me at a job interview.The doubt is from Security Phases topic in chapter Phases of Security of Cyber Security

Answer»

Correct answer is (a) CLASSIFY

The best explanation: The three STEPS of data loss prevention are – Identify, Discover and Classify. FIRST, you have to identify the systems of records. Then you’ve to classify what COMPRISES of sensitive data on those systems & discover the data elements which are sensitive depending on those classifications.

67.

Which of them is an example of physical data leakage?(a) Dumpster diving(b) MiTM(c) DDoS(d) PhishingThe question was posed to me by my college professor while I was bunking the class.This interesting question is from Security Phases topic in portion Phases of Security of Cyber Security

Answer»

The CORRECT choice is (a) Dumpster diving

For EXPLANATION: Physical data leakage can be done intentionally by criminal-minded people who can fetch data from dumpster diving, SHOULDER surfing, data mentioned in printed PAPERS or TAKEN out of photocopiers.

68.

Which of them is not an example of data leakage done using electronic communication with malicious intent?(a) Phishing(b) Spoofed Email(c) Attacks using malware(d) Dumpster divingI have been asked this question by my college professor while I was bunking the class.My query is from Security Phases in chapter Phases of Security of Cyber Security

Answer»

Right option is (d) Dumpster diving

Easiest explanation: MANY organizations provide employees right to use the internet, emails as well as instant messaging as part of their role. But these are PRIOR targets of hackers for data LEAKING using techniques such as PHISHING, spoofing and attacking TARGET victim using malware.

69.

Which of them is not an example of physical data leakage?(a) dumpster diving(b) shoulder surfing(c) printers and photocopiers(d) phishingI have been asked this question in examination.The origin of the question is Security Phases topic in division Phases of Security of Cyber Security

Answer»

The correct option is (d) phishing

Easy explanation: Physical data leakage can be done intentionally by criminal-minded PEOPLE who can fetch data from DUMPSTER DIVING, SHOULDER surfing, data MENTIONED in printed papers or taken out of photocopiers.

70.

When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization.(a) Ill-intentional data leakage(b) Malfunctioned in database(c) A malfunction in online data(d) ill-intension of an outsiderThis question was posed to me in an interview.The query is from Security Phases in division Phases of Security of Cyber Security

Answer»

The correct option is (a) Ill-intentional data LEAKAGE

Explanation: When leakage of data is done PURPOSELY or because of the lack of employee’s concern toward confidential data is CALLED Ill-intentional data leakage done by employees of an organization.

71.

Unintentional data leakage can still result in the same penalties and reputational damage.(a) True(b) FalseThe question was posed to me during an internship interview.This interesting question is from Security Phases in portion Phases of Security of Cyber Security

Answer»

Right option is (a) True

Easiest explanation: “Unintentional” data leakage doesn’t essentially MEAN INTENDED or malicious. It has been found that the majority of data leakage incidents are ACCIDENTAL but it can still RESULT in the same PENALTIES and reputational damage.

72.

“Unauthorized” data leakage doesn’t essentially mean intended or malicious.(a) True(b) FalseThe question was asked during an internship interview.This question is from Security Phases in section Phases of Security of Cyber Security

Answer»

Correct OPTION is (a) True

The explanation: “Unauthorized” data leakage doesn’t essentially MEAN intended or malicious. It has been found that the majority of data leakage incidents are ACCIDENTAL but the loss OCCURRED are severe.

73.

There are __________ major types of data leakage.(a) 2(b) 3(c) 4(d) 5I got this question in a national level competition.I'd like to ask this question from Security Phases in section Phases of Security of Cyber Security

Answer» RIGHT option is (B) 3

Best explanation: There are three major TYPES of data leakage. These are – data breach by ACCIDENT, data leak done by ill-intentioned employees and electronic communication with malicious intent.
74.

Data leakage threats do not usually occur from which of the following?(a) Web and email(b) Mobile data storage(c) USB drives and laptops(d) TelevisionThis question was posed to me by my school teacher while I was bunking the class.The origin of the question is Security Phases topic in section Phases of Security of Cyber Security

Answer»

Correct answer is (d) Television

The explanation: Data LEAKAGE threats are COMMON from web and emails, mobile data storage DEVICES such as INTERNAL or external storage and memory cards, from USB drives and LAPTOPS.

75.

Data leakage is popularly known as ___________(a) data theft(b) data crack(c) low and slow data theft(d) slow data theftI had been asked this question in quiz.This is a very interesting question from Security Phases topic in chapter Phases of Security of Cyber Security

Answer»

Correct CHOICE is (c) low and SLOW data theft

The explanation is: Data leakage is also KNOWN as ‘low and slow data theft’, which is a massive issue for data security & the damage CAUSED to any firm is enormous. Every day there is at least one report of data theft that occurs worldwide.

76.

_____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient.(a) Database hacking(b) Data leakage(c) Data cracking(d) Data revealingI have been asked this question in an international level competition.Enquiry is from Security Phases in section Phases of Security of Cyber Security

Answer»

Correct option is (B) Data leakage

For EXPLANATION: Data leakage is the illicit transmission of data from INSIDE an organization or personal system to an external location or recipient. The phrase is used for describing data that is TRANSFERRED ELECTRONICALLY or even physically.