InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
Creators of _____________ also sell your browsing behaviour & information to 3^rd parties.(a) Shareware(b) Spyware(c) URL(d) AdwareThe question was posed to me by my school principal while I was bunking the class.The doubt is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (d) Adware |
|
| 102. |
PUP is abbreviated as ____________(a) Potentially Useless Programs(b) Potentially Unwanted Protocols(c) Potentially Unwanted Programs(d) Partial Unwanted ProgramsI got this question in a job interview.My question comes from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT choice is (c) Potentially Unwanted Programs The EXPLANATION: Adwares are designed to pitch advertisements upon user’s SCREEN, most often WITHIN a WEB browser. So, security professionals treat it as modern-day PUP (potentially unwanted programs). |
|
| 103. |
Users might invite some bogus virus in his/her system by clicking the ____________(a) Shareware(b) Spyware(c) URL(d) AdwareThe question was posed to me in quiz.My query is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (d) Adware |
|
| 104. |
Which among the following is not an abnormal symptom found once you click any malicious adware?(a) Automatic opening of new tabs in the browser(b) Automatic updates of antivirus(c) Changes in home page(d) Popping up of new Search engines on your browserI have been asked this question in an international level competition.My enquiry is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct ANSWER is (b) Automatic updates of antivirus |
|
| 105. |
Once _____________ hijacks your system, it might perform different sorts of unwanted tasks.(a) Server hacking(b) Banner grabbing(c) Cracking(d) HijackingI have been asked this question in an internship interview.This intriguing question originated from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT option is (d) Hijacking The explanation is: Once adware hijacks your system, it might PERFORM different kinds of superfluous TASKS. The adware’s functions may be intended to analyze a victim’s location & what different Internet SITES he/she is visiting. |
|
| 106. |
_____________ are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser.(a) Shareware(b) Adware(c) Bloatware(d) RansomwareThis question was addressed to me by my school teacher while I was bunking the class.I'd like to ask this question from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (b) Adware |
|
| 107. |
_____________ is the attack method for decoding user credentials. Using this technique an attacker can log on as a user & gain access to unauthorized data.(a) Cache Snooping(b) Cookie-jacking(c) Cookie Snooping(d) Cache-compromisingI had been asked this question by my school principal while I was bunking the class.My question is based upon Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (c) Cookie SNOOPING |
|
| 108. |
Which of the following is not an example of web application hacking technique?(a) LDAP injection(b) Cryptanalysis(c) Race condition attack(d) OS command injection.This question was addressed to me during a job interview.My question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» The correct OPTION is (b) Cryptanalysis |
|
| 109. |
______________ takes advantage if hidden fields that work as the only security measure in some applications.(a) Parameter tampering(b) Data tampering(c) Tampering of network topology(d) Protocol tamperingThis question was addressed to me in homework.This intriguing question originated from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (a) Parameter TAMPERING |
|
| 110. |
Which of the following scripting language is used for injecting executable malicious code for web-app hacking?(a) C++(b) Tcl(c) Frame-Script(d) JavaScriptI have been asked this question in a job interview.Enquiry is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (d) JavaScript |
|
| 111. |
________ Injection attack is a special attack done through character elements “Carriage Return” or “Line Feed.” Exploitation can be done when an attacker is capable to inject a CRLF series in an HTTP stream.(a) XSS(b) CSRF(c) CRLF(d) SQLThis question was addressed to me in examination.The question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (c) CRLF |
|
| 112. |
Which of the following is not a threat of web application?(a) Session poisoning(b) Phishing(c) Cryptographic interception(d) Cookie snoopingI got this question in class test.Asked question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 113. |
Which of the following is not a threat of web application?(a) Reverse engineering(b) Command injection(c) DMZ protocol attack(d) Buffer OverflowI got this question during an interview.This interesting question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (a) REVERSE engineering |
|
| 114. |
XSS stands for _________________(a) Crack Site Scripting(b) Cross Site Server(c) Cross Site Scripting(d) Crack Server ScriptingI had been asked this question in a national level competition.This intriguing question comes from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (c) Cross Site SCRIPTING |
|
| 115. |
Which of the following is not an example of web application hacking?(a) DNS Attack(b) Dumpster diving(c) Injecting Malicious code(d) Using the shell to destroy web application dataI got this question in class test.My doubt is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 116. |
Which of the following is not an appropriate method of web application hacking?(a) XSS(b) CSRF(c) SQLi(d) Brute-forceI got this question in an online interview.I'd like to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (d) Brute-force |
|
| 117. |
_______________ hacking refers to mistreatment of applications through HTTP or HTTPS that can be done by manipulating the web application through its graphical web interface or by tampering the Uniform Resource Identifier (URI).(a) Android application(b) Web application(c) PC application(d) Cloud applicationI had been asked this question in examination.I would like to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (B) Web application |
|
