InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Spywares can be used to steal _______________ from the attacker’s browser.(a) browsing history(b) company details(c) plug-ins used(d) browser detailsI had been asked this question in an interview for internship.The origin of the question is Information Gathering Phase & Techniques in section Phases of Security of Cyber Security |
|
Answer» CORRECT choice is (a) browsing HISTORY The explanation is: Spywares can be USED to steal browsing history, browsing habits and other related searches from the attacker’s browser. Google chrome itself has a search box in the address bar which the spyware MIGHT monitor to take search results as INFORMATION for the attacker. |
|
| 52. |
Footprinting is used to collect information such as namespace, employee info, phone number and emails, job details.(a) True(b) FalseThis question was posed to me by my school teacher while I was bunking the class.I want to ask this question from Information Gathering Phase & Techniques in portion Phases of Security of Cyber Security |
|
Answer» Correct option is (a) True |
|
| 53. |
Which of them is not an information source over the internet for target attackers?(a) Whois(b) YouTube(c) Nslookup(d) Archive sitesThe question was posed to me in an online quiz.Query is from Information Gathering Phase & Techniques topic in portion Phases of Security of Cyber Security |
|
Answer» Right OPTION is (B) YouTube |
|
| 54. |
Which of the following is not a spot from where attackers seek information?(a) Domain name(b) IP address(c) System enumeration(d) Document filesThis question was posed to me in quiz.My enquiry is from Information Gathering Phase & Techniques in portion Phases of Security of Cyber Security |
|
Answer» Correct ANSWER is (d) Document files |
|
| 55. |
_______________ is necessary to methodically & systematically ensure all pieces of information related to target.(a) Fingerprinting(b) 3D printing(c) Footprinting(d) Data printingThe question was asked in examination.This interesting question is from Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security |
|
Answer» Right option is (c) Footprinting |
|
| 56. |
________________ is one of the 3 pre-attacking phase.(a) Fingerprinting(b) 3D printing(c) Footprinting(d) Data printingI have been asked this question in an interview.I'm obligated to ask this question of Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security |
|
Answer» Right option is (c) Footprinting |
|
| 57. |
A/An ______________ spends 85% of his/her time in profiling an organization and rest amount in launching the attack.(a) security analyst(b) attacker(c) auditor(d) network engineerI had been asked this question in a job interview.Enquiry is from Information Gathering Phase & Techniques topic in section Phases of Security of Cyber Security |
|
Answer» The CORRECT option is (b) attacker |
|
| 58. |
________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network.(a) Fingerprinting(b) 3D printing(c) Footprinting(d) Data printingI got this question in class test.I'm obligated to ask this question of Information Gathering Phase & Techniques topic in division Phases of Security of Cyber Security |
|
Answer» Correct answer is (c) Footprinting |
|
| 59. |
How many types of footprinting are there?(a) 5(b) 4(c) 3(d) 2This question was posed to me in an interview for internship.This intriguing question comes from Information Gathering Phase & Techniques in chapter Phases of Security of Cyber Security |
|
Answer» Correct option is (d) 2 |
|
| 60. |
Mapping of data-flow in an organization is very useful in understanding the risk better due to actual & potential data leakage.(a) True(b) FalseI got this question in an internship interview.Asked question is from Security Phases topic in portion Phases of Security of Cyber Security |
|
Answer» The CORRECT option is (a) True |
|
| 61. |
_____________ focuses on the detection & prevention of sensitive data exfiltration and lost data.(a) Data loss prevention(b) Data loss measurement(c) Data stolen software(d) Data leak preventionThis question was posed to me in exam.The doubt is from Security Phases topic in portion Phases of Security of Cyber Security |
|
Answer» The correct OPTION is (a) DATA loss PREVENTION |
|
| 62. |
Data leakage threats are done by internal agents. Which of them is not an example of an internal data leakage threat?(a) Data leak by 3rd Party apps(b) Data leak by partners(c) Data leak by employees(d) Data leak from stolen credentials from the deskThe question was asked in examination.My query is from Security Phases in division Phases of Security of Cyber Security |
|
Answer» CORRECT ANSWER is (a) Data leak by 3rd Party apps Easy explanation: Data leak by 3rd Party apps is an example of malicious outsider threat that falsely gained access by MASQUERADING itself. Data leak by BUSINESS PARTNERS, employees or from stolen credentials are insider’s data-leakage threats. |
|
| 63. |
