Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

151.

A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.(a) True(b) FalseThis question was posed to me during an interview.Question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (a) True

For EXPLANATION I would say: A sniffer on the WHOLE turns your system’s NIC to the licentious mode so that it can listen to all your DATA TRANSMITTED on its division. This is how it works to sniff all data packets.

152.

Which of the following is not a sniffing tool?(a) Wireshark(b) Dude Sniffer(c) Maltego(d) [email protected]The question was posed to me in quiz.The doubt is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer» CORRECT OPTION is (c) Maltego

To explain: Packet SNIFFERS are UTILITY tools which are used since the release of Ethernet. List of some of these sniffing tools are Wireshark, Dude SNIFFER, [email protected] etc.
153.

Which of the below-mentioned protocol is not susceptible to sniffing?(a) NNTP(b) UDP(c) FTP(d) IMAPI have been asked this question in an interview for job.My question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»
154.

Active sniffing is difficult to detect.(a) True(b) FalseThis question was posed to me in my homework.Question is taken from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Correct OPTION is (b) False

The best I can explain: Sniffing is like “tapping PHONE calls” and try to know about any conversation. There are two TYPES of sniffing. These are passive sniffing and ACTIVE sniffing. Passive sniffing is difficult to detect.

155.

There are __________ types of sniffing.(a) 2(b) 3(c) 4(d) 5The question was posed to me in an interview.My question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (a) 2

For explanation I would say: Sniffing is data surveillance technique used by hackers and is used to KEEP an eye on as WELL as detain all data packets with the help of sniffing TOOLS. There are two TYPES of sniffing attacks. These are passive sniffing and active sniffing.

156.

Which of the below-mentioned protocol is not susceptible to sniffing?(a) HTTP(b) SMTP(c) POP(d) TCPThe question was asked in an interview for internship.The question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (d) TCP

To explain: The technique used to supervise & confine all data packets through any target NETWORK is CALLED sniffing. HTTP, SMTP, POP are some PROTOCOLS that are susceptible to sniffing.

157.

Which of the following tech-concepts cannot be sniffed?(a) Cloud sessions(b) FTP passwords(c) Telnet passwords(d) Chat sessionsI had been asked this question in an interview for internship.The question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»
158.

Which of the following tech-concepts cannot be sniffed?(a) Router configuration(b) ISP details(c) Email Traffic(d) Web TrafficThis question was addressed to me during a job interview.Asked question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct CHOICE is (B) ISP details

The best EXPLANATION: Sniffing is data interception method and is not used for sniffing ISP details. It is PARTICULARLY used for capturing router configuration, email traffic & web traffic.

159.

Which of them is not an objective of sniffing for hackers?(a) Fetching passwords(b) Email texts(c) Types of files transferred(d) Geographic location of a userI have been asked this question in an online quiz.Origin of the question is Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Right OPTION is (d) Geographic location of a user

Easiest explanation: The method USED to capture data PACKETS through any target NETWORK is called sniffing. The various objectives of sniffing for hackers are fetching passwords, email texts and the TYPE of files transferred.

160.

_____________ are programs or devices that capture the vital information from the target network or particular network.(a) Routers(b) Trappers(c) Wireless-crackers(d) SniffersThe question was posed to me during an interview.The doubt is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right CHOICE is (d) Sniffers

To elaborate: Sniffing is data interception method USED by cyber-criminals. Sniffers are programs or DEVICES that CAPTURE vital INFORMATION from the target network or particular network.

161.

Sniffing is also known as ___________________(a) network-tapping(b) wiretapping(c) net-tapping(d) wireless-tappingI had been asked this question in unit test.This is a very interesting question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct ANSWER is (b) wiretapping

Easiest explanation: SNIFFING which is also known as wiretapping is data interception method used by hackers. It is a technique used for monitoring & CAPTURING all data PACKETS PASSING through any target network.

162.

Which of the following is not an example or type of phishing?(a) Tracking(b) Vishing(c) Smishing(d) PharmingThis question was addressed to me in class test.This is a very interesting question from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»
163.

