Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it.(a) True(b) FalseThe question was posed to me by my college director while I was bunking the class.This key question is from Corporate Cyber Security topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer» CORRECT choice is (b) False

Easy explanation: If you’re working in your company’s system/laptop and suddenly a pop-up WINDOW arise asking you to update your security application, you must VERIFY it once with the senior member, or tech-department if you feel it is for the first TIME, otherwise you must not skip updating your system security APPLICATIONS.
2.

One must isolate payment systems and payment processes from those computers that you think are used by ____________ or may contain ____________(a) strangers, keyloggers(b) strangers, antivirus(c) unknown, firewalls(d) unknown, antivirusThis question was posed to me in an online quiz.Question is from Corporate Cyber Security topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Right option is (a) STRANGERS, keyloggers

The best explanation: One MUST isolate payment systems and payment processes from those computers that you THINK are used by strangers or may contain keyloggers. Otherwise, your card DETAILS and PIN may get COMPROMISED.

3.

It is important to limit ____________ to all data and information as well as limit the authority for installing software.(a) work-load(b) employee access(c) admin permission(d) installing unwanted appsThis question was addressed to me by my college professor while I was bunking the class.Asked question is from Corporate Cyber Security topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct choice is (b) EMPLOYEE access

Easy explanation: It is important to limit employee access to all data and information as well as limit the AUTHORITY for installing software. Otherwise, any employee with ILLICIT intention may install programs that are EITHER pirated version or may cause damage to the internal corporate network.

4.

Which of the following do not comes under security measures for cloud in firms?(a) Firewall(b) Antivirus(c) Load Balancer(d) EncryptionI had been asked this question in semester exam.Question is taken from Corporate Cyber Security in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct CHOICE is (B) Antivirus

For explanation I would say: For keeping cloud service secure and fully WORKING, firewalls, encryption mechanisms and load-balancers are used but antivirus is not used it could for any security purpose.

5.

___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area.(a) algorithm-licensing(b) code-licensing(c) item licensing(d) product licensingThe question was posed to me in homework.My question is taken from Corporate Cyber Security topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Correct answer is (d) product licensing

To EXPLAIN I would SAY: Product licensing is the technique to obtain permission from a firm or organization for using, manufacturing & selling one or more products within a definite market area. This is done by the COMPANY for security reasons and USUALLY takes a royal fee/amount from its USERS.

6.

________________ important and precious file is a solution to prevent your files from ransomware.(a) Deleting all(b) Keeping backup of(c) Not saving(d) Keeping in pen driveI had been asked this question in an international level competition.This question is from Corporate Cyber Security topic in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Right option is (b) Keeping backup of

The EXPLANATION: Keeping a secured backup of the important and precious file is a SOLUTION to prevent your files from ransomware. The backup should have to be made in some secured CLOUD storage of any other location (server) in an encrypted FORM.

7.

________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization.(a) Spyware(b) Ransomware(c) Adware(d) SharewareThis question was posed to me in semester exam.This question is from Corporate Cyber Security topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct ANSWER is (B) Ransomware

The BEST explanation: Ransomware has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization; where the ransomware compromise the system by encrypting all FILES and ASK for some ransom in order to unlock or decrypt all files.

8.

Use of _______________ can bring external files and worms and virus along with it to the internal systems.(a) smart-watch(b) pen drive(c) laptop(d) iPodThis question was posed to me in an online interview.The origin of the question is Corporate Cyber Security in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct option is (b) PEN drive

The EXPLANATION is: Use of pen drive to bring your work from home tasks to office systems may bring worms and virus along with it (if your home SYSTEM is infected with any malware or infected PROGRAMS) and may cause harm to your office systems.

9.

A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference.(a) MiTM(b) Browser hacking(c) Browser Hijacker(d) Cookie-stealingI got this question in homework.Question is from Corporate Cyber Security in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Right answer is (C) Browser Hijacker

To elaborate: Browser hijacking is a technique that takes over your system’s browser SETTINGS and the attack will REDIRECT the websites you visit some other websites of its PREFERENCE.

