Skip to content

Latest commit

 

History

History
185 lines (121 loc) · 3.82 KB

flag.md

File metadata and controls

185 lines (121 loc) · 3.82 KB

71. As a form of cybercrime, which of the following is an option?

  • Phishing
  • SQL Injection
  • Evil Twin
  • All of the above

All of the above

2. “Cyberspace” was coined by _________

  • Richard Stallman
  • William Gibson
  • Andrew Tannenbaum
  • Scott Fahlman

**ANSWER HERE : William Gibson

3. In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?

  • 1991
  • 1983
  • 1970
  • 1964

1970

4. Which of the following describes a method of hacking in which cybercriminals create fake online domains under an aim to dupe or collect an excessive traffic number?

  • Mimicking
  • Spamming
  • Pharming
  • Website-Cloning

answer:Pharming

3. In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?*

  • 1991
  • 1983
  • 1970
  • 1960

1970

**ANSWER HERE : **

5. A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?

  • Clickjacking
  • Buffer-overflow
  • Phishing
  • MiTM

Buffer-overflow

6. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?

  • White Hat Hackers
  • Black Hat Hackers
  • Hactivists
  • Gray Hat Hackers

Black Hat Hackers

7. What is the existence of weakness in a system or network is known as?

  • Attack
  • Exploit
  • Vulnerability
  • Threat

Vulnerability

8. Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.

  • MiTM attack
  • Phishing attack
  • Website attack
  • DoS attack

**Phishing attack **

9. Which of the following term refers to a group of hackers who are both white and black hat?

  • Black Hat
  • Gray Hat
  • White Hat
  • Green Hat

**Gray Hat : **

10. Which of the following is the least strong security encryption standard?

  • WPA3
  • WPA2
  • WPA
  • WEP

**WEP : **

11. Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?

  • Operating System fingerprinting
  • Operating System penetration testing
  • Digital-printing
  • Machine printing

Operating System fingerprinting

12. Which of the following can diminish the chance of data leakage?

  • Steganography
  • Chorography
  • Cryptography
  • Authentication

Steganography

13. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as

  • Nation / State sponsored hackers
  • CIA triad
  • Special Hackers
  • Government Hackers

**ANSWER HERE : Nation / State sponsored hackers

14. Which of the following is a component of cyber security?

  • Internet Of Things
  • AI
  • Database
  • Attacks

ANSWER HERE : Attacks

15. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?

  • Cyber attack
  • Computer security
  • Cryptography
  • Digital hacking

**ANSWER HERE : Cyber attack

16. What is the need of cybersecurity?

  • To solve cyber attack
  • Computer security
  • Cryptography
  • Digital hacking

** to solve cyber attack: **

17. What is OSINT?

  • Open-source intelligence
  • Open-service intelligence
  • Open-secure intelligence
  • OWASP-source intelligence

**ANSWER HERE : Open-source intelligence

18. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?

  • Malware
  • Spyware
  • Adware
  • All of the above

**ANSWER HERE : Spyware

19.Who is father of computer security?

-Aygust Kerckhoffs -Bob Thomas -Robert -Charles

**ANSWER HERE : August Kerckhoffs