| 118. |
Which of the following is not an example of web application hacking?(a) Defacing websites(b) Stealing credit card information(c) Reverse engineering PC apps(d) Exploiting server-side scriptingI had been asked this question by my school principal while I was bunking the class.I'd like to ask this question from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (c) Reverse ENGINEERING PC apps |
|
| 119. |
A _______________ is a program application which is stored on a remote-server & distributed over the Internet when a user uses a browser interface to request for such applications.(a) Android application(b) Web application(c) PC application(d) Cloud applicationThis question was addressed to me at a job interview.Question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (b) Web application |
|
| 120. |
Which of the following is not an appropriate countermeasure for web server hacking?(a) Using OS or antivirus without updates(b) Scan web server applications for vulnerabilities(c) Using secure protocols(d) Follow strict access control policyThe question was asked in unit test.The query is from Web Server Attacks topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (a) Using OS or antivirus without updates |
|
| 121. |
Which of the following is not an appropriate countermeasure for web server hacking?(a) Patch updates need to be done regularly(b) Not to use default configurations(c) Use IDS and firewalls with signature updates(d) Use low-speed internetThis question was posed to me in unit test.Query is from Web Server Attacks in section Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 122. |
CleanIISLog is not a hacking tool.(a) True(b) FalseI had been asked this question during a job interview.I'd like to ask this question from Web Server Attacks topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (b) False |
|
| 123. |
______________ tool clears the log entries in the IIS log files filtered by an IP address.(a) CleanIISLoging(b) CleanLogger(c) CleanIISLog(d) ClearIISLogThis question was posed to me at a job interview.Question is from Web Server Attacks in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (c) CleanIISLog |
|
| 124. |
Which of the following is not a web server attack type?(a) DOS attack(b) Website Defacement using SQLi(c) Directory Traversal(d) Password guessingI had been asked this question in an internship interview.My question is taken from Web Server Attacks in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (d) Password guessing |
|
| 125. |
____________ logs all the visits in log files which is located at \logfiles.(a) IIS(b) Microsoft Server(c) Linux(d) IASThis question was posed to me in an online quiz.This is a very interesting question from Web Server Attacks in division Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT choice is (a) IIS To explain: Internet Information Services logs all the VISITS in log files which are located at <%systemroot%>\logfiles. IIS (Internet Information Services) is ONE of the most widely used web server platforms. |
|
| 126. |
____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote PC.(a) Spyware(b) ASP Trojan(c) Web ransomware(d) StuxnetThe question was asked in exam.Origin of the question is Web Server Attacks topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (b) ASP TROJAN |
|
| 127. |
IIS stands for __________________(a) Interconnected Information Server(b) Interconnected Information Services(c) Internet Information Server(d) Internet Information ServicesThe question was asked in class test.Origin of the question is Web Server Attacks in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (d) Internet Information Services |
|
| 128. |
_________ is one of the most widely used web server platforms.(a) IIS(b) IAS(c) ISS(d) AISI got this question in quiz.I'm obligated to ask this question of Web Server Attacks in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (a) IIS |
|
| 129. |
Which of the following is not an appropriate method of defacing web server?(a) Fetching credentials through MiTM(b) Brute-forcing Admin Password(c) IP address spoofing(d) DNS Attack through cache poisoningI had been asked this question at a job interview.This interesting question is from Web Server Attacks topic in portion Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 130. |
Which of the following is not an appropriate method of defacing web server?(a) Mail server intrusion(b) Web application bugs(c) Web shares misconfiguration(d) Sessions hijackingThis question was addressed to me by my school principal while I was bunking the class.The origin of the question is Web Server Attacks in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right CHOICE is (d) Sessions hijacking |
|
| 131. |
Which of the following is not an appropriate way to compromise web servers?(a) Misconfiguration in OS(b) Using network vulnerabilities(c) Misconfiguration in networks(d) Bugs in OS which allow commands to run on web serversThe question was asked in an interview for job.This question is from Web Server Attacks topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (B) Using network vulnerabilities |
|
| 132. |
Hjksuite Tool is a collection of programs for hijacking. It contains a library called hjklib which can help in implementing TCP/IP stack-over hijacking.(a) True(b) FalseI have been asked this question in an online interview.I'm obligated to ask this question of Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct OPTION is (a) True |
|
| 133. |
Which of the following is a session hijacking tool?(a) T-Sight(b) Wireshark(c) Maltego(d) NessusThis question was posed to me in examination.I want to ask this question from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct ANSWER is (a) T-Sight |
