This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
A _______________ is a process of breaking a password protected system or server by simply & automatically entering every word in a dictionary as a password.(a) Dictionary attack(b) Phishing attack(c) Social engineering attack(d) MiTM attackThis question was posed to me during an interview for a job.My doubt stems from Password Cracking and Security Measures in portion Cyber Security Types of Cyber Security |
|
Answer» RIGHT choice is (a) DICTIONARY ATTACK For explanation: A dictionary attack is a process of breaking a password protected system or server by simply & automatically entering EVERY word in a dictionary as a password. It is very fast, time-saving and easy to PERFORM. |
|
| 52. |
Which of the following comes under the advantage of dictionary attack?(a) Time-consuming(b) Moderate efficient(c) Very fast(d) Complex to carry-outThe question was asked in an international level competition.This intriguing question originated from Password Cracking and Security Measures in division Cyber Security Types of Cyber Security |
|
Answer» The correct answer is (c) Very fast |
|
| 53. |
Which of the following is not an advantage of dictionary attack?(a) Very fast(b) Time-saving(c) Easy to perform(d) Very tough and inefficientThe question was asked by my college professor while I was bunking the class.Question is from Password Cracking and Security Measures topic in section Cyber Security Types of Cyber Security |
|
Answer» Right answer is (d) Very tough and inefficient |
|
| 54. |
Passwords need to be kept encrypted to protect from such offline attacks.(a) True(b) FalseI got this question during an internship interview.My question comes from Password Cracking and Security Measures in section Cyber Security Types of Cyber Security |
|
Answer» The correct answer is (a) True |
|
| 55. |
Saving passwords in the browser is a good habit.(a) True(b) FalseThe question was asked during an interview.This intriguing question originated from Password Cracking and Security Measures in section Cyber Security Types of Cyber Security |
|
Answer» The correct OPTION is (b) False |
|
| 56. |
Which of the following is not an example of offline password attack?(a) Dictionary attack(b) Rainbow attacks(c) Brute force attack(d) Spamming attackThis question was posed to me during an online interview.Query is from Password Cracking and Security Measures topic in division Cyber Security Types of Cyber Security |
|
Answer» Correct answer is (d) Spamming attack |
|
| 57. |
_______________ attacks always need physical access to the system that is having password file or the hacker needs to crack the system by other means.(a) online(b) offline(c) password(d) non-electronicI had been asked this question in exam.Asked question is from Password Cracking and Security Measures topic in division Cyber Security Types of Cyber Security |
|
Answer» Right option is (b) OFFLINE |
|
| 58. |
________________ attacks are carried out from a location other than the real computer where the password reside or was used.(a) passive online(b) active online(c) offline password(d) non-electronicThe question was asked in exam.My question is taken from Password Cracking and Security Measures topic in section Cyber Security Types of Cyber Security |
|
Answer» The correct option is (C) OFFLINE password |
|
| 59. |
_________________ can be alternatively termed as password guessing attack.(a) passive online(b) active online(c) offline attack(d) non-electronicThe question was posed to me during a job interview.My question is based upon Password Cracking and Security Measures topic in chapter Cyber Security Types of Cyber Security |
|
Answer» Right answer is (b) active online |
|
| 60. |
In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1 against victim’s system/account.(a) passive online(b) active online(c) offline attack(d) non-electronicI got this question by my school teacher while I was bunking the class.My query is from Password Cracking and Security Measures in section Cyber Security Types of Cyber Security |
|
Answer» CORRECT choice is (b) active online Best explanation: Users with open AUTHENTICATION points and BAD or WEAK passwords often becomes the victim of an active online attack where the attacker directly tries DIFFERENT passwords 1-by-1 against victim’s system/account. |
|
| 61. |
Which of them is not a disadvantage of active online attack?(a) Takes a long time(b) Easily and automatically detected(c) Need high network bandwidth(d) Need the patience to crackI got this question in my homework.I'm obligated to ask this question of Password Cracking and Security Measures in chapter Cyber Security Types of Cyber Security |
|
Answer» Right choice is (b) Easily and automatically detected |
|
| 62. |
Which of the following case comes under victims’ list of an active online attack?(a) Strong password based accounts(b) Unsecured HTTP users(c) Open authentication points(d) Logged in systems and servicesThe question was asked in final exam.My question is taken from Password Cracking and Security Measures topic in chapter Cyber Security Types of Cyber Security |
