This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it.(a) True(b) FalseThe question was posed to me by my college director while I was bunking the class.This key question is from Corporate Cyber Security topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» CORRECT choice is (b) False Easy explanation: If you’re working in your company’s system/laptop and suddenly a pop-up WINDOW arise asking you to update your security application, you must VERIFY it once with the senior member, or tech-department if you feel it is for the first TIME, otherwise you must not skip updating your system security APPLICATIONS. |
|
| 2. |
One must isolate payment systems and payment processes from those computers that you think are used by ____________ or may contain ____________(a) strangers, keyloggers(b) strangers, antivirus(c) unknown, firewalls(d) unknown, antivirusThis question was posed to me in an online quiz.Question is from Corporate Cyber Security topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Right option is (a) STRANGERS, keyloggers |
|
| 3. |
It is important to limit ____________ to all data and information as well as limit the authority for installing software.(a) work-load(b) employee access(c) admin permission(d) installing unwanted appsThis question was addressed to me by my college professor while I was bunking the class.Asked question is from Corporate Cyber Security topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct choice is (b) EMPLOYEE access |
|
| 4. |
Which of the following do not comes under security measures for cloud in firms?(a) Firewall(b) Antivirus(c) Load Balancer(d) EncryptionI had been asked this question in semester exam.Question is taken from Corporate Cyber Security in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct CHOICE is (B) Antivirus |
|
| 5. |
___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area.(a) algorithm-licensing(b) code-licensing(c) item licensing(d) product licensingThe question was posed to me in homework.My question is taken from Corporate Cyber Security topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Correct answer is (d) product licensing |
|
| 6. |
________________ important and precious file is a solution to prevent your files from ransomware.(a) Deleting all(b) Keeping backup of(c) Not saving(d) Keeping in pen driveI had been asked this question in an international level competition.This question is from Corporate Cyber Security topic in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Right option is (b) Keeping backup of |
|
| 7. |
________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization.(a) Spyware(b) Ransomware(c) Adware(d) SharewareThis question was posed to me in semester exam.This question is from Corporate Cyber Security topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct ANSWER is (B) Ransomware |
|
| 8. |
Use of _______________ can bring external files and worms and virus along with it to the internal systems.(a) smart-watch(b) pen drive(c) laptop(d) iPodThis question was posed to me in an online interview.The origin of the question is Corporate Cyber Security in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct option is (b) PEN drive |
|
| 9. |
A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference.(a) MiTM(b) Browser hacking(c) Browser Hijacker(d) Cookie-stealingI got this question in homework.Question is from Corporate Cyber Security in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Right answer is (C) Browser Hijacker |
|
| 10. |
Every employee of the firm must need to have some basic knowledge of cyber-security and types of hacking and how they are done.(a) True(b) FalseThis question was posed to me at a job interview.I'm obligated to ask this question of Corporate Cyber Security topic in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» CORRECT answer is (a) True To explain: EVERY employee of the firm MUST need to have some BASIC knowledge of cyber-security and types of hacking and how they are done. This will make each employee aware of the various malicious activities and can report to their seniors in this regard. |
|
| 11. |
It is very important to block unknown, strange and ______________ within the corporate network.(a) infected sites(b) programs(c) unwanted files(d) important foldersI had been asked this question in homework.The above asked question is from Corporate Cyber Security in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» RIGHT choice is (a) infected sites For explanation I WOULD SAY: It is very important to block unknown, strange and infected sites within the corporate network, by the network administrator so that any EMPLOYEE may not accidentally ACCESS those sites or open infected sites by means of clickjacking or URL-redirection techniques. |
|
| 12. |
Which of the following is not a proper aspect of user integration?(a) Employee’s authentication(b) Physical authorization(c) Access control(d) Representing users in the databaseThis question was posed to me in exam.This is a very interesting question from Corporate Cyber Security in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Right answer is (b) Physical authorization |
|
| 13. |
Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen.(a) information(b) papers(c) hardcopy files(d) media filesI have been asked this question in class test.This is a very interesting question from Corporate Cyber Security in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The CORRECT answer is (a) information |
|
| 14. |