|
| 134. |
Which of them is not a session hijacking tool?(a) Juggernaut(b) IP watcher(c) Wireshark(d) Paros HTTP HijackerThis question was posed to me by my college director while I was bunking the class.This question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (c) Wireshark |
|
| 135. |
In ___________________ session hijacking, hackers gain session ID for taking control of existing session or even create a new unauthorized session.(a) network level(b) physical level(c) application level(d) data levelI had been asked this question in an internship interview.I would like to ask this question from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (B) physical LEVEL |
|
| 136. |
Which of the following example do not comes under network level session hijacking.(a) TCP/IP Hijacking(b) RST Hijacking(c) Domain Hijacking(d) Blind HijackingI got this question during an online interview.My enquiry is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (C) Domain Hijacking |
|
| 137. |
The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.(a) network level(b) physical level(c) application level(d) data levelI have been asked this question in final exam.I'd like to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (a) network level |
|
| 138. |
Session hijacking takes place at ____________ number of levels.(a) five(b) four(c) three(d) twoI had been asked this question in final exam.Asked question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (d) two |
|
| 139. |
In an _________________ attack, an attacker finds an active session & takes over that session.(a) network session hijacking(b) passive session hijacking(c) active session hijacking(d) social-networking session hijackingI have been asked this question during an internship interview.My question comes from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (c) ACTIVE session HIJACKING |
|
| 140. |
With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth.(a) network session hijacking(b) passive session hijacking(c) active session hijacking(d) social-networking session hijackingThis question was addressed to me in an online interview.Query is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (b) passive SESSION hijacking |
|
| 141. |
There are ___________ types of session hijacking.(a) 2(b) 3(c) 4(d) 5I got this question in an internship interview.This intriguing question originated from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (a) 2 |
|
| 142. |
In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.(a) phishing(b) spoofing(c) hijacking(d) vishingI have been asked this question in unit test.My question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (b) spoofing |
|
| 143. |
_______________ is done only after the target user has connected to the server.(a) Server hacking(b) Banner grabbing(c) Cracking(d) HijackingI got this question in class test.The above asked question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (d) Hijacking |
|
| 144. |
Since most _______________________ occur at the very beginning of the TCP session, this allows hackers to gain access to any system.(a) authentications(b) breaches(c) integrations(d) associationsThe question was posed to me by my college professor while I was bunking the class.The above asked question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT option is (a) authentications Best explanation: TCP session hijacking that deals with a security attack on any target victim’s session over a protected network. SINCE most authentications occur at the very beginning of the TCP session, this allows hackers to GAIN access to any MACHINE. |
|
| 145. |
________________ are required because HTTP uses a lot of diverse TCP connections, so, the web server needs a means to distinguish every user’s connections.(a) Internet(b) Network(c) Hijacking(d) SessionsThe question was asked in an interview.This is a very interesting question from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT ANSWER is (d) Sessions The best explanation: Sessions are REQUIRED because HTTP uses a lot of diverse TCP connections, so, the web server needs the means to distinguish EVERY user’s connections. Session hijacking attack is the exploitation of the web-session & its mechanism that is USUALLY managed with a session token. |
|
| 146. |
The most commonly used session hijacking attack is the _______________(a) IP hacking(b) IP spooling(c) IP spoofing(d) IP trackingI got this question at a job interview.Enquiry is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct OPTION is (c) IP spoofing |
|
| 147. |
_____________ attack is the exploitation of the web-session & its mechanism that is usually managed with a session token.(a) Session Hacking(b) Session Hijacking(c) Session Cracking(d) Session CompromisingThe question was posed to me during an interview.My enquiry is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The CORRECT choice is (b) Session HIJACKING |
|
| 148. |
__________________ are those devices which can be plugged into your network at the hardware level & it can monitor traffic.(a) Hardware sniffers & analyzers(b) Hardware protocol analyzers(c) Hardware protocol sniffers(d) Hardware traffic sniffers and observersI had been asked this question in final exam.This question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (b) Hardware protocol analyzers |
|
| 149. |
In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered in different ways to accomplish the attack.(a) passive(b) signal(c) network(d) activeThe question was posed to me in my homework.Query is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (d) active |
|
| 150. |
A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.(a) Phishing site(b) Sniffer tool(c) Password cracker(d) NIC crackerI have been asked this question during an interview for a job.I would like to ask this question from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (b) Sniffer tool |
|