|
Answer» Correct choice is (c) Open authentication POINTS |
|
| 63. |
Which of the following do not comes under hurdles of passive online attack for hackers?(a) Hard to perpetrate(b) Computationally complex(c) Time taking, so patience has to be there(d) Tools not availableThe question was posed to me during an internship interview.This interesting question is from Password Cracking and Security Measures topic in division Cyber Security Types of Cyber Security |
|
Answer» The correct choice is (d) Tools not AVAILABLE |
|
| 64. |
Which of the following is not an example of a passive online attack?(a) MiTM(b) Reply Attack(c) Phishing(d) Wire sniffingI have been asked this question during an online interview.This question is from Password Cracking and Security Measures in division Cyber Security Types of Cyber Security |
|
Answer» Right OPTION is (c) Phishing |
|
| 65. |
Which of the following is an example of passive online attack?(a) Phishing(b) Social Engineering(c) Spamming(d) Wire sniffingThe question was asked in semester exam.Query is from Password Cracking and Security Measures in portion Cyber Security Types of Cyber Security |
|
Answer» CORRECT choice is (d) WIRE SNIFFING The explanation: ATTACKER do not contact with an authorized party to steal the password in the passive online attack, rather the attacker attempts to grab password HACKING without communicating with the victim or his/her victim account. Examples of passive online attacks include wire sniffing, Man in the middle attack and reply attack. |
|
| 66. |
In _______________ attacks an attacker do not contact with authorizing party for stealing password.(a) passive online(b) active online(c) offline(d) non-electronicThis question was posed to me by my school teacher while I was bunking the class.I want to ask this question from Password Cracking and Security Measures topic in section Cyber Security Types of Cyber Security |
|
Answer» Correct choice is (a) PASSIVE online |
|
| 67. |
There are ________ major types of passwords.(a) 4(b) 5(c) 6(d) 7I got this question in final exam.This interesting question is from Password Cracking and Security Measures in division Cyber Security Types of Cyber Security |
|
Answer» RIGHT ANSWER is (d) 7 For explanation I would say: There are seven major types of passwords. These are a PASSWORD containing only letters, a password containing only number, a password containing only special characters, a password containing only alpha-numeric characters, a password containing letters, numbers as well as special SYMBOLS or password containing any two COMBINATIONS of the three. |
|
| 68. |
Password cracking in system hacking is of ________ types.(a) 2(b) 3(c) 4(d) 5This question was addressed to me in a job interview.My enquiry is from Password Cracking and Security Measures in section Cyber Security Types of Cyber Security |
|
Answer» Correct answer is (c) 4 |
|
| 69. |
System hacking involves password hacking as one of the major hacking methodologies.(a) True(b) FalseI had been asked this question in an interview for internship.The doubt is from Password Cracking and Security Measures in portion Cyber Security Types of Cyber Security |
|
Answer» The correct answer is (a) True |
|
| 70. |
______________ is a tool that is integrated with top 90 search engines to grab quick search for email addresses and other details.(a) Email Spider Toolkit(b) Email Spider Easy(c) Email Crawler Easy(d) Email Spider ToolkitThe question was posed to me in examination.Asked question is from Email Security topic in section Cyber Security Types of Cyber Security |
|
Answer» The correct answer is (b) Email Spider Easy |
|
| 71. |
MegaHackerZ helps crackers to crack email passwords.(a) True(b) FalseThis question was posed to me in a job interview.The doubt is from Email Security topic in portion Cyber Security Types of Cyber Security |
|
Answer» Right choice is (a) True |
|
| 72. |
_______________ is targeted bulk email marketing software.(a) Email Spider Toolkit(b) Email Spider Easy(c) Email Crawler Easy(d) Email Spider ToolkitThis question was addressed to me during a job interview.This interesting question is from Email Security topic in division Cyber Security Types of Cyber Security |
|
Answer» The correct option is (B) Email Spider Easy |
|
| 73. |
Which of the following is not an email related hacking tool?(a) Email Finder Pro(b) Sendinc(c) Mail PassView(d) Mail PasswordThis question was posed to me during an interview for a job.Question is taken from Email Security topic in division Cyber Security Types of Cyber Security |
|
Answer» CORRECT choice is (b) SENDINC To ELABORATE: Sendinc is not an email data COMPROMISING tool. It is used for securing business email accounts and offers a quick web-based way to jump into offering secure emails for FIRMS. The rest three are email compromising tools. |
|
| 74. |
________________ is a free extension of browser that enables you in decrypting as well as encrypting emails.(a) Enlocked(b) MS Outlook(c) Cisco Jabber(d) MailvelopeThe question was asked in quiz.Question is taken from Email Security topic in section Cyber Security Types of Cyber Security |
|