_____________ is data interception method used by hackers.(a) Phishing(b) DoS(c) Sniffing(d) MiTMThe question was asked by my school teacher while I was bunking the class.My question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (c) Sniffing

The best I can explain: Sniffing is data interception method USED by hackers. Sniffing is the method used to MONITOR & capture all data packets PASSING through any target NETWORK using sniffing tools.

164.

Which of the following is not an example or type of phishing?(a) Spear phishing(b) Deceptive phishing(c) Whaling(d) Monkey in the MiddleI had been asked this question in an interview for job.This interesting question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Correct choice is (d) Monkey in the Middle

The explanation is: Phishing is an internet scam done by cyber-criminals where the user is convinced digitally to provide CONFIDENTIAL INFORMATION. There are different types of phishing. Some of them are Spear phishing, deceptive phishing, whaling, PHARMING, vishing.

165.

________________ phishing is that type of phishing where the construction of a fake webpage is done for targeting definite keywords & waiting for the searcher to land on the fake webpage.(a) Voice(b) SMS(c) Search engine(d) EmailI had been asked this question in semester exam.Enquiry is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (c) SEARCH engine

The best explanation: Search engine PHISHING is that TYPE of phishing where the construction of a fake WEBPAGE is done for targeting definite keywords & waiting for the searcher to land on the fake webpage.

166.

____________ or smishing is one of the simplest types of phishing where the target victims may get a fake order detail with a cancellation link.(a) Algo-based phishing(b) SMS phishing(c) Domain Phishing(d) Spear phishingThe question was asked in an internship interview.The above asked question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer» CORRECT option is (b) SMS phishing

The explanation is: SMS phishing or Smishing is one of the simplest TYPES of phishing where the TARGET victims may get a fake ORDER detail with a cancellation LINK or any other link that leads you to a malicious link.
167.

_____________ = voice + phishing.(a) Algo-based phishing(b) Vishing(c) Domain Phishing(d) Email-based phishingThe question was asked in a job interview.This is a very interesting question from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Right ANSWER is (b) Vishing

To EXPLAIN I WOULD say: Phishing occurs when a cyber-criminal masquerade as a trusted entity. Vishing refers to phishing performed where the phishing is DONE through voice hence called vishing = voice + phishing.

168.

Victims of phishing are mostly ___________________(a) Tech enthusiast(b) Professional computer engineers(c) Lack of computer knowledge(d) Lack of management skillI got this question in semester exam.The question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer» CORRECT option is (c) Lack of computer knowledge

Explanation: Phishers OFTEN develop illegitimate websites for tricking USERS & filling their personal data. Victims of such type of ATTACKS are those users with lack of computer knowledge.
169.

___________________ is usually targeted by nature where the emails are exclusively designed to target any exact user.(a) Algo-based phishing(b) Vishing(c) Domain Phishing(d) Spear phishingI got this question in a national level competition.My question is based upon Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (d) SPEAR PHISHING

To explain: In spear phishing, hackers USUALLY targeted specifically where the emails are exclusively designed to TARGET any particular user. It occurs when an attacker MASQUERADES the victim a trusted party.

170.

_____________ refers to phishing performed over smart-phone by calling.(a) Algo-based phishing(b) Email-based phishing(c) Domain Phishing(d) VishingI had been asked this question in an international level competition.This question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (d) Vishing

For explanation I WOULD say: Phishers often develop illegitimate websites for tricking users & FILLING their PERSONAL DATA. Vishing refers to phishing performed over smart-phone by calling. As the phishing is done through voice so it is called vishing = voice + phishing.

171.

_________________ type of phishing became very popular as if it has been sent from a legitimate source with a legitimate link to its official website.(a) Algo-based phishing(b) Email-based phishing(c) Domain Phishing(d) VishingThe question was posed to me in homework.My enquiry is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right ANSWER is (b) Email-based phishing

Easy EXPLANATION: In email phishing, the email is fashioned as if it has been sent from a legitimate source with a legitimate LINK to its official website. It CAME into origin in the year 2000.

172.