10.

Every employee of the firm must need to have some basic knowledge of cyber-security and types of hacking and how they are done.(a) True(b) FalseThis question was posed to me at a job interview.I'm obligated to ask this question of Corporate Cyber Security topic in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer» CORRECT answer is (a) True

To explain: EVERY employee of the firm MUST need to have some BASIC knowledge of cyber-security and types of hacking and how they are done. This will make each employee aware of the various malicious activities and can report to their seniors in this regard.
11.

It is very important to block unknown, strange and ______________ within the corporate network.(a) infected sites(b) programs(c) unwanted files(d) important foldersI had been asked this question in homework.The above asked question is from Corporate Cyber Security in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer» RIGHT choice is (a) infected sites

For explanation I WOULD SAY: It is very important to block unknown, strange and infected sites within the corporate network, by the network administrator so that any EMPLOYEE may not accidentally ACCESS those sites or open infected sites by means of clickjacking or URL-redirection techniques.
12.

Which of the following is not a proper aspect of user integration?(a) Employee’s authentication(b) Physical authorization(c) Access control(d) Representing users in the databaseThis question was posed to me in exam.This is a very interesting question from Corporate Cyber Security in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Right answer is (b) Physical authorization

The BEST I can EXPLAIN: There are 3 main aspects that NEED to keep in mind when putting together new employees or USERS into an application. These are: Representing users in the database, ACCESS control, and Employee’s authentication.

13.

Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen.(a) information(b) papers(c) hardcopy files(d) media filesI have been asked this question in class test.This is a very interesting question from Corporate Cyber Security in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The CORRECT answer is (a) information

Best explanation: Through clickjacking, the employee’s SYSTEM may get COMPROMISED by an infected program, trojans or spyware which got downloaded in the background AUTOMATICALLY as the user fell into the TRICK of an attacker.

14.

The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________(a) Distributed Denial-of-Service (DDoS)(b) Permanent Denial-of-Service (PDoS)(c) Denial-of-Service (DoS)(d) Controlled Denial-of-Service (CDoS)The question was asked by my school principal while I was bunking the class.My enquiry is from How Security Breach Takes Place topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Correct answer is (a) Distributed Denial-of-Service (DDoS)

To elaborate: Here the attacker USES MULTIPLE PCS and floods the bandwidth/resources of the VICTIM’s system, (usually 1 or MANY web-servers). The attack uses zombie PCs and each of the PC’s are remotely controlled by the attacker.

15.

_____________ is a malicious method used by cyber-criminals to trick a user into clicking on something different from what the user wants.(a) Click-hacking(b) Click-fraud(c) Clickjacking(d) Using torrent linksI got this question in examination.I would like to ask this question from Corporate Cyber Security in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Right choice is (c) Clickjacking

Explanation: Clickjacking is a malicious method USED by cyber-criminals to trick a USER into CLICKING on something else which is ILLICIT from what the user wants. The single click usually redirects the employee to a strange site from where infected FILES get downloaded into the system of the employee.

16.

Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other components to make their hands dirty on your confidential information.(a) True(b) FalseThe question was posed to me in examination.This key question is from How Security Breach Takes Place topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct answer is (a) True

The explanation is: Illicit hackers may enter your personal area or room or CABIN to STEAL your laptop, pen DRIVE, documents or other components to MAKE their hands dirty on your confidential information. This type of hacking comes under PHYSICAL hacking.

17.

An attacker may use automatic brute forcing tool to compromise your ____________(a) username(b) employee ID(c) system / PC name(d) passwordI have been asked this question during an interview.This is a very interesting question from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Correct option is (d) password

The explanation is: In most of the CASES, the ATTACKER uses automated brute FORCE tools for compromising your PIN or password. This makes fetching of your password easier by a COMBINATION of different letters as a trial-and-error APPROACH.

18.