Answer» Correct option is (d) Mailvelope |
|
| 75. |
Which of them is not an example of business email security tool?(a) Enlocked(b) RPost Office(c) MS Outlook(d) SendincI had been asked this question in class test.I would like to ask this question from Email Security in division Cyber Security Types of Cyber Security |
|
Answer» The correct OPTION is (c) MS OUTLOOK |
|
| 76. |
Which of them is not an example of business email security tool?(a) Microsoft Office Trust Center(b) Sendinc(c) Hushmail Business(d) Cisco JabberThe question was posed to me in an online quiz.This is a very interesting question from Email Security topic in section Cyber Security Types of Cyber Security |
| Answer» | |
| 77. |
PGP is abbreviated as _______________(a) Pretty Good Privacy(b) Powerful Good Privacy(c) Protocol Giving Privacy(d) Pretty Good ProtocolThis question was posed to me at a job interview.I want to ask this question from Email Security in chapter Cyber Security Types of Cyber Security |
|
Answer» RIGHT answer is (a) Pretty Good PRIVACY The explanation is: Pretty Good Privacy (PGP) is an encryption program which provides cryptographic privacy & authentication for email communication. Basically, it is used for SECURING user’s TEXTS, emails, attachments etc. |
|
| 78. |
_____________ is an encryption program or add-ons which provides cryptographic privacy & authentication for email communication.(a) Powerful Good Privacy(b) Pretty Good Privacy(c) Pretty Good Encryption(d) Pretty Strong EncryptionThis question was posed to me during an interview.Question is from Email Security topic in division Cyber Security Types of Cyber Security |
|
Answer» The correct answer is (b) Pretty Good Privacy |
|
| 79. |
Once the email is compromised, all other sites and services online associated with this email can be compromised.(a) True(b) FalseThe question was asked during an online exam.Origin of the question is Email Security in chapter Cyber Security Types of Cyber Security |
|
Answer» The CORRECT option is (a) True |
|
| 80. |
Advanced SER is abbreviated as ___________(a) Advanced Stealth Electronic Redirector(b) Advanced Security Email Redirector(c) Advanced Stealth Email Redirector(d) Advanced Stealth Email RecorderI have been asked this question in class test.The question is from Email Security topic in division Cyber Security Types of Cyber Security |
|
Answer» Correct choice is (c) Advanced Stealth Email Redirector |
|
| 81. |
Which of the following will not help in preserving email security?(a) Create a strong password(b) Connect your email to a phone number(c) Use two-factor authentication for password verification and login(d) Click on unknown links and sitesI have been asked this question during an online interview.This intriguing question originated from Email Security in division Cyber Security Types of Cyber Security |
|
Answer» Correct choice is (d) Click on unknown LINKS and sites |
|
| 82. |
Which of the following is a tool to monitor outgoing traffic of target PC’s email and intercept all the emails sent from it?(a) Wireshark(b) Advanced Stealth Email Redirector(c) MS Outlook(d) Cisco JabberI got this question in an online interview.I'm obligated to ask this question of Email Security topic in chapter Cyber Security Types of Cyber Security |
|
Answer» Correct option is (B) Advanced Stealth Email REDIRECTOR |
|
| 83. |
_______________ needs to be turned off in order to prevent from this attack.(a) Email scripting(b) Email attachments(c) Email services(d) Third party email programsI had been asked this question during a job interview.My query is from Email Security topic in section Cyber Security Types of Cyber Security |
|
Answer» The correct option is (a) Email SCRIPTING |
|
| 84. |
Email users who use IE as their _________________ are vulnerable to Reaper Exploit.(a) Web engine(b) Rendering engine(c) Game engine(d) HTML engineI have been asked this question during an internship interview.My question is from Email Security in portion Cyber Security Types of Cyber Security |
|
Answer» Correct choice is (d) HTML ENGINE |
|
| 85. |
Fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information.(a) True(b) FalseI got this question in an online quiz.This key question is from Email Security topic in portion Cyber Security Types of Cyber Security |
|
Answer» The CORRECT ANSWER is (a) True |
|
| 86. |
Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)?(a) Zeus(b) Stuxnet(c) Reaper Exploit(d) Friday the 13This question was addressed to me during an online exam.My question is taken from Email Security in chapter Cyber Security Types of Cyber Security |
|
Answer» Right answer is (c) Reaper EXPLOIT |
|
| 87. |
Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as _____________ details _________ and passwords.(a) credit card, antivirus name(b) credit card, login ID(c) cell phone, antivirus name(d) car model, account IDThis question was posed to me during an interview.Question is taken from Email Security in portion Cyber Security Types of Cyber Security |
