This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.(a) True(b) FalseThis question was posed to me during an interview.Question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (a) True |
|
| 152. |
Which of the following is not a sniffing tool?(a) Wireshark(b) Dude Sniffer(c) Maltego(d) [email protected]The question was posed to me in quiz.The doubt is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT OPTION is (c) Maltego To explain: Packet SNIFFERS are UTILITY tools which are used since the release of Ethernet. List of some of these sniffing tools are Wireshark, Dude SNIFFER, [email protected] etc. |
|
| 153. |
Which of the below-mentioned protocol is not susceptible to sniffing?(a) NNTP(b) UDP(c) FTP(d) IMAPI have been asked this question in an interview for job.My question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 154. |
Active sniffing is difficult to detect.(a) True(b) FalseThis question was posed to me in my homework.Question is taken from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct OPTION is (b) False |
|
| 155. |
There are __________ types of sniffing.(a) 2(b) 3(c) 4(d) 5The question was posed to me in an interview.My question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (a) 2 |
|
| 156. |
Which of the below-mentioned protocol is not susceptible to sniffing?(a) HTTP(b) SMTP(c) POP(d) TCPThe question was asked in an interview for internship.The question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (d) TCP |
|
| 157. |
Which of the following tech-concepts cannot be sniffed?(a) Cloud sessions(b) FTP passwords(c) Telnet passwords(d) Chat sessionsI had been asked this question in an interview for internship.The question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 158. |
Which of the following tech-concepts cannot be sniffed?(a) Router configuration(b) ISP details(c) Email Traffic(d) Web TrafficThis question was addressed to me during a job interview.Asked question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct CHOICE is (B) ISP details |
|
| 159. |
Which of them is not an objective of sniffing for hackers?(a) Fetching passwords(b) Email texts(c) Types of files transferred(d) Geographic location of a userI have been asked this question in an online quiz.Origin of the question is Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right OPTION is (d) Geographic location of a user |
|
| 160. |
_____________ are programs or devices that capture the vital information from the target network or particular network.(a) Routers(b) Trappers(c) Wireless-crackers(d) SniffersThe question was posed to me during an interview.The doubt is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right CHOICE is (d) Sniffers |
|
| 161. |
Sniffing is also known as ___________________(a) network-tapping(b) wiretapping(c) net-tapping(d) wireless-tappingI had been asked this question in unit test.This is a very interesting question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct ANSWER is (b) wiretapping |
|
| 162. |
Which of the following is not an example or type of phishing?(a) Tracking(b) Vishing(c) Smishing(d) PharmingThis question was addressed to me in class test.This is a very interesting question from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 163. |
_____________ is data interception method used by hackers.(a) Phishing(b) DoS(c) Sniffing(d) MiTMThe question was asked by my school teacher while I was bunking the class.My question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (c) Sniffing |
|
| 164. |
Which of the following is not an example or type of phishing?(a) Spear phishing(b) Deceptive phishing(c) Whaling(d) Monkey in the MiddleI had been asked this question in an interview for job.This interesting question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (d) Monkey in the Middle |
|
| 165. |
________________ phishing is that type of phishing where the construction of a fake webpage is done for targeting definite keywords & waiting for the searcher to land on the fake webpage.(a) Voice(b) SMS(c) Search engine(d) EmailI had been asked this question in semester exam.Enquiry is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (c) SEARCH engine |
|
| 166. |
____________ or smishing is one of the simplest types of phishing where the target victims may get a fake order detail with a cancellation link.(a) Algo-based phishing(b) SMS phishing(c) Domain Phishing(d) Spear phishingThe question was asked in an internship interview.The above asked question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT option is (b) SMS phishing The explanation is: SMS phishing or Smishing is one of the simplest TYPES of phishing where the TARGET victims may get a fake ORDER detail with a cancellation LINK or any other link that leads you to a malicious link. |
|
| 167. |
_____________ = voice + phishing.(a) Algo-based phishing(b) Vishing(c) Domain Phishing(d) Email-based phishingThe question was asked in a job interview.This is a very interesting question from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right ANSWER is (b) Vishing |
|
| 168. |
Victims of phishing are mostly ___________________(a) Tech enthusiast(b) Professional computer engineers(c) Lack of computer knowledge(d) Lack of management skillI got this question in semester exam.The question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT option is (c) Lack of computer knowledge Explanation: Phishers OFTEN develop illegitimate websites for tricking USERS & filling their personal data. Victims of such type of ATTACKS are those users with lack of computer knowledge. |
