InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following is not an anti-spam technique?(a) Reputation control(b) Sender policy framework(c) DNS-based block-list(d) Domain-based blockingI had been asked this question during an internship interview.The query is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (d) Domain-based blocking |
|
| 2. |
Which of the following is not an anti-spamming tool or system?(a) Spam-Eater Pro(b) SpyTech Spam Agent(c) SpamExperts Desktop(d) Anti-spyware TechThis question was posed to me in an international level competition.Enquiry is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (d) Anti-spyware Tech |
|
| 3. |
___________ is a tool used as spam filter in association with email programs and automatically intercepts spam emails.(a) Nessus(b) SpamExpert Desktop(c) Spam-Rescurer(d) Burp-SuiteThis question was addressed to me at a job interview.My doubt stems from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (B) SpamExpert Desktop |
|
| 4. |
Which of the following is not an anti-spam technique?(a) Signature-based content filtering(b) DNS routing(c) Bayesian Content Filtering(d) Collaborative content filteringThis question was addressed to me in examination.My question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 5. |
Which of the following is not a bulk emailing tool?(a) Wireshark(b) Sendblaster(c) Direct Sender(d) HotmailerThe question was posed to me by my school teacher while I was bunking the class.My query is from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (a) Wireshark |
|
| 6. |
Which of the following is not a bulk emailing tool?(a) Fairlogic Worldcast(b) 123 Hidden sender(c) YL Mail Man(d) NetCutThe question was posed to me during an interview for a job.Origin of the question is Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 7. |
Which of the following is not a type of spamming attack?(a) Page-jacking(b) Image spamming(c) Spear phishing(d) Blog & wiki spammingThis question was addressed to me at a job interview.This key question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct OPTION is (c) Spear phishing |
|
| 8. |
There are _______ types of spamming.(a) 3(b) 4(c) 5(d) 6I have been asked this question in class test.This intriguing question comes from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right ANSWER is (d) 6 |
|
| 9. |
There are ___________ major ways of spamming.(a) 4(b) 2(c) 3(d) 5I have been asked this question in final exam.The origin of the question is Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (b) 2 |
|
| 10. |
Which of the following is not a proper way of how spammers get the email Ids?(a) When a user registers to online services, blogs, and sites(b) Databases formed by spiders fetching email Ids from different sources(c) From offline form fill-up documents(d) Online ad-tracking toolsThe question was asked in an online quiz.My query is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct CHOICE is (c) From offline form fill-up documents |
|
| 11. |
Which of the following is not a technique used by spanners?(a) Spoofing the domain(b) Sending attached virus in spams(c) Junk tags associated with spam-emails(d) Making important deals through such emailsThe question was asked during an interview.My query is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (d) MAKING important deals through such emails |
|
| 12. |
___________ are used which crawl web pages looking for email Ids and copies them to the database.(a) Caches(b) Cookies(c) Bots(d) SpidersI had been asked this question in my homework.Asked question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (d) Spiders |
|
| 13. |
_________________ technique is also used in product advertisement.(a) Phishing(b) Cookies(c) e-Banners(d) SpammingThe question was asked in class test.I'd like to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (c) e-Banners |
|
| 14. |
______________ is populating the inbox of any target victim with unsolicited or junk emails.(a) Phishing(b) Spamming(c) Hooking(d) DoSThis question was addressed to me in final exam.I need to ask this question from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT answer is (b) Spamming To explain: Spamming is populating the inbox of any TARGET victim with unsolicited or junk emails. These junk emails may contain malicious COMPUTER programs that may HARM the recipient. |
|
| 15. |
Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security.(a) True(b) FalseI have been asked this question by my college professor while I was bunking the class.My question is based upon Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (a) True |
|
| 16. |
Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media.(a) True(b) FalseThe question was posed to me in an interview for job.My query is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (a) True |
|
| 17. |
Many social media sites and services provide _______________ for legitimate account verification.(a) Retina scanning(b) Fingerprint scanning(c) CAPTCHA(d) 2-step verificationI have been asked this question in a job interview.Enquiry is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (d) 2-step verification |
|
| 18. |
Part of the social media sites are the various games & 3^rd party applications which helps ______________ to get access to your data.(a) ethical hackers(b) penetration testers(c) security auditors(d) cyber-criminalsThis question was posed to me in final exam.This is a very interesting question from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (d) cyber-CRIMINALS |
