InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings.(a) DNS mal-functioning(b) DNS cracking(c) DNS redirecting(d) DNS hijackingI had been asked this question in an interview for internship.My question is based upon Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT ANSWER is (d) DNS hijacking For explanation I would say: Misconfigured DNS names which can direct to disclosure of INFORMATION regarding the domain. DNS hijacking is a form of nasty ONLINE ATTACK in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings. |
|
| 52. |
__________ is a naming system given to different computers which adapt to human-readable domain names.(a) HTTP(b) DNS(c) WWW(d) ISPI had been asked this question in semester exam.Question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (b) DNS |
|
| 53. |
Which one is not an example of .Net application decompiler?(a) Salamander(b) Dis#(c) Decompiler.Net(d) MultiRipperI have been asked this question in an interview.This interesting question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (d) MultiRipper |
|
| 54. |
DNS stands for _____________(a) Data Name System(b) Domain Name Server(c) Domain Name System(d) Domain’s Naming SystemThis question was addressed to me in semester exam.I want to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (c) Domain Name System |
|
| 55. |
_______________ is a universal interactive program environment for reverse engineering.(a) TurboC(b) Andromeda Decompiler(c) IDAPro(d) PE ExplorerThe question was posed to me by my college professor while I was bunking the class.This interesting question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» The correct ANSWER is (b) Andromeda Decompiler |
|
| 56. |
REC stands for ________________(a) Reverse Engineering Compiler(b) Reverse Engineering Computer(c) Return-to-Code Engineering Compiler(d) Reversing Engineered CompilerI got this question during an online interview.This intriguing question originated from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (a) REVERSE Engineering Compiler |
|
| 57. |
Which of the following is not a decompiler tool?(a) DCC decompiler(b) Borol and C(c) Boomerang Decompiler(d) ExeToCI have been asked this question during an interview.This key question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (b) Borol and C |
|
| 58. |
_____________ will not recreate the original source file created by the compiler.(a) Debugger(b) Hex Editor(c) Decompiler(d) DisassemblerThis question was posed to me during an interview for a job.I want to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (c) Decompiler |
|
| 59. |
A _____________ takes executable file as input and tries to generate high level code.(a) Debugger(b) Decompiler(c) Disassembler(d) Hex EditorThe question was posed to me in my homework.My doubt stems from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (B) Decompiler |
|
| 60. |
Which of the following is not a feature of IDAPro?(a) Instant debugging(b) Connect local and remote systems easily(c) Explore in-depth binary data(d) Convert machine language to high-level codeI have been asked this question during an internship interview.This intriguing question originated from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT choice is (d) Convert machine language to high-level code The BEST I can explain: IDAPRO is used as a disassembler in manual binary code analysis and also used as debugger which is used for instant DEBUGGING, connect LOCAL and remote systems easily and explore in-depth binary data. |
|
| 61. |
________________ does not attempt to reverse the actions of compiler; rather it transforms the input program repeatedly until HLL code is achieved.(a) Debugger(b) Hex Editor(c) Disassembler(d) DecompilerThis question was posed to me in class test.This key question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (d) Decompiler |
|
| 62. |
________________ is a type of reverse engineering tool that is used to dissect binary codes into assembly codes.(a) PE & Resource Viewer(b) Debugger(c) Disassembler(d) Hex EditorThe question was asked by my college director while I was bunking the class.This is a very interesting question from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (c) Disassembler |
|
| 63. |
Which of the following is not a function or use of disassembler?(a) Extracting functions & libraries(b) Extracting strings and values(c) Assemble medium-level codes(d) Dissect binary codesI got this question in an online quiz.Query is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (c) Assemble medium-level CODES |
|
| 64. |
IDAPro is used as a _________________ in manual binary code analysis and also used a debugger.(a) PE & Resource Viewer(b) Debugger(c) Disassembler(d) Hex EditorThe question was posed to me in examination.My question is taken from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT answer is (c) Disassembler To explain I would say: Disassembler in Reverse ENGINEERING USED to SLICE up binary codes into assembly codes. IDAPRO is used as a disassembler in manual binary code analysis and also used as a debugger. |
|
| 65. |
PE & Resource Viewer permits programmers to inspect & alter resources which are entrenched in the EXE file of any software.(a) PE & Resource Viewer(b) Debugger(c) Disassembler(d) Hex EditorThis question was posed to me in an online quiz.My question is taken from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct ANSWER is (a) PE & RESOURCE Viewer |
|
| 66. |
Hex editors permit programmers to inspect & alter binaries based on some software requirements.(a) True(b) FalseThe question was posed to me in an internship interview.I want to ask this question from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct CHOICE is (a) True |
|
| 67. |
Which of the following is not an actual Reverse Engineering tool?(a) Debugger(b) Disassembler(c) Text Editor(d) Hex EditorThis question was posed to me in an online quiz.I'm obligated to ask this question of Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (C) Text Editor |
