This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 201. |
It is necessary to use ________________ for maintaining searched data privacy.(a) Private email services(b) Private search engines(c) Tor Browser(d) Private Browser windowThe question was posed to me in an interview for internship.This question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT option is (b) PRIVATE SEARCH engines To explain: It is necessary to use private search engines for maintaining searched DATA PRIVACY. They do not keep track of your searched terms or your browsing behaviour and habits. Examples are like Search Encrypt, DuckDuckGo, StartPage and Wolfram Alpha. |
|
| 202. |
Which of the following browser is used for Privacy purpose?(a) Chrome(b) Firefox(c) Opera(d) TorThis question was addressed to me in an international level competition.My query is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct ANSWER is (d) TOR |
|
| 203. |
Which of the following is a private Search-engine and do not track our searching data?(a) Google(b) Search Encrypt(c) Bing(d) YahooThe question was asked in class test.The above asked question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (b) Search Encrypt |
|
| 204. |
Which of the following is not a private Search-engine?(a) Yahoo(b) DuckDuckGo(c) StartPage(d) Wolfram AlphaI have been asked this question in semester exam.This interesting question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» The CORRECT option is (a) Yahoo |
|
| 205. |
Which of the following is not an appropriate solution for preserving privacy?(a) Use privacy-focussed SE(b) Close all logical ports(c) Do not use malicious sites and torrent sites(d) Use VPNI have been asked this question during an interview.My question comes from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT option is (b) Close all LOGICAL ports Easiest EXPLANATION: Closing of all logical ports is done to secure system from Trojans. Some appropriate WAY out for preserving privacy is by using VPNs, using private browser window & by disabling cookies also. |
|
| 206. |
Which of the following do not comes under the three pillars of digital privacy?(a) Information privacy(b) Individual privacy(c) Communication privacy(d) Family privacyThe question was asked in an online interview.The query is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct OPTION is (d) Family privacy |
|
| 207. |
Which of the following is not an appropriate solution for preserving privacy?(a) Use privacy-focussed SE(b) Use private Browser-window(c) Disable cookies(d) Uninstall AntivirusThe question was asked in my homework.My question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
| Answer» | |
| 208. |
_______________ is a combined term which encompasses 3 sub-pillars; information privacy, individual privacy, and communication privacy.(a) Digital Integrity(b) Digital privacy(c) Digital secrecy(d) Digital protectionThe question was asked in my homework.My question is based upon Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (B) DIGITAL privacy |
|
| 209. |
_______________deals with the protection of an individual’s information which is implemented while using the Internet on any computer or personal device.(a) Digital agony(b) Digital privacy(c) Digital secrecy(d) Digital protectionThis question was posed to me by my school teacher while I was bunking the class.This is a very interesting question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (B) DIGITAL privacy |
|
| 210. |
Which of the following is an example of a Botnet program?(a) Slammer(b) GameOver(c) Stuxnet(d) Anna KournikovaThe question was posed to me in a job interview.My question is taken from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right OPTION is (b) GameOver |
|
| 211. |
Which of the following is not an example of a botnet program?(a) Zeus(b) GameOver(c) ZeroAccess(d) MyDoomThe question was asked in unit test.I'd like to ask this question from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (d) MyDoom |
|
| 212. |
Which of the following is an example of Botnet?(a) Zeus(b) ILOVEYOU(c) Storm Worm(d) MyDoomI got this question during an online interview.Asked question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (a) ZEUS |
|
| 213. |
Nowadays, most botnets rely on existing _______________ networks for communication.(a) server-to-server(b) peer-to-peer(c) client-to-server(d) host-to-serverI had been asked this question during an online exam.I would like to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (b) peer-to-peer |
|
| 214. |
The bot program allows the bot-herders to perform all operations from a ___________ location.(a) local(b) open(c) corporate(d) remoteThe question was asked in an online quiz.Enquiry is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (d) remote |
|
| 215. |
Infected computers and other systems within the botnet are called __________(a) killers(b) vampires(c) zombies(d) gargoylesI have been asked this question in an interview for job.My doubt is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (c) ZOMBIES |
|
| 216. |
Botnets are not the logical connection of which of the following?(a) Smart-phones(b) IoT devices(c) Computer systems(d) ModemsI had been asked this question in exam.This intriguing question originated from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (d) Modems |
|
| 217. |
The word “botnet” is a blend of the words _____________ & ___________(a) robot, network(b) rocket, network(c) bot, network(d) bot, internetI have been asked this question in an online interview.The origin of the question is Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (a) robot, network |
|
| 218. |
The full form of C&C is ____________(a) command and control(b) copy and cut(c) command and capture(d) copy and controlThe question was posed to me by my college director while I was bunking the class.I want to ask this question from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (a) command and control |
|
| 219. |
The owner of botnets can control the botnet using ___________________ software.(a) trojans(b) command and control(c) servers(d) infected serversI have been asked this question during an interview.The origin of the question is Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT option is (b) COMMAND and control To explain I would say: A BOTNET owner can govern and manage the botnet through command & programs. Botnets are implemented to CARRY out distributed DDoS attacks, steal data, send spam messages & permits the hacker to ACCESS various devices & its connection. |
|
| 220. |
Botnets are not used for ______________(a) Perform DDoS(b) Steal bulk amount of sensitive data(c) Spamming(d) Encrypting for ransomThis question was addressed to me in an online quiz.The query is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT choice is (d) Encrypting for ransom The explanation: BOTNETS usually are not used for encrypting files for ransom. Botnets are implemented to carry out distributed DDoS attacks, STEAL data, send SPAM messages & permits the hacker to ACCESS various devices & its connection. |