Clicking a link which is there in your email which came from an unknown source can redirect you to ____________ that automatically installs malware in your system.(a) that vendor’s site(b) security solution site(c) malicious site(d) software downloading siteThis question was posed to me during an internship interview.My doubt stems from How Security Breach Takes Place in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct option is (c) malicious site

Easiest EXPLANATION: CLICKING a link which is there in your email which came from an UNKNOWN source can REDIRECT you to a malicious site that will automatically install malware in your SYSTEM. The mail will be sent by the attacker.

19.

The antivirus or PC defender software in a system helps in detecting virus and Trojans.(a) True(b) FalseI have been asked this question in an online quiz.I need to ask this question from How Security Breach Takes Place in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The CORRECT OPTION is (a) True

For explanation: The antivirus or PC defender software in a system helps in detecting virus and Trojans PROVIDED the antivirus or the defender application needs to be up-to-date.

20.

______________ are special malware programs written by elite hackers and black hat hackers to spy your mobile phones and systems.(a) Scareware(b) Ransomware(c) Adware(d) SpywareThis question was posed to me during an internship interview.My query is from How Security Breach Takes Place topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Correct answer is (d) Spyware

Explanation: Spywares are special malware programs written by elite HACKERS and black hat hackers to SPIES your mobile phones and systems. This program secretly spy on the target system or user and takes their BROWSING activities, app DETAILS and keeps track of their physical locations.

21.

_____________ will encrypt all your system files and will ask you to pay a ransom in order to decrypt all the files and unlock the system.(a) Scareware(b) Ransomware(c) Adware(d) SpywareThe question was posed to me during an interview for a job.The query is from How Security Breach Takes Place in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Right choice is (B) Ransomware

For explanation I would SAY: Ransomware is special TYPES of malware that will INFECT your system, compromise all data by encrypting them and will pop up asking you for a RANSOM which will be in the form of Bitcoins (so that the attacker do not get tracked) and once the ransom is paid, it will release all files.

22.

You may throw some confidential file in a dustbin which contains some of your personal data. Hackers can take your data from that thrown-away file also, using the technique _________(a) Dumpster diving(b) Shoulder surfing(c) Phishing(d) SpammingThis question was posed to me in unit test.This interesting question is from How Security Breach Takes Place topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer» CORRECT OPTION is (a) Dumpster diving

Easy explanation: Dumpster diving is a social engineering technique used by HACKERS to grab your personal and CONFIDENTIAL data from that thrown-away file also. Using these data attackers may use password guessing or fraud calls (if they find your personal phone number).
23.

ATM Skimmers are used to take your confidential data from your ATM cards.(a) True(b) FalseI got this question by my college director while I was bunking the class.The doubt is from How Security Breach Takes Place in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct option is (a) True

Explanation: ATM card skimmers are set up by ATTACKERS in ATM machines which look EXACTLY same but that secretly inserted machine will TAKE information from the magnetic STRIP of your card and store it in its MEMORY card or storage chip.

24.

An attacker, who is an employee of your firm may ___________ to know your system password.(a) do peeping(b) perform network jamming(c) do shoulder surfing(d) steal your laptopThis question was posed to me during an interview for a job.I want to ask this question from How Security Breach Takes Place in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer» CORRECT OPTION is (c) do shoulder surfing

To elaborate: An attacker, who is an EMPLOYEE of your firm may do shoulder surfing to know your system password. Shoulder surfing is a social engineering technique USED to secretly PEEP to gain knowledge of your confidential information.
25.

___________ will give you an USB which will contain ___________ that will take control of your system in the background.(a) Attackers, Trojans(b) White hat hackers, antivirus(c) White hat hackers, Trojans(d) Attackers, antivirusThe question was posed to me in an interview.I'd like to ask this question from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct ANSWER is (a) Attackers, Trojans

Best explanation: To do a SECURITY breaching in your system, your friend or anyone whom you DEAL with may come up with a USB drive and will give you to take from you some data. But that USB drive may contain Trojan that will get to your computer once triggered. So TRY using updated antivirus in your system.

26.