|
Answer» Correct answer is (b) credit CARD, LOGIN ID |
|
| 88. |
Unsolicited Bulk E-mails (UBI) are called __________(a) SMS(b) MMS(c) Spam emails(d) Malicious emailsI got this question by my college director while I was bunking the class.My doubt is from Email Security in section Cyber Security Types of Cyber Security |
|
Answer» Right choice is (C) Spam emails |
|
| 89. |
Which of the following is a non-technical type of intrusion or attack technique?(a) Reverse Engineering(b) Malware Analysis(c) Social Engineering(d) Malware WritingI got this question by my college director while I was bunking the class.Question is taken from Email Security topic in section Cyber Security Types of Cyber Security |
|
Answer» Right option is (c) Social Engineering |
|
| 90. |
Using email hacking illicit hackers can send & spread ___________virus _____________ and spam emails.(a) trojans, redirected malicious URLs(b) antivirus, patches(c) cracked software, redirected malicious URLs(d) malware, security patchesI got this question during an internship interview.The query is from Email Security in section Cyber Security Types of Cyber Security |
|
Answer» Right option is (a) TROJANS, redirected malicious URLS |
|
| 91. |
_____________ is the technique used for tricking users to disclose their username and passwords through fake pages.(a) Social Engineering(b) Phishing(c) Cookie Stealing(d) Banner GrabbingThis question was posed to me in an interview.My query is from Email Security topic in chapter Cyber Security Types of Cyber Security |
|
Answer» CORRECT ANSWER is (B) Phishing Easy explanation: Phishing is the technique used for TRICKING users to disclose their USERNAME and passwords through fake pages. |
|
| 92. |
Which of them is an example of grabbing email information?(a) Cookie stealing(b) Reverse engineering(c) Port scanning(d) Banner grabbingI had been asked this question by my college director while I was bunking the class.This intriguing question comes from Email Security in chapter Cyber Security Types of Cyber Security |
|
Answer» Right answer is (a) Cookie STEALING |
|
| 93. |
If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.(a) memory(b) quarantine(c) cookies(d) hard driveThe question was posed to me in a national level competition.This question is from Email Security in portion Cyber Security Types of Cyber Security |
|
Answer» The CORRECT CHOICE is (c) COOKIES |
|
| 94. |
The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans.(a) attackers, malware(b) hackers, antivirus(c) penetration testers, malware(d) penetration testers, virusThe question was asked during a job interview.My enquiry is from Email Security in section Cyber Security Types of Cyber Security |
|
Answer» The correct option is (a) attackers, MALWARE |
|
| 95. |
If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.(a) True(b) FalseThis question was posed to me in an internship interview.Question is taken from Email Security in section Cyber Security Types of Cyber Security |
|
Answer» CORRECT option is (a) True For explanation I would SAY: If a website uses a COOKIE, or a BROWSER contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. This helps in initiating cookie stealing attack. |
|
| 96. |
Which of them is not a proper method for email security?(a) Use Strong password(b) Use email Encryption(c) Spam filters and malware scanners(d) Click on unknown links to exploreThe question was asked in an internship interview.This key question is from Email Security topic in portion Cyber Security Types of Cyber Security |
|
Answer» Right answer is (d) Click on unknown links to explore |
|
| 97. |
_____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.(a) Cloud(b) Pen drive(c) Website(d) EmailThe question was posed to me in an interview for internship.I want to ask this question from Email Security topic in chapter Cyber Security Types of Cyber Security |
|
Answer» Correct option is (d) Email |
|
| 98. |
____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.(a) Email security(b) Email hacking(c) Email protection(d) Email safeguardingThe question was posed to me in an interview.My enquiry is from Email Security in section Cyber Security Types of Cyber Security |
|
Answer» Right OPTION is (a) Email security |
|
| 99. |
Which of them is not a major way of stealing email information?(a) Stealing cookies(b) Reverse Engineering(c) Password Phishing(d) Social EngineeringI have been asked this question in an online interview.The query is from Email Security topic in chapter Cyber Security Types of Cyber Security |
|
Answer» Right answer is (B) Reverse Engineering |
|
| 100. |
There are _______ major ways of stealing email information.(a) 2(b) 3(c) 4(d) 5I have been asked this question in semester exam.My question is from Email Security topic in division Cyber Security Types of Cyber Security |
|
Answer» CORRECT option is (b) 3 The best I can EXPLAIN: There are three major ways of stealing EMAIL information. These are by stealing cookies, social ENGINEERING and password PHISHING technique. |
|