|
| 68. |
There are ______ types of reverse engineering methodologies.(a) 6(b) 2(c) 5(d) 3I had been asked this question by my school teacher while I was bunking the class.I need to ask this question from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (B) 2 |
|
| 69. |
Which of the following is not a disassembler tool?(a) IDA Pro(b) PE Explorer(c) Turbo C(d) W32DASMThe question was asked during an interview.My question comes from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (c) TURBO C |
|
| 70. |
______________ comes under tools for reverse engineering (RE).(a) Reassembler(b) Compiler(c) Disassembler(d) InterpreterI got this question in my homework.The above asked question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» The correct OPTION is (c) Disassembler |
|
| 71. |
De-compilation is not done for _______________(a) Recovery of lost source code(b) Migration of assembly language(c) Determining the existence of malicious code in any app(d) Targeting users with stealing codeThis question was posed to me during an internship interview.This is a very interesting question from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» The correct CHOICE is (d) Targeting users with stealing code |
|
| 72. |
________________ is the opposite of assembler.(a) Reassembler(b) Disassembler(c) Compiler(d) InterpreterThis question was addressed to me during an internship interview.This key question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct OPTION is (b) Disassembler |
|
| 73. |
Which of the following is not a proper use of RE for ethical hackers?(a) Check for poorly designed protocols(b) Check for error conditions(c) Cracking for making paid apps free for use(d) Testing for boundary conditionsI had been asked this question during an interview.This is a very interesting question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (c) Cracking for making paid apps FREE for use |
|
| 74. |
Which of the following activity is a good aspect of reverse engineering in ethical hacking?(a) Cracking the trial version of the product to make it full-version(b) Removing the product key insertion step(c) Jumping the code for premium facilities(d) Determine whether the app contains any undocumented functionalityI got this question in an international level competition.Question is taken from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 75. |
Which of the following activity is a good aspect of reverse engineering in ethical hacking?(a) Cracking the trial version of the product to make it full-version(b) Removing the product key insertion step(c) Jumping the code for premium facilities(d) Determining the vulnerabilities in the product.I had been asked this question in quiz.This key question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (d) Determining the VULNERABILITIES in the product. |
|
| 76. |
RE is often defined as the crafting technique of ____________ who uses his skills to remove copy protection or trial versions from software or media.(a) crackers(b) risk assessment team(c) auditors(d) surveillance monitoring teamI have been asked this question during an interview for a job.This interesting question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (a) crackers |
|
| 77. |
______________ can be defined as the duplication of another creator’s or developer’s product trailing a thorough examination of its production or development.(a) Reverse hacking(b) Cracking(c) Social engineering(d) Reverse engineeringThe question was posed to me in examination.I need to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (d) Reverse engineering |
|
| 78. |
_____________ can be made functional to diverse aspects of software development & hardware improvement activities.(a) Reverse hacking(b) Cracking(c) Reverse engineering(d) Social engineeringI have been asked this question in a job interview.My question is based upon Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT option is (c) Reverse engineering Best explanation: Reverse engineering can be made functional to diverse aspects of software DEVELOPMENT & hardware improvement activities. This practice absorbs how the SYSTEM or the application works & what CONCEPTS have to implement in order to CRACK or duplicate it. |
|
| 79. |
If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.(a) passwords(b) email ID(c) name(d) addressThis question was posed to me in quiz.This interesting question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (a) passwords |
|
| 80. |
Which of the following is not an anti-spyware tool?(a) MalwareBytes Anti-Malware tool(b) SpyBot Search and Destroy(c) Emsisoft Emergency Kit(d) MS Firewall DefenderI got this question during a job interview.My doubt is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct CHOICE is (d) MS FIREWALL Defender |
|
| 81. |
As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents.(a) True(b) FalseThe question was posed to me by my college director while I was bunking the class.This interesting question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct CHOICE is (a) True |
|
| 82. |
Which of the following do not lead you to invite spyware into your system?(a) Accepting fishy prompt or pop-ups(b) Downloading apps from an unreliable source(c) Opening unknown attachments(d) Installing antivirus patchesI have been asked this question in semester exam.My question is taken from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (d) INSTALLING antivirus patches |
|
| 83. |
____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details.(a) Ad-based spyware(b) System Monitors(c) Spy-trojans(d) Tracking cookiesI got this question in a job interview.I want to ask this question from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (B) SYSTEM Monitors |
|
| 84. |