Which of the companies and organizations do not become the major targets of attackers for data stealing?(a) Business firms(b) Medical and Healthcare(c) Government and secret agencies(d) NGOsThe question was asked in a job interview.The doubt is from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Correct choice is (d) NGOs

The explanation: ATTACKERS target large organizations and firms that consists of business firms, financial corporations, medical and healthcare firms, government and secret agencies, BANKING sectors. They’ve valuable INFORMATION which can cost them HUGE so major targets for hackers focuses such firms only.

27.

What types of data are stolen by cyber-criminals in most of the cases?(a) Data that willpay once sold(b) Data that has no value(c) Data like username and passwords only(d) Data that is oldI have been asked this question by my school teacher while I was bunking the class.The above asked question is from How Security Breach Takes Place topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Right OPTION is (a) Data that willpay once sold

The best explanation: Usually, cyber-criminals steal those data that are CONFIDENTIAL and adds value once they are sold to the dark-market or in different deep WEB sites. Even these DAYS, different companies buy CUSTOMER data at large for analyzing data and gain profit out of it.

28.

Which of these is not a step followed by cyber-criminals in data breaching?(a) Research and info-gathering(b) Attack the system(c) Fixing the bugs(d) ExfiltrationI had been asked this question in semester exam.My query is from How Security Breach Takes Place topic in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct OPTION is (c) FIXING the bugs

Easiest explanation: During a hack, the cyber-criminals first do a RESEARCH on the victim gathers information on the victim’s SYSTEM as well as network. Then perform the ATTACK. Once the attacker gains access it steals away confidential data.

29.

___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.(a) Data-hack(b) Data-stealing(c) Database altering(d) Data breachI got this question in examination.The question is from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Correct answer is (d) Data breach

Easiest explanation: Data breach an ACTIVITY that takes place when cyber-criminals infiltrates any data SOURCE and takes away or alters sensitive information. This is either done using a NETWORK to steal all local files or get access PHYSICALLY to a system.

30.

__________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong.(a) Social ethics(b) Ethics in cyber-security(c) Corporate ethics(d) Ethics in black hat hackingThis question was posed to me in an interview for internship.The above asked question is from Ethics of Ethical Hacking in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Right answer is (d) Ethics in black HAT hacking

The explanation is: Ethics in cyber-security is the BRANCH of cyber security that deals with morality and provides different theories and principles’ REGARDING the view-points about what is right and what NEED not to be done.

31.

A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures.(a) privacy and security(b) rules and regulations(c) hacking techniques(d) ethics to talk to seniorsI got this question in a national level competition.I'm obligated to ask this question of Ethics of Ethical Hacking in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct option is (a) privacy and security

Easy EXPLANATION: A penetration tester MUST KEEP in mind the privacy & security requirements as well as policies of a firm while EVALUATING the security postures of the target, which is called as “industry and business ethics policies”.

32.

________ helps to classify arguments and situations, better understand a cyber-crime and helps to determine appropriate actions.(a) Cyber-ethics(b) Social ethics(c) Cyber-bullying(d) Corporate behaviourI had been asked this question by my school principal while I was bunking the class.Asked question is from Ethics of Ethical Hacking topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct choice is (a) Cyber-ethics

The explanation is: Cyber-ethics and knowledge of proper ethical aspects while doing penetration tests HELPS to CLASSIFY ARGUMENTS and situations, better understand a cyber crime and helps to determine APPROPRIATE actions.

33.

After performing ____________ the ethical hacker should never disclose client information to other parties.(a) hacking(b) cracking(c) penetration testing(d) exploitingI have been asked this question in a national level competition.My question comes from Ethics of Ethical Hacking in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Right option is (c) penetration testing

To explain: It is against the laws and ethics of ethical HACKERS that after doing penetration TESTS, the ethical HACKER should never disclose client information to other parties. The protection of client data is in the hands of the ethical hacker who PERFORMED the tests.

34.