Data leakage prevention is based on factors like access controls, persistent, encryption, alerting, tokenization, blocking dynamic data masking, etc.(a) True(b) FalseI got this question in class test.This is a very interesting question from Security Phases in division Phases of Security of Cyber Security |
|
Answer» Right answer is (a) True |
|
| 64. |
Which of the following is not a step of data-loss prevention?(a) Identify(b) Manage(c) Classify(d) DiscoverI got this question in an interview for internship.I want to ask this question from Security Phases in division Phases of Security of Cyber Security |
|
Answer» Correct choice is (b) Manage |
|
| 65. |
______________ is the unauthorized movement of data.(a) Data exfiltration(b) Data infiltration(c) Data cracking(d) Database hackingI got this question during an interview for a job.My question is taken from Security Phases in portion Phases of Security of Cyber Security |
|
Answer» Right option is (a) DATA exfiltration |
|
| 66. |
The three steps of data loss prevention are – Identify, Discover and______________(a) Classify(b) Clarify(c) Deletion(d) DetectionThis question was addressed to me at a job interview.The doubt is from Security Phases topic in chapter Phases of Security of Cyber Security |
|
Answer» Correct answer is (a) CLASSIFY |
|
| 67. |
Which of them is an example of physical data leakage?(a) Dumpster diving(b) MiTM(c) DDoS(d) PhishingThe question was posed to me by my college professor while I was bunking the class.This interesting question is from Security Phases topic in portion Phases of Security of Cyber Security |
|
Answer» The CORRECT choice is (a) Dumpster diving |
|
| 68. |
Which of them is not an example of data leakage done using electronic communication with malicious intent?(a) Phishing(b) Spoofed Email(c) Attacks using malware(d) Dumpster divingI have been asked this question by my college professor while I was bunking the class.My query is from Security Phases in chapter Phases of Security of Cyber Security |
|
Answer» Right option is (d) Dumpster diving |
|
| 69. |
Which of them is not an example of physical data leakage?(a) dumpster diving(b) shoulder surfing(c) printers and photocopiers(d) phishingI have been asked this question in examination.The origin of the question is Security Phases topic in division Phases of Security of Cyber Security |
|
Answer» The correct option is (d) phishing |
|
| 70. |
When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization.(a) Ill-intentional data leakage(b) Malfunctioned in database(c) A malfunction in online data(d) ill-intension of an outsiderThis question was posed to me in an interview.The query is from Security Phases in division Phases of Security of Cyber Security |
|
Answer» The correct option is (a) Ill-intentional data LEAKAGE |
|
| 71. |
Unintentional data leakage can still result in the same penalties and reputational damage.(a) True(b) FalseThe question was posed to me during an internship interview.This interesting question is from Security Phases in portion Phases of Security of Cyber Security |
|
Answer» Right option is (a) True |
|
| 72. |
“Unauthorized” data leakage doesn’t essentially mean intended or malicious.(a) True(b) FalseThe question was asked during an internship interview.This question is from Security Phases in section Phases of Security of Cyber Security |
|
Answer» Correct OPTION is (a) True |
|
| 73. |
There are __________ major types of data leakage.(a) 2(b) 3(c) 4(d) 5I got this question in a national level competition.I'd like to ask this question from Security Phases in section Phases of Security of Cyber Security |
|
Answer» RIGHT option is (B) 3 Best explanation: There are three major TYPES of data leakage. These are – data breach by ACCIDENT, data leak done by ill-intentioned employees and electronic communication with malicious intent. |
|
| 74. |
Data leakage threats do not usually occur from which of the following?(a) Web and email(b) Mobile data storage(c) USB drives and laptops(d) TelevisionThis question was posed to me by my school teacher while I was bunking the class.The origin of the question is Security Phases topic in section Phases of Security of Cyber Security |
|
Answer» Correct answer is (d) Television |
|
| 75. |
Data leakage is popularly known as ___________(a) data theft(b) data crack(c) low and slow data theft(d) slow data theftI had been asked this question in quiz.This is a very interesting question from Security Phases topic in chapter Phases of Security of Cyber Security |
|
Answer» Correct CHOICE is (c) low and SLOW data theft |
|
| 76. |
_____________ is the illicit transmission of data from inside an organization or personal system to an external location or recipient.(a) Database hacking(b) Data leakage(c) Data cracking(d) Data revealingI have been asked this question in an international level competition.Enquiry is from Security Phases in section Phases of Security of Cyber Security |
|
Answer» Correct option is (B) Data leakage |
|