Email Phishing came into origin in the year __________(a) 1990(b) 2000(c) 2005(d) 2015I had been asked this question in exam.The doubt is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (b) 2000

To explain I WOULD say: Email Phishing came into origin in the YEAR 2000 which is more tech-savvy. Here the email is created as if it has been sent from a LEGITIMATE SOURCE with a legitimate LINK to its official website.

173.

______________ was the first type of phishing where the phishers developed an algorithm for generating random credit card numbers.(a) Algo-based phishing(b) Email-based phishing(c) Domain Phishing(d) VishingI got this question in an interview.Origin of the question is Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (a) Algo-based PHISHING

To explain: Phishing is a CATEGORY of social engineering attack. In ALGORITHM-Based Phishing, an algorithm for GENERATING random credit CARD numbers for getting an original card’s match.

174.

Which of the following type of data, phishers cannot steal from its target victims?(a) bank details(b) phone number(c) passwords(d) apps installed in the mobileThe question was asked in class test.The origin of the question is Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Right CHOICE is (d) apps installed in the mobile

Easy explanation: Phishers often develop illegitimate websites for TRICKING users & FILLING their personal data such as bank account DETAILS, phone number, address, username, and passwords etc.

175.

Algorithm-Based Phishing was developed in the year __________(a) 1988(b) 1989(c) 1990(d) 1991I got this question by my college director while I was bunking the class.This interesting question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Right option is (c) 1990

Best EXPLANATION: ALGORITHM-Based Phishing was DEVELOPED in the year 1990 where the first team of phishers developed an algorithm for generating random credit card numbers for GETTING an original card’s match.

176.

Phishers often develop ______________ websites for tricking users & filling their personal data.(a) legitimate(b) illegitimate(c) genuine(d) officialI got this question in an interview.My question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (b) illegitimate

To EXPLAIN I would SAY: Phishing is a category of social engineering ATTACK that is used to steal user data. Phishers OFTEN DEVELOP illegitimate websites for tricking users & filling their personal data.

177.

DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per second (PPS).(a) True(b) FalseThe question was asked in final exam.The question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

Correct ANSWER is (a) True

Explanation: At the time of DoS ATTACK, it becomes hard to manually filter or crash the traffic from such sources. DDoS are high traffic events that are measured in Gigabits PER second (Gbps) or packets per second (PPS).

178.

In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.(a) URL Redirection(b) DoS(c) Phishing(d) MiTM attackThis question was addressed to me by my school principal while I was bunking the class.This is a very interesting question from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer» RIGHT answer is (c) PHISHING

For explanation: Phishing is an internet scam done by hackers to provide classified information. In some of them, cyber-criminals REDIRECT the users to different sites VIA emails, IMS, and ads.
179.

______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.(a) Phishing attack(b) DoS attack(c) Website attack(d) MiTM attackI got this question during an interview.My question is based upon Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (a) Phishing attack

Best explanation: Phishing is an internet SCAM done by cyber-criminals where the user is convinced digitally to provide confidential INFORMATION. There are different types of phishing. Some of them redirect the user to different sites VIA EMAILS & SPYWARE.

180.

A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network infrastructures.(a) True(b) FalseI had been asked this question in an internship interview.The query is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

The CORRECT answer is (a) True

For explanation I would say: A DoS ATTACK is very dangerous for any targeted VICTIM because it can seize business and bring LOSS to a company running on the website. A DDoS with 20 to 40 Gbps is enough for totally shutting down the MAJORITY network infrastructures.

181.

Which of the following do not comes under network layer DoS flooding?(a) DNS amplification(b) UDP flooding(c) DNS query flooding(d) NTP AmplificationI had been asked this question in homework.The origin of the question is Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»
182.

Which of the following do not comes under network layer DoS flooding?(a) UDP flooding(b) HTTP Flooding(c) SYN flooding(d) NTP AmplificationI had been asked this question in an international level competition.My question is based upon Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (b) HTTP Flooding

The BEST explanation: Network LAYER DoS attack is set up to congest the “pipelines” that are connecting user’s network. This INCLUDES attacks such as NTP amplification, SYN flooding, UDP flooding and DNS amplification.

