Skip to content

Latest commit

 

History

History
211 lines (140 loc) · 4.26 KB

flag.md

File metadata and controls

211 lines (140 loc) · 4.26 KB

1. As a form of cybercrime, which of the following is an option?

  • Phishing
  • SQL Injection
  • Evil Twin
  • All of the above

All of the above

2. “Cyberspace” was coined by _________

  • Richard Stallman
  • William Gibson
  • Andrew Tannenbaum
  • Scott Fahlman

**ANSWER HERE : William Gibson

3. In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?

  • 1991
  • 1983
  • 1970
  • 1964

19991

4. Which of the following describes a method of hacking in which cybercriminals create fake online domains under an aim to dupe or collect an excessive traffic number?

  • Mimicking
  • Spamming
  • Pharming
  • Website-Cloning

answer:Pharming

3. In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?*

  • 1991
  • 1983
  • 1970
  • 1960

1970

**ANSWER HERE : 1970

5. A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?

  • Clickjacking
  • Buffer-overflow
  • Phishing
  • MiTM

click jerking

6. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?

  • White Hat Hackers
  • Black Hat Hackers
  • Hactivists
  • Gray Hat Hackers

Black Hat Hackers

7. What is the existence of weakness in a system or network is known as?

  • Attack
  • Exploit
  • Vulnerability
  • Threat

Vulnerability

8. Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.

  • MiTM attack
  • Phishing attack
  • Website attack
  • DoS attack

**Phishing attack **

9. Which of the following term refers to a group of hackers who are both white and black hat?

  • Black Hat
  • Gray Hat
  • White Hat
  • Green Hat

**Gray Hat : **

10. Which of the following is the least strong security encryption standard?

  • WPA3
  • WPA2
  • WPA
  • WEP

**WEP : **

11. Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?

  • Operating System fingerprinting
  • Operating System penetration testing
  • Digital-printing
  • Machine printing

Operating System fingerprinting

12. Which of the following can diminish the chance of data leakage?

  • Steganography
  • Chorography
  • Cryptography
  • Authentication

Steganography

13. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as

  • Nation / State sponsored hackers
  • CIA triad
  • Special Hackers
  • Government Hackers

**ANSWER HERE : Nation / State sponsored hackers

14. Which of the following is a component of cyber security?

  • Internet Of Things
  • AI
  • Database
  • Attacks

ANSWER HERE : Attacks

15. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?

  • Cyber attack
  • Computer security
  • Cryptography
  • Digital hacking

**ANSWER HERE : Cyber attack

16. What is the need of cybersecurity?

  • To solve cyber attack
  • Computer security
  • Cryptography
  • Digital hacking

** to solve cyber attack: **

17. What is OSINT?

  • Open-source intelligence
  • Open-service intelligence
  • Open-secure intelligence
  • OWASP-source intelligence

**ANSWER HERE : Open-source intelligence

18. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?

  • Malware
  • Spyware
  • Adware
  • All of the above

**ANSWER HERE : Spyware

19.Who is father of computer security?

  • Aygust Kerckhoffs
  • Bob Thomas
  • Robert
  • Charles

**ANSWER HERE : August Kerckhoffs

20.Which of the following is a type of cyber security?

  • Cloud Security
  • Network Security
  • Application Security
  • All of the above

**ANSWER HERE :All of the above

21.Which of the following is not a cybercrime?

  • Denial of Service
  • Man in the Middle
  • Malware
  • AES

**ANSWER HERE : AES I answer some UN1QU3-py

23.Why is Code red?

  • Antivirus
  • Virus
  • Spam
  • WPS

**ANSWER HERE : Virus