The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________(a) Distributed Denial-of-Service (DDoS)(b) Permanent Denial-of-Service (PDoS)(c) Denial-of-Service (DoS)(d) Controlled Denial-of-Service (CDoS)The question was asked by my school principal while I was bunking the class.My enquiry is from How Security Breach Takes Place topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Correct answer is (a) Distributed Denial-of-Service (DDoS) |
|
| 15. |
_____________ is a malicious method used by cyber-criminals to trick a user into clicking on something different from what the user wants.(a) Click-hacking(b) Click-fraud(c) Clickjacking(d) Using torrent linksI got this question in examination.I would like to ask this question from Corporate Cyber Security in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Right choice is (c) Clickjacking |
|
| 16. |
Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other components to make their hands dirty on your confidential information.(a) True(b) FalseThe question was posed to me in examination.This key question is from How Security Breach Takes Place topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct answer is (a) True |
|
| 17. |
An attacker may use automatic brute forcing tool to compromise your ____________(a) username(b) employee ID(c) system / PC name(d) passwordI have been asked this question during an interview.This is a very interesting question from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Correct option is (d) password |
|
| 18. |
Clicking a link which is there in your email which came from an unknown source can redirect you to ____________ that automatically installs malware in your system.(a) that vendor’s site(b) security solution site(c) malicious site(d) software downloading siteThis question was posed to me during an internship interview.My doubt stems from How Security Breach Takes Place in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct option is (c) malicious site |
|
| 19. |
The antivirus or PC defender software in a system helps in detecting virus and Trojans.(a) True(b) FalseI have been asked this question in an online quiz.I need to ask this question from How Security Breach Takes Place in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The CORRECT OPTION is (a) True |
|
| 20. |
______________ are special malware programs written by elite hackers and black hat hackers to spy your mobile phones and systems.(a) Scareware(b) Ransomware(c) Adware(d) SpywareThis question was posed to me during an internship interview.My query is from How Security Breach Takes Place topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Correct answer is (d) Spyware |
|
| 21. |
_____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt all the files and unlock the system.(a) Scareware(b) Ransomware(c) Adware(d) SpywareThe question was posed to me during an interview for a job.The query is from How Security Breach Takes Place in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Right choice is (B) Ransomware |
|
| 22. |
You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your data from that thrown-away file also, using the technique _________(a) Dumpster diving(b) Shoulder surfing(c) Phishing(d) SpammingThis question was posed to me in unit test.This interesting question is from How Security Breach Takes Place topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» CORRECT OPTION is (a) Dumpster diving Easy explanation: Dumpster diving is a social engineering technique used by HACKERS to grab your personal and CONFIDENTIAL data from that thrown-away file also. Using these data attackers may use password guessing or fraud calls (if they find your personal phone number). |
|
| 23. |
ATM Skimmers are used to take your confidential data from your ATM cards.(a) True(b) FalseI got this question by my college director while I was bunking the class.The doubt is from How Security Breach Takes Place in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct option is (a) True |
|
| 24. |
An attacker, who is an employee of your firm may ___________ to know your system password.(a) do peeping(b) perform network jamming(c) do shoulder surfing(d) steal your laptopThis question was posed to me during an interview for a job.I want to ask this question from How Security Breach Takes Place in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» CORRECT OPTION is (c) do shoulder surfing To elaborate: An attacker, who is an EMPLOYEE of your firm may do shoulder surfing to know your system password. Shoulder surfing is a social engineering technique USED to secretly PEEP to gain knowledge of your confidential information. |
|
| 25. |
___________ will give you an USB which will contain ___________ that will take control of your system in the background.(a) Attackers, Trojans(b) White hat hackers, antivirus(c) White hat hackers, Trojans(d) Attackers, antivirusThe question was posed to me in an interview.I'd like to ask this question from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct ANSWER is (a) Attackers, Trojans |
|
| 26. |
Which of the companies and organizations do not become the major targets of attackers for data stealing?(a) Business firms(b) Medical and Healthcare(c) Government and secret agencies(d) NGOsThe question was asked in a job interview.The doubt is from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Correct choice is (d) NGOs |
|
| 27. |
What types of data are stolen by cyber-criminals in most of the cases?(a) Data that willpay once sold(b) Data that has no value(c) Data like username and passwords only(d) Data that is oldI have been asked this question by my school teacher while I was bunking the class.The above asked question is from How Security Breach Takes Place topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Right OPTION is (a) Data that willpay once sold |