|
| 169. |
___________________ is usually targeted by nature where the emails are exclusively designed to target any exact user.(a) Algo-based phishing(b) Vishing(c) Domain Phishing(d) Spear phishingI got this question in a national level competition.My question is based upon Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (d) SPEAR PHISHING |
|
| 170. |
_____________ refers to phishing performed over smart-phone by calling.(a) Algo-based phishing(b) Email-based phishing(c) Domain Phishing(d) VishingI had been asked this question in an international level competition.This question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (d) Vishing |
|
| 171. |
_________________ type of phishing became very popular as if it has been sent from a legitimate source with a legitimate link to its official website.(a) Algo-based phishing(b) Email-based phishing(c) Domain Phishing(d) VishingThe question was posed to me in homework.My enquiry is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right ANSWER is (b) Email-based phishing |
|
| 172. |
Email Phishing came into origin in the year __________(a) 1990(b) 2000(c) 2005(d) 2015I had been asked this question in exam.The doubt is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (b) 2000 |
|
| 173. |
______________ was the first type of phishing where the phishers developed an algorithm for generating random credit card numbers.(a) Algo-based phishing(b) Email-based phishing(c) Domain Phishing(d) VishingI got this question in an interview.Origin of the question is Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (a) Algo-based PHISHING |
|
| 174. |
Which of the following type of data, phishers cannot steal from its target victims?(a) bank details(b) phone number(c) passwords(d) apps installed in the mobileThe question was asked in class test.The origin of the question is Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right CHOICE is (d) apps installed in the mobile |
|
| 175. |
Algorithm-Based Phishing was developed in the year __________(a) 1988(b) 1989(c) 1990(d) 1991I got this question by my college director while I was bunking the class.This interesting question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (c) 1990 |
|
| 176. |
Phishers often develop ______________ websites for tricking users & filling their personal data.(a) legitimate(b) illegitimate(c) genuine(d) officialI got this question in an interview.My question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (b) illegitimate |
|
| 177. |
DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per second (PPS).(a) True(b) FalseThe question was asked in final exam.The question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct ANSWER is (a) True |
|
| 178. |
In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.(a) URL Redirection(b) DoS(c) Phishing(d) MiTM attackThis question was addressed to me by my school principal while I was bunking the class.This is a very interesting question from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT answer is (c) PHISHING For explanation: Phishing is an internet scam done by hackers to provide classified information. In some of them, cyber-criminals REDIRECT the users to different sites VIA emails, IMS, and ads. |
|
| 179. |
______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.(a) Phishing attack(b) DoS attack(c) Website attack(d) MiTM attackI got this question during an interview.My question is based upon Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (a) Phishing attack |
|
| 180. |
A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network infrastructures.(a) True(b) FalseI had been asked this question in an internship interview.The query is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» The CORRECT answer is (a) True |
|
| 181. |
Which of the following do not comes under network layer DoS flooding?(a) DNS amplification(b) UDP flooding(c) DNS query flooding(d) NTP AmplificationI had been asked this question in homework.The origin of the question is Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 182. |
Which of the following do not comes under network layer DoS flooding?(a) UDP flooding(b) HTTP Flooding(c) SYN flooding(d) NTP AmplificationI had been asked this question in an international level competition.My question is based upon Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (b) HTTP Flooding |
|
| 183. |
Which of the following is not a type of application layer DoS?(a) HTTP flooding(b) Slowloris(c) TCP flooding(d) DNS query floodingThe question was asked during a job interview.My question comes from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (C) TCP FLOODING |
|
| 184. |
Network layer attack is also known as ________________(a) Layer3-4 DoS attack(b) Layer5 DoS attack(c) Layer6-7 DoS attack(d) Layer2 DoS attackI have been asked this question at a job interview.I'm obligated to ask this question of Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» The CORRECT answer is (a) Layer3-4 DOS attack |
|
| 185. |
___________ is a type of DoS threats to overload a server as it sends a large number of requests requiring resources for handling & processing.(a) Network Layer DoS(b) Physical Layer DoS(c) Transport Layer DoS(d) Application Layer DoSThe question was asked during an interview.My doubt stems from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (d) APPLICATION LAYER DoS |
|
| 186. |