|
| 19. |
Strangers cannot cause much trouble if we connect to them over social media.(a) True(b) FalseI got this question in unit test.I'm obligated to ask this question of Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (b) False |
|
| 20. |
Clicking on enticing Ads can cause trouble.(a) True(b) FalseI have been asked this question during an interview.I want to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (a) True |
|
| 21. |
If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation.(a) True(b) FalseI got this question during a job interview.The question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (a) True |
|
| 22. |
Increase your security for social media account by always ____________ as you step away from the system.(a) signing in(b) logging out(c) signing up(d) logging inI got this question during an interview.The above asked question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The CORRECT OPTION is (b) logging out |
|
| 23. |
Keeping the password by the name of your pet is a good choice.(a) True(b) FalseThis question was posed to me in an interview for job.Enquiry is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (b) False |
|
| 24. |
Try to keep your passwords without meaning so that _____________ attack becomes almost impossible to perform successfully.(a) social engineering(b) phishing(c) password guessing(d) brute forceThis question was posed to me during an interview.This question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT choice is (c) password guessing To elaborate: Try to KEEP your passwords without meaning so that password guessing ATTACK becomes ALMOST impossible to perform successfully. This will reduce the POTENTIAL to do both passwords guessing as well as dictionary attacks. |
|
| 25. |
________________ is a popular tool to block social-media websites to track your browsing activities.(a) Fader(b) Blur(c) Social-Media Blocker(d) Ad-blockerI got this question during an interview.My question is based upon Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (b) Blur |
|
| 26. |
Which of them is a proper measure of securing social networking account?(a) Never keep your password with any relevant names(b) Keep written records of your passwords(c) Keep records of your password in audio format in your personal cell-phone(d) Passwords are kept smaller in size to rememberThis question was addressed to me by my college director while I was bunking the class.Enquiry is from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (a) Never keep your PASSWORD with any RELEVANT names |
|
| 27. |
Which of the following is not an appropriate measure for securing social networking accounts?(a) Strong passwords(b) Link your account with a phone number(c) Never write your password anywhere(d) Always maintain a soft copy of all your passwords in your PCThe question was asked in an interview for job.The query is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT choice is (d) Always maintain a soft COPY of all your PASSWORDS in your PC Explanation: ‘Always maintain a soft copy of all your passwords in your PC’ is not an appropriate MEASURE for securing your online accounts because, if your system got accessed by anyone or ANYBODY put spyware or screen-recording malware, then all your passwords will get revealed. |
|
| 28. |
____________ type of sites are known as friend-of-a-friend site.(a) Chat Messenger(b) Social networking sites(c) Tutorial sites(d) Chat-roomsI got this question in examination.The above asked question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The CORRECT OPTION is (b) Social networking sites |
|
| 29. |
Which of the following is the most viral section of the internet?(a) Chat Messenger(b) Social networking sites(c) Tutorial sites(d) Chat-roomsThis question was addressed to me in an interview for job.My doubt stems from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct ANSWER is (b) SOCIAL networking sites |
|
| 30. |
There are ____________ that are designed to track your browsing habits & aim ads that are relevant to the user.(a) plug-ins(b) cache(c) cookies(d) historyThis question was posed to me in an international level competition.My doubt is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT option is (C) COOKIES Easy explanation: Cookies are tiny files which get DOWNLOADED to your system when you visit a website. There are cookies that are designed to track your browsing habits & aim ads that are relevant to the USER. |
|
| 31. |
Keeping browsing habits & aiming specific ads to you is harmless but it might reduce your online privacy.(a) True(b) FalseThe question was posed to me in an internship interview.My question comes from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (a) True |
|
| 32. |
There are cookies that are designed to track your browsing habits & aim ads to you.(a) True(b) FalseI got this question during an internship interview.I'd like to ask this question from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct ANSWER is (a) True |
|
| 33. |
Which of the following is not an example of browsing data?(a) Forms and Search-bar data(b) Cache data(c) Downloading history(d) Start bar search dataThe question was asked in an internship interview.I'd like to ask this question from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (d) START bar search data |
|
| 34. |
