Cyber Security can be defined as procedures and technologies used for safeguarding the computers, networks, data from unauthorised access and attacks done through the internet by cyber criminals.
Question 1: How many types of Cyber Crimes are there?
A) 2
B) 3
C) 4
D) None of these
Answer: 2
Explanation: Peer to peer attack: attacker targets victim
Computer as weapon: computers are used for mass attacks
Question 2: Which of the following is not a peer to peer cyber crime type?
A) Injecting trojan to a victim
B) Phishing
C) Leaking details of credit card on dark web
D) None of these
Answer: Leaking details of credit card on dark web
Explanation: Injecting trojan to a victim: peer to peer cyber crime
Phishing: peer to peer cyber crime
Leaking details of credit card on dark web: computer as weapon
Question 3: In order to attack the database of a website which injecting attack can be used?
A) SQL Injection
B) HTML Injection
C) Malicious code Injection
D) All of these
Answer: SQL Injection
Explanation: SQL Injection allows the hacker to access the database of a website by running malicious code.
Question 4: Which of the following attacks can be deployed using the website's comment section by infusing malicious code?
A) SQL Injection
B) Cross Site Scripting
C) Both of these
D) None of these
Answer: Cross Site Scripting
Explanation: Cross Site Scripting (also known as XSS) can be deployed using the website's comment section by infusing malicious code.
Question 5: Stuxnet is?
A) Virus
B) Worm
C) Trojan
D) None of these
Answer: Worm
Explanation: Stuxnet is a worm. It came into existence in 2010 and caused a huge damage to Iran’s Nuclear Program. Programmable Logic Controllers are its main targets.
Question 6: EDR stands for?
A) Endpoint Detection and Response
B) Endpoint Detection and Recovery
C) Early Detection and Recovery
D) None of these
Answer: Endpoint Detection and Response
Explanation: It is a collection tools that are used to monitor network, record the activity on the network. Moreover it reports detection and analysis to a central database.
Question 7: Which of the following is used for data encryption at the network layer?
A) SMTP
B) IPSec
C) S/MIME
D) None of these
Answer: IPSec
Explanation: Secured Internet Protocol secures data at network layer using the following protocols:
Authentication Header
Internet Key Exchange
Encapsulating Secure Payload
Question 8: PCT stands for?
A) Private Communication Technology
B) Private Communication Technique
C) Public Communication Technology
D) Personal Communication Technique
Answer: Private Communication Technology
Explanation: Private Communication Technology is very much similar to SSL (Secured Socket Layer) just the difference being it has a smaller message. It supports various encryption algorithms including RSA, DES, etc.
Question 9: SSL is used for which purpose?
A) Integrity and Privacy
B) Integrity and Authenticity
C) Non Repudiation and Integrity
D) None of these
Answer: Integrity and Authenticity
Explanation: Primary focus of SSL is on Integrity. Moreover it provides authenticity which helps users to have a secure communication over the internet.
Question 10: VPN uses which type of the following protocols?
A) Network Level Protocols
B) Application Level Protocols
C) Tunneling Protocols
D) None of these
Answer: Application Level Protocols
Explanation: VPN uses encryption techniques in order to maintain privacy and security and tunneling protocols, which works on Application Level.