|
| 28. |
Which of these is not a step followed by cyber-criminals in data breaching?(a) Research and info-gathering(b) Attack the system(c) Fixing the bugs(d) ExfiltrationI had been asked this question in semester exam.My query is from How Security Breach Takes Place topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct OPTION is (c) FIXING the bugs |
|
| 29. |
___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.(a) Data-hack(b) Data-stealing(c) Database altering(d) Data breachI got this question in examination.The question is from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Correct answer is (d) Data breach |
|
| 30. |
__________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong.(a) Social ethics(b) Ethics in cyber-security(c) Corporate ethics(d) Ethics in black hat hackingThis question was posed to me in an interview for internship.The above asked question is from Ethics of Ethical Hacking in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Right answer is (d) Ethics in black HAT hacking |
|
| 31. |
A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures.(a) privacy and security(b) rules and regulations(c) hacking techniques(d) ethics to talk to seniorsI got this question in a national level competition.I'm obligated to ask this question of Ethics of Ethical Hacking in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct option is (a) privacy and security |
|
| 32. |
________ helps to classify arguments and situations, better understand a cyber-crime and helps to determine appropriate actions.(a) Cyber-ethics(b) Social ethics(c) Cyber-bullying(d) Corporate behaviourI had been asked this question by my school principal while I was bunking the class.Asked question is from Ethics of Ethical Hacking topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct choice is (a) Cyber-ethics |
|
| 33. |
After performing ____________ the ethical hacker should never disclose client information to other parties.(a) hacking(b) cracking(c) penetration testing(d) exploitingI have been asked this question in a national level competition.My question comes from Ethics of Ethical Hacking in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Right option is (c) penetration testing |
|
| 34. |
An ethical hacker must ensure that proprietary information of the firm does not get leaked.(a) True(b) FalseThe question was asked in a national level competition.The doubt is from Ethics of Ethical Hacking topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Correct choice is (a) True |
|
| 35. |
Before performing any penetration test, through legal procedure, which key points listed below is not mandatory?(a) Know the nature of the organization(b) Characteristics of work done in the firm(c) System and network(d) Type of broadband company used by the firmI have been asked this question in an online quiz.My doubt stems from Ethics of Ethical Hacking in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Right answer is (d) Type of broadband company used by the firm |
|
| 36. |
The legal risks of ethical hacking include lawsuits due to __________ of personal data.(a) stealing(b) disclosure(c) deleting(d) hackingThe question was asked in class test.My question is based upon Ethics of Ethical Hacking in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» RIGHT choice is (b) disclosure Explanation: The legal RISKS of ethical HACKING contains lawsuits due to disclosure of PERSONAL data during the penetration testing phase. Such disclosure of confidential data may LEAD to a legal fight between the ethical hacker and the organization. |
|
| 37. |
_____________ is the technique used in business organizations and firms to protect IT assets.(a) Ethical hacking(b) Unethical hacking(c) Fixing bugs(d) Internal data-breachThis question was addressed to me in an interview for internship.The doubt is from Ethics of Ethical Hacking topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Correct option is (a) Ethical hacking |
|
| 38. |
___________ has now evolved to be one of the most popular automated tools for unethical hacking.(a) Automated apps(b) Database software(c) Malware(d) WormsThe question was asked during an online interview.The origin of the question is Ethics of Ethical Hacking topic in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct ANSWER is (c) Malware |
|
| 39. |
Leaking your company data to the outside network without prior permission of senior authority is a crime.(a) True(b) FalseThis question was posed to me during an online interview.My question comes from Ethics of Ethical Hacking in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The CORRECT answer is (a) True |
|
| 40. |
What is the ethics behind training how to hack a system?(a) To think like hackers and know how to defend such attacks(b) To hack a system without the permission(c) To hack a network that is vulnerable(d) To corrupt software or service using malwareI got this question in quiz.The above asked question is from Ethics of Ethical Hacking topic in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» The correct answer is (a) To think LIKE hackers and know how to defend such attacks |
|
| 41. |
Performing a shoulder surfing in order to check other’s password is ____________ ethical practice.(a) a good(b) not so good(c) very good social engineering practice(d) a badI had been asked this question during an interview for a job.The query is from Ethics of Ethical Hacking topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security |
|
Answer» Right choice is (d) a bad |
|