An ethical hacker must ensure that proprietary information of the firm does not get leaked.(a) True(b) FalseThe question was asked in a national level competition.The doubt is from Ethics of Ethical Hacking topic in chapter Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Correct choice is (a) True

To EXPLAIN I would say: Yes, it is very important for an ETHICAL hacker to make sure that while doing penetration TESTS, the confidential DATA and proprietary information are preserved properly and not get leaked to the external network.

35.

Before performing any penetration test, through legal procedure, which key points listed below is not mandatory?(a) Know the nature of the organization(b) Characteristics of work done in the firm(c) System and network(d) Type of broadband company used by the firmI have been asked this question in an online quiz.My doubt stems from Ethics of Ethical Hacking in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Right answer is (d) Type of broadband company used by the firm

For explanation I WOULD say: Before performing any penetration test, through the LEGAL procedure the key POINTS that the penetration tester must keep in mind are –

i) Know the nature of the organization

ii) what type of work the organization do and

iii) the system and networks used in various departments and their confidential data that are sent and received over the network.

36.

The legal risks of ethical hacking include lawsuits due to __________ of personal data.(a) stealing(b) disclosure(c) deleting(d) hackingThe question was asked in class test.My question is based upon Ethics of Ethical Hacking in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer» RIGHT choice is (b) disclosure

Explanation: The legal RISKS of ethical HACKING contains lawsuits due to disclosure of PERSONAL data during the penetration testing phase. Such disclosure of confidential data may LEAD to a legal fight between the ethical hacker and the organization.
37.

_____________ is the technique used in business organizations and firms to protect IT assets.(a) Ethical hacking(b) Unethical hacking(c) Fixing bugs(d) Internal data-breachThis question was addressed to me in an interview for internship.The doubt is from Ethics of Ethical Hacking topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Correct option is (a) Ethical hacking

Easiest EXPLANATION: Ethical hacking is that USED by business organizations and firms for exploiting vulnerabilities to secure the FIRM. Ethical hackers help in increasing the capabilities of any organization or firm in protecting their IT and information ASSETS.

38.

___________ has now evolved to be one of the most popular automated tools for unethical hacking.(a) Automated apps(b) Database software(c) Malware(d) WormsThe question was asked during an online interview.The origin of the question is Ethics of Ethical Hacking topic in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct ANSWER is (c) Malware

To explain: Malware is one of the biggest CULPRITS that harm companies because they are PROGRAMMED to do the MALICIOUS task automatically and help hackers do illicit activities with sophistication.

39.

Leaking your company data to the outside network without prior permission of senior authority is a crime.(a) True(b) FalseThis question was posed to me during an online interview.My question comes from Ethics of Ethical Hacking in portion Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The CORRECT answer is (a) True

The EXPLANATION is: Without PRIOR permission of the SENIOR authority or any senior member, if you’re leaking or taking our your company’s data outside (and which is confidential), then it’s against the code of CORPORATE ethics.

40.

What is the ethics behind training how to hack a system?(a) To think like hackers and know how to defend such attacks(b) To hack a system without the permission(c) To hack a network that is vulnerable(d) To corrupt software or service using malwareI got this question in quiz.The above asked question is from Ethics of Ethical Hacking topic in section Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

The correct answer is (a) To think LIKE hackers and know how to defend such attacks

For explanation I would say: It is important for ethical hackers and SECURITY professional to know how the cyber-criminals think and proceed to target any SYSTEM or network. This is why ethical hackers and PENETRATION testers are trained with proper ethics to SIMULATE such a scenario as how the real cyber-attack takes place.

41.

Performing a shoulder surfing in order to check other’s password is ____________ ethical practice.(a) a good(b) not so good(c) very good social engineering practice(d) a badI had been asked this question during an interview for a job.The query is from Ethics of Ethical Hacking topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security

Answer»

Right choice is (d) a bad

Easiest explanation: Overlooking or peeping into someone’s system when he/she is entering his/her password is a bad practice and is against the ethics of CONDUCT for every individual. SHOULDER SURFING is a SOCIAL engineering attack approach used by some cyber-criminals to know your password and GAIN access to your system later.