Attackers could steal ___________ to achieve illegitimate accessing to online accounts & disturbs the personal information.(a) plug-ins(b) cache(c) cookies(d) historyI have been asked this question in unit test.My question comes from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (c) cookies |
|
| 35. |
___________ is just a group of data downloaded for helping in displaying a web page faster.(a) plug-ins(b) cache(c) ad-ons(d) historyThis question was posed to me during a job interview.Origin of the question is Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (b) cache |
|
| 36. |
Browser ___________ are impermanent internet files which helps the browsers download web images, data & documents for rapid performance & viewing in the future.(a) plug-ins(b) cache(c) ad-on(d) historyThe question was posed to me in an interview for internship.Enquiry is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (b) cache |
|
| 37. |
____________ are tiny files which get downloaded to your system when you visit a website.(a) Cookies(b) Caches(c) Bots(d) CrawlersThe question was posed to me in an interview.The query is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (a) Cookies |
|
| 38. |
Which of the following data is not appropriate here, if you delete cache, cookies, and browser history?(a) Address bar predictions(b) Saved passwords(c) Browser plug-ins(d) Shopping cart contentI have been asked this question at a job interview.My question comes from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right ANSWER is (c) Browser plug-ins |
|
| 39. |
The ____________ Domain Name Server data will get spread to the ISPs & will be cached there.(a) working(b) compromised(c) corrupted(d) poisonedThe question was asked during an internship interview.This interesting question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (d) poisoned |
|
| 40. |
A _________________ can be poisoned if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of information on it.(a) Server data(b) Domain name(c) DNS cache(d) System fileI got this question in exam.The question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (c) DNS cache |
|
| 41. |
The user could be influenced by DNS hijacking if the government of that country uses DNS redirecting as a mechanism to mask censorship.(a) True(b) FalseThis question was posed to me in final exam.The above asked question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The CORRECT option is (a) True |
|
| 42. |
______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet.(a) DNS poisoning(b) DNS re-routing(c) DNS cracking(d) Domain link poisoningI got this question by my school teacher while I was bunking the class.Asked question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (a) DNS poisoning |
|
| 43. |
DNS poisoning is very dangerous because it can extend its reach from one ___________ to another.(a) ISP server(b) DNS server(c) Linux server(d) Domain userI have been asked this question in an internship interview.Query is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (b) DNS server |
|
| 44. |
A ______________ is essentially a text file residing on the server that hosts different domain containing entries for dissimilar resource records.(a) Zone file(b) Robot file(c) Bot file(d) DNS fileI had been asked this question in exam.This question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT answer is (a) Zone file To explain: A Zone file is essentially a text file RESIDING on the server that hosts different DOMAIN containing entries for dissimilar RESOURCE records. It is used in DNS hijacking. |
|
| 45. |
Which of the following is not an example of DNS hijacking?(a) ISP DNS hijacking(b) DNS hijacking for phishing(c) DNS hijacking for pharming(d) HTTP-based DNS hackingThe question was asked in unit test.This intriguing question comes from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (d) HTTP-based DNS hacking |
|
| 46. |
The _______________ matches and maps to the user friendly domain name.(a) HTTP(b) DNS(c) WWW(d) ISPI have been asked this question during an interview.My question comes from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (B) DNS |
|
| 47. |
DNS trojans are used for performing a type of DNS hijacking.(a) True(b) FalseThe question was asked during an online exam.This key question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (a) True |
|
| 48. |
Some security issues might exist owing to misconfigured __________________ which can direct to disclosure of information regarding the domain.(a) DNS names(b) HTTP setup(c) ISP setup(d) FTP-unsecuredThis question was posed to me in a national level competition.This intriguing question comes from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (a) DNS names |
|
| 49. |
There are _________ main types of DNS hijacking.(a) 4(b) 2(c) 3(d) 5The question was posed to me during an interview.The origin of the question is Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (b) 2 |
|
| 50. |
_____________ can be attained by the use of malware or by changing the server’s settings.(a) DNS poisoning(b) DNS cracking(c) DNS hijacking(d) DNS redirectingThis question was addressed to me in final exam.The origin of the question is Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT choice is (c) DNS hijacking For explanation I would say: DNS hijacking is a form of nasty online attack in which a user gets redirects QUERIES to a DNS because of OVERRIDE of system’s TCP/IP settings. It can be attained by the use of MALWARE or by changing the server’s settings. |
|