_________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.(a) Ad-based spyware(b) System Monitors(c) Spy-trojans(d) Tracking cookiesThis question was addressed to me in quiz.The doubt is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT ANSWER is (c) Spy-trojans Best explanation: There are four major types of spyware. One of them is the spy-trojans which DISGUISE them as legitimate software & appear as JAVA or Flash PLAYER updates. They will periodically collect your system data and send it to its creator. |
|
| 85. |
_____________ tracks your data and displays those products as ads for promotions.(a) Ad-based spyware(b) System Monitors(c) Spy-trojans(d) Tracking cookiesI had been asked this question in my homework.The query is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (a) Ad-based spyware |
|
| 86. |
It actually infects your device easily & makes it hard to _____________(a) delete(b) identify(c) modify(d) copyI got this question in a job interview.The doubt is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (b) identify |
|
| 87. |
There are __________ main types of spyware.(a) 2(b) 3(c) 4(d) 5I got this question by my school teacher while I was bunking the class.This key question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (c) 4 |
|
| 88. |
_____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes.(a) Ad-based spyware(b) System Monitors(c) Spy-trojans(d) Tracking cookiesThe question was asked by my school principal while I was bunking the class.My question is based upon Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (d) Tracking cookies |
|
| 89. |
Spyware is not a powerful & one of the most widespread threats on the internet.(a) True(b) FalseI got this question by my college director while I was bunking the class.Origin of the question is Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT option is (b) False To explain: Spyware is one of the most powerful & WIDESPREAD threats on the internet. Spyware is categorized as a sub-type of malware intended to spy & gain ACCESS to or damage the system DATA, without your acquaintance. |
|
| 90. |
Which of the following activity is not done by spyware?(a) Monitors your internet activity(b) Track user’s login details and passwords(c) Uninstalls your mobile browser(d) Spy on sensitive informationI had been asked this question in homework.My question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (c) Uninstalls your mobile browser |
|
| 91. |
Which of the following activity is not done by spyware?(a) sell internet usage data(b) capture credit card details(c) user’s personal identity(d) steal signature of the different virusThe question was asked by my college professor while I was bunking the class.I'm obligated to ask this question of Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 92. |
They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?(a) Shareware(b) Ransomware(c) Spyware(d) FreewareThis question was posed to me in quiz.This interesting question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (c) Spyware |
|
| 93. |
Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.(a) advertisers(b) dark-market(c) antivirus company(d) share marketThe question was posed to me in an online quiz.I would like to ask this question from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (a) ADVERTISERS |
|
| 94. |
________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.(a) Shareware(b) Spyware(c) Ransomware(d) FreewareThis question was posed to me in quiz.I'd like to ask this question from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct ANSWER is (b) Spyware |
|
| 95. |
Adware will not come to your system if you are using Chrome.(a) True(b) FalseThe question was posed to me in exam.This interesting question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT answer is (b) False To elaborate: As adware HIJACKS your system, VARIOUS kinds of unessential tasks KEEP occurring. Adware may come and junk up your system through any browser, whether it is Firefox, Chrome, Opera or Edge. |
|
| 96. |
Which of the following term is not a valid terminology and type of adware?(a) Mobile adware(b) Mac Adware(c) Smart-home adware(d) Windows adwareI have been asked this question in my homework.I'm obligated to ask this question of Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (C) Smart-home adware |
|
| 97. |
Modern ____________ can even use it to target users with additional advertisements that are customized to the browsing habits.(a) smart shareware(b) smart adware(c) smart bloatware(d) smart spywareThe question was asked by my school teacher while I was bunking the class.Origin of the question is Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (b) smart ADWARE |
|
| 98. |
Which among the following is not a symptom of your system compromised with adware?(a) Website links redirect to sites unlike from what user is intended(b) Web browser acts slows to a crawl(c) System takes restarts frequently(d) The browser might crash frequentlyI got this question during an interview.My query is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (c) System takes restarts frequently |
|
| 99. |
Malicious adware may sneak into your system by __________ different ways.(a) five(b) four(c) three(d) twoI have been asked this question in homework.Enquiry is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT answer is (d) two To explain: Malicious adware MAY sneak into your system in 2 different WAYS. 1^st, if you download and install a program that is freeware or shareware, it might install some other programs and ads –popping applications. 2^nd, through insidious – WEBSITES containing adware. |
|
| 100. |
Creators of adware also sell your browsing behaviour & information to 3^rd parties.(a) True(b) FalseI had been asked this question in an online quiz.I'd like to ask this question from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (a) True |
|