183.

Which of the following is not a type of application layer DoS?(a) HTTP flooding(b) Slowloris(c) TCP flooding(d) DNS query floodingThe question was asked during a job interview.My question comes from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Correct choice is (C) TCP FLOODING

Easiest explanation: In application Layer DoS, its threats to overload a server as it sends a large QUANTITY of requests REQUIRING resources for handling & processing. This category includes HTTP flooding, slow-flooding attack and DNS query flooding.

184.

Network layer attack is also known as ________________(a) Layer3-4 DoS attack(b) Layer5 DoS attack(c) Layer6-7 DoS attack(d) Layer2 DoS attackI have been asked this question at a job interview.I'm obligated to ask this question of Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

The CORRECT answer is (a) Layer3-4 DOS attack

Best explanation: Denial of Service attack becomes dangerous because it floods the target service over the INTERNET. There are two types of DoS attack. The Network Layer DoS is also known as the Layer 3-4 DoS attack.

185.

___________ is a type of DoS threats to overload a server as it sends a large number of requests requiring resources for handling & processing.(a) Network Layer DoS(b) Physical Layer DoS(c) Transport Layer DoS(d) Application Layer DoSThe question was asked during an interview.My doubt stems from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (d) APPLICATION LAYER DoS

The best I can explain: DoS attacks are of two TYPES. These are Application Layer Attacks and Network Layer DoS attacks. Application Layer DoS is a type of DoS threats to overload a server as it sends a large number of REQUESTS requiring resources for handling & processing.

186.

Application layer DoS attack is also known as _______________(a) Layer4 DoS attack(b) Layer5 DoS attack(c) Layer6 DoS attack(d) Layer7 DoS attackThis question was posed to me during an online interview.This intriguing question comes from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer» RIGHT answer is (d) Layer7 DoS ATTACK

The BEST explanation: A DoS attack is a very dangerous threat for users who have their services running via the internet. The APPLICATION Layer DoS is ALSO known as Layer-7 DoS attack.
187.

There are ______ types of DoS attack.(a) 2(b) 3(c) 4(d) 5The question was posed to me during an interview.The query is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (a) 2

To elaborate: With the help of DOS attack attackers try to busy its USERS by flooding the URL of the victim with limitless requests. There are TWO types of DoS attack. These are Application Layer Attacks and Network Layer DoS attacks.

188.

Instead of implementing single computer & its internet bandwidth, a ____________ utilizes various systems & their connections for flooding the targeted website.(a) GoS attack(b) PoS attack(c) DDoS attack(d) DoS attackI got this question in class test.This key question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (c) DDoS attack

For explanation I would SAY: DDoS is another leading attack type. Instead of implementing single computer & its INTERNET bandwidth, a DDoS utilizes various systems & their connections for flooding the targeted WEBSITE.

189.

DDoS stands for _________________(a) Direct Distribution of Server(b) Distributed Denial of Service(c) Direct Distribution of Service(d) Distributed Denial of ServerI have been asked this question in an international level competition.The doubt is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Right OPTION is (B) Distributed Denial of SERVICE

For explanation I would say: When a DoS attack comes from a large number of IP addresses, this makes it HARD to manually filter or crash the traffic from such sources and the attack is known as a Distributed Denial of Service (DDOS) attack.

190.

A DoS attack coming from a large number of IP addresses, making it hard to manually filter or crash the traffic from such sources is known as a _____________(a) GoS attack(b) PDoS attack(c) DoS attack(d) DDoS attackI got this question in examination.This interesting question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (d) DDoS attack

The best I can explain: A DoS attack coming from a LARGE number of IP addresses, making it hard to MANUALLY filter or crash the TRAFFIC from such sources is known as a DISTRIBUTED Denial of SERVICE (DDoS) attack.

191.