Application layer DoS attack is also known as _______________(a) Layer4 DoS attack(b) Layer5 DoS attack(c) Layer6 DoS attack(d) Layer7 DoS attackThis question was posed to me during an online interview.This intriguing question comes from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT answer is (d) Layer7 DoS ATTACK The BEST explanation: A DoS attack is a very dangerous threat for users who have their services running via the internet. The APPLICATION Layer DoS is ALSO known as Layer-7 DoS attack. |
|
| 187. |
There are ______ types of DoS attack.(a) 2(b) 3(c) 4(d) 5The question was posed to me during an interview.The query is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (a) 2 |
|
| 188. |
Instead of implementing single computer & its internet bandwidth, a ____________ utilizes various systems & their connections for flooding the targeted website.(a) GoS attack(b) PoS attack(c) DDoS attack(d) DoS attackI got this question in class test.This key question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (c) DDoS attack |
|
| 189. |
DDoS stands for _________________(a) Direct Distribution of Server(b) Distributed Denial of Service(c) Direct Distribution of Service(d) Distributed Denial of ServerI have been asked this question in an international level competition.The doubt is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right OPTION is (B) Distributed Denial of SERVICE |
|
| 190. |
A DoS attack coming from a large number of IP addresses, making it hard to manually filter or crash the traffic from such sources is known as a _____________(a) GoS attack(b) PDoS attack(c) DoS attack(d) DDoS attackI got this question in examination.This interesting question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (d) DDoS attack |
|
| 191. |
DoS is abbreviated as _____________________(a) Denial of Service(b) Distribution of Server(c) Distribution of Service(d) Denial of ServerThe question was posed to me during an internship interview.I want to ask this question from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» The CORRECT choice is (a) Denial of SERVICE |
|
| 192. |
During a DoS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted.(a) network(b) system(c) website(d) routerThe question was posed to me in unit test.This interesting question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (c) website |
|
| 193. |
The intent of a ______________ is to overkill the targeted server’s bandwidth and other resources of the target website.(a) Phishing attack(b) DoS attack(c) Website attack(d) MiTM attackThis question was posed to me in an online quiz.My doubt is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT OPTION is (b) DoS attack To explain I would SAY: Web resource GETS occupied or busy as it floods its users performing DoS attack. The intent of this attack is to overkill the targeted server’s bandwidth and other resources of the target website. |
|
| 194. |
A ______________ tries to formulate a web resource occupied or busy its users by flooding the URL of the victim with unlimited requests than the server can handle.(a) Phishing attack(b) DoS attack(c) Website attack(d) MiTM attackI got this question in an internship interview.Question is taken from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT answer is (B) DOS attack Easy explanation: A DoS attack tries to formulate a web resource occupied or busy to its users by FLOODING the URL of the VICTIM with unlimited requests than the server can handle. |
|
| 195. |
The ____________ transferred between your device & the server is securely encrypted if you are using VPNs.(a) data(b) virus(c) music files(d) document filesThis question was addressed to me in homework.This question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct CHOICE is (a) data |
|
| 196. |
The data transferred between your device & the server is securely _____________ if you’re using VPNs.(a) locked(b) sealed(c) packed(d) encryptedThe question was asked in a national level competition.Question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (d) encrypted |
|
| 197. |
____________ allow its users to attach to the internet via a remote or virtual server which preserves privacy.(a) Cookie removers(b) VPNs(c) Tor browser(d) Private Search EnginesI have been asked this question in an interview for job.My doubt is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (B) VPNs |
|
| 198. |
Which of the following is not an example of privacy-browser?(a) Tor(b) Brave(c) Epic(d) OperaThis question was posed to me during an interview.Question is taken from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (d) Opera |
|
| 199. |
The __________________ protects your privacy by bouncing your connection and links around a distributed network over the globe run by volunteers. It gives three layers of anonymity.(a) Cookie removers(b) Private Search Engines(c) Tor browser(d) VPNsI had been asked this question in a national level competition.I'd like to ask this question from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (c) Tor browser |
|
| 200. |
The Tor browser protects your privacy by bouncing your connection and links around a distributed network over the globe run by volunteers. It gives three layers of anonymity.(a) True(b) FalseThis question was addressed to me in an interview for internship.I'd like to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT CHOICE is (a) True The best explanation: The Tor browser protects your privacy by bouncing your connection and LINKS around a distributed network over the globe run by volunteers. It gives three layers of anonymity. |
|