Cyber Crime Quiz Question
1. What type of cyber-crime, its law and punishments does section 66 of Indian IT hacks holds?
a. Cracking or illegally hack into any system
b. Putting antivirus into victim
c. Stealing data
d. Stealing hardware componets
Answer: Cracking or illegally hack into any system
2. You receive an email inviting you to apply for a compensation for financial losses during the pandemic. To
apply, you need to fill in a form with your personal details. What should you do?
a. Report it as phishing
b. Delete the message
c. Reply to the message and apply for the compensation scheme
d. Reply to the message telling the sender you won't fall for this trick
Answer: Report it as phishing
3. Which of the following is not done by cybercriminals?
a) Unauthorized account access
b) Mass attack using Trojans as botnets
c) Email spoofing and spamming
d) Report vulnerability in any system
Answer: Mass attack using Trojans as botnets
4. What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
Answer: India’s Information Technology (IT) Act, 2000
5. Which of the following is known as Malicious software?
A. illegal war
B. badware
C. malware
D. malicious ware
Answer Malware
6. What is the primary purpose of a VPN (Virtual Private Network) in cyber security?
a. Speedup internet connection
b. Encrypt and secure communication over the internet
c. Block malicious websites
d. Boost Wi-Fi signal strength
Answer: Encrypt and secure communication over the internet
7. What is the purpose of a CAPTCHA in online security?
A. Detecting malware
B. Authenticating users
C. Preventing Automated bots
D. All of the above
Answer: Preventing automated bots
8. Which of these groups exploit vulnerabilities?
A. Governments
B. Criminals
C. Hacktivists
D. All of the above
Answer: All of the above
9. What type of software infects a machine, locks the files, then asks for money?
A. Worm
B. Trojan
C. Ransomware
D. Browser Hijacker
Answer: Ransomware
10. What does the acronym AES stand for?
A. Automated Encryption Strength
B. Advanced Encryption Standard
C. Algorithm Encrypted System
D. Advanced Encryption Solution
Answer: Advanced Encryption Standard
11. What is the main purpose of a "sandbox" in cyber security?
A. A secure storage for passwords
B. Isolating and analyzing suspicious or untrusted programs
C. Creating a virtual playground for ethical hackers
D. Protecting against phishing attacks
Answer: Isolating and analyzing suspicious or untrusted programs
12. Which command can be used in DOS or Windows command Prompt to hide files?
A. Stealth [file/ directory]
B. Attrib +h [ file / directory]
C. Hide –h [file/ directory]
D. Attrib *h [ file / directory]
Answer: Attrib +h [ file / directory]
13. What is a worm that affects SQL servers?
A. SQL Slammer
B. Storm Worm
C. SQL Michelangelo
D. The Great Worm
Answer: SQL Slammer
14. What does the term "firewall" refer to in cyber security?
A. A protective suit worn by cybersecurity professionals
B. A physical barrier around computer servers
C. A security system that monitors and controls network traffic
D. Software for preventing computer overheating
Answer: A security system that monitors and controls network traffic
15. What is getting connected to a system without a username or password called?
A. Null session
B. Blank session
C. Admin Session
D. Bot session
Answer: Null Session
16. What is a group of computers networked together and used by hackers to steal information called?
A. Rootkit
B. Operating system
C. Botnet
D. DDos
Answer: Botnet
17. Why would a hacker use a proxy server?
A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection.
D. To hide malicious activity on the network.
Answer: To hide malicious activity on the network.
18. Which of the following is not a factor in securing the environment against an attack on security?
A. The education of the attacker
B. The system configuration
C. The network architecture
D. The business strategy of the company
Answer: The business strategy of the company
19. Attempting to gain access to a network using an employee’s credentials is called the _____________
mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Answer: Local networking
20. Which of the following is not a typical characteristic of an ethical hacker?
A. Excellent knowledge of Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Has the highest level of security for the organization.
Answer: Has the highest level of security for the organization
21. What type of symmetric key algorithm using a streaming cipher to encrypt information?
A. RC$
B. Blowfish
C. SHA
D. MD5
Answer: RC$
22. What type of attack uses a fraudulent server with a relay address?
A. NTLM
B. MITM
C. NetBIOS
D. SMB
Answer: MITM
23. What type of attack uses a fraudulent server with a relay address?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system.
Answer: Additional unused features on commercial software packages.
24. Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls
Answer: To identify live systems
25. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Answer: ARIN