DoS is abbreviated as _____________________(a) Denial of Service(b) Distribution of Server(c) Distribution of Service(d) Denial of ServerThe question was posed to me during an internship interview.I want to ask this question from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

The CORRECT choice is (a) Denial of SERVICE

Explanation: A Denial of Service attack targets its victim by flooding the URL of the victim with unlimited requests. The INTENT of this attack is to overkill the targeted SERVER’s bandwidth and other RESOURCES of the target website.

192.

During a DoS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted.(a) network(b) system(c) website(d) routerThe question was posed to me in unit test.This interesting question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (c) website

To elaborate: Using of DoS attack put TOGETHER web RESOURCE by flooding its USERS with unlimited requests. During a DoS attack, the regular TRAFFIC on the target website will be either dawdling down or entirely interrupted.

193.

The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources of the target website.(a) Phishing attack(b) DoS attack(c) Website attack(d) MiTM attackThis question was posed to me in an online quiz.My doubt is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer» CORRECT OPTION is (b) DoS attack

To explain I would SAY: Web resource GETS occupied or busy as it floods its users performing DoS attack. The intent of this attack is to overkill the targeted server’s bandwidth and other resources of the target website.
194.

A ______________ tries to formulate a web resource occupied or busy its users by flooding the URL of the victim with unlimited requests than the server can handle.(a) Phishing attack(b) DoS attack(c) Website attack(d) MiTM attackI got this question in an internship interview.Question is taken from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer» CORRECT answer is (B) DOS attack

Easy explanation: A DoS attack tries to formulate a web resource occupied or busy to its users by FLOODING the URL of the VICTIM with unlimited requests than the server can handle.
195.

The ____________ transferred between your device & the server is securely encrypted if you are using VPNs.(a) data(b) virus(c) music files(d) document filesThis question was addressed to me in homework.This question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Correct CHOICE is (a) data

The BEST I can explain: VPNs allow its USERS to attach to the internet VIA a remote or virtual server which preserves privacy. The data transferred between your device & the server is securely encrypted if you are using VPNs.

196.

The data transferred between your device & the server is securely _____________ if you’re using VPNs.(a) locked(b) sealed(c) packed(d) encryptedThe question was asked in a national level competition.Question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (d) encrypted

The explanation is: VPNs ALLOW its USERS to attach to the internet VIA a remote or virtual server which preserves PRIVACY. If you are using VPN, the data between your DEVICE & the server gets securely transmitted.

197.

____________ allow its users to attach to the internet via a remote or virtual server which preserves privacy.(a) Cookie removers(b) VPNs(c) Tor browser(d) Private Search EnginesI have been asked this question in an interview for job.My doubt is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (B) VPNs

The explanation is: There is a suitable solution for PRESERVING privacy is by USING privacy-focussed SEARCH engines, and by using VPNs. VPNs allow its users to ATTACH to the internet via a remote or virtual server which preserves privacy.

198.

Which of the following is not an example of privacy-browser?(a) Tor(b) Brave(c) Epic(d) OperaThis question was posed to me during an interview.Question is taken from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (d) Opera

For explanation: Digital Privacy gets ELIMINATED if you are USING usual browsers that do not have ENCRYPTED security measures to preserve your piracy. One appropriate solution for PRESERVING privacy is by using browsers like Tor, Brave and Epic.

199.

The __________________ protects your privacy by bouncing your connection and links around a distributed network over the globe run by volunteers. It gives three layers of anonymity.(a) Cookie removers(b) Private Search Engines(c) Tor browser(d) VPNsI had been asked this question in a national level competition.I'd like to ask this question from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (c) Tor browser

The explanation is: Privacy of DATA and communication is a major concern nowadays. The Tor browser protects your privacy by BOUNCING your connection and LINKS around a distributed NETWORK over the GLOBE run by volunteers.

200.

The Tor browser protects your privacy by bouncing your connection and links around a distributed network over the globe run by volunteers. It gives three layers of anonymity.(a) True(b) FalseThis question was addressed to me in an interview for internship.I'd like to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer» RIGHT CHOICE is (a) True

The best explanation: The Tor browser protects your privacy by bouncing your connection and LINKS around a distributed network over the globe run by volunteers. It gives three layers of anonymity.