|
| 221. |
A _____________ is a number of Internet-connected systems, where each of them is running one or more bots.(a) Trojan(b) Virus(c) Worms(d) BotnetThe question was asked by my school teacher while I was bunking the class.Query is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Right ANSWER is (d) Botnet |
|
| 222. |
_____________ are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection.(a) Trojan(b) Virus(c) Botnet(d) WormsThis question was posed to me in an online interview.I need to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right CHOICE is (c) Botnet |
|
| 223. |
Botnets are managed by ______________(a) Bot-holders(b) Bot-herders(c) Bot-trainers(d) Bot-creatorsI have been asked this question in class test.My question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct CHOICE is (b) Bot-herders |
|
| 224. |
A ___________ consists of at least one bot server or controller and one or more client-bots.(a) Virus(b) Trojan(c) Botnet(d) AdwareI got this question in a national level competition.I need to ask this question from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (C) BOTNET |
|
| 225. |
__________ is a powerful RAT build using the language Delphi 7.(a) Stuxnet(b) T-Bomb(c) Beast(d) ZeusThe question was asked in quiz.The query is from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (c) Beast |
|
| 226. |
Which of the following is a remote Trojan?(a) Troya(b) DaCryptic(c) BankerA(d) Game-TrojI got this question by my college director while I was bunking the class.This question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT choice is (a) Troya To explain I would say: Trojan is a small malicious program that RUNS HIDDEN on the INFECTED system. They are created with the intent and they infected the system by misleading the user. Troya is a remote Trojan that works remotely for its CREATOR. |
|
| 227. |
Backdoors are also known as ______________(a) Malware-doors(b) Trojan-backups(c) Front-doors(d) TrapdoorsThis question was posed to me in an interview.The query is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct ANSWER is (d) Trapdoors |
|
| 228. |
The threat of backdoors started when ____________ & ____________ OSs became widely accepted.(a) single-user, Windows(b) multiuser, networked(c) single-user, UNIX(d) multiuser, UNIXI have been asked this question in examination.The query is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» RIGHT choice is (b) multiuser, NETWORKED To explain: Hackers take the HELP of backdoor to breach security mechanism & bypassed for stealing different types of information from the TARGET system. The threat of backdoors started when multiuser & networked OS became widely ACCEPTED. |
|
| 229. |
Trojans having backdoors are harmless.(a) True(b) FalseThe question was asked in an internship interview.My question is based upon Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct answer is (b) False |
|
| 230. |
A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system’s hardware.(a) crypter(b) virus(c) backdoor(d) key-loggerThis question was posed to me by my school teacher while I was bunking the class.My question is taken from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right OPTION is (C) backdoor |
|
| 231. |
Backdoors cannot be designed as ______________(a) the hidden part of a program(b) as a part of Trojans(c) embedded code of the firmware(d) embedded with anti-malwareThe question was posed to me in an online quiz.I need to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct choice is (d) embedded with anti-malware |
|
| 232. |
Trojan-Spy programs can keep an eye on how you are using your system.(a) True(b) FalseThis question was addressed to me in an online quiz.I would like to ask this question from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (a) True |
|
| 233. |
A ___________ is a method in which a computer security mechanism is bypassed untraceable for accessing the computer or its information.(a) front-door(b) backdoor(c) clickjacking(d) key-loggingI have been asked this question in my homework.This question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct CHOICE is (B) backdoor |
|
| 234. |
The ______________ can cost you money, by sending text messages from your mobile phone numbers.(a) IM – Trojans(b) Backdoor Trojans(c) SMS Trojan(d) Ransom TrojanThe question was posed to me at a job interview.Origin of the question is Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Correct option is (c) SMS Trojan |
|
| 235. |
_____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.(a) IM – Trojans(b) Backdoor Trojans(c) Trojan-Downloader(d) Ransom TrojanThis question was addressed to me in quiz.I need to ask this question from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (d) RANSOM Trojan |
|
| 236. |
A/an ___________ is a program that steals your logins & passwords for instant messaging applications.(a) IM – Trojans(b) Backdoor Trojans(c) Trojan-Downloader(d) Ransom TrojanThe question was posed to me in an interview.Enquiry is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct CHOICE is (a) IM – Trojans |
|
| 237. |
____________ work in background & keeps on downloading other malicious programs when the system is online.(a) DDoS-Trojan(b) Backdoor Trojan(c) Trojan-Banker(d) Trojan-DownloaderThis question was posed to me in examination.Question is taken from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security |
|
Answer» Correct CHOICE is (d) Trojan-Downloader |
|
| 238. |
______________ perform automated DoS (Denial of Service) attacks on a targeted web address.(a) DDoS-Trojan(b) Backdoor Trojan(c) Trojan-Banker(d) Trojan-DownloaderI got this question by my college professor while I was bunking the class.This interesting question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (a) DDoS-Trojan |
|
| 239. |
Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs.(a) True(b) FalseThis question was posed to me in a national level competition.I need to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (a) True |
|
| 240. |
_______________ programs are specially designed for stealing your account data for online banking systems, e-payment services & credit/debit cards.(a) DDoS-Trojan(b) Backdoor Trojan(c) Trojan-Banker(d) Trojan-DownloaderThis question was posed to me in an online quiz.My query is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT CHOICE is (c) Trojan-Banker The best I can explain: Trojan-Banker is programs are specially designed for STEALING your account data for online banking systems, e-payment services & credit/debit cards. They work SILENTLY in the back of the system process to steal such data. |
|
| 241. |
A _______________ provides malicious users remote control over the targeted computer.(a) DDoS-Trojan(b) Backdoor Trojan(c) Trojan-Banker(d) Trojan-DownloaderThis question was posed to me by my school principal while I was bunking the class.My doubt stems from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (b) Backdoor Trojan |
|
| 242. |
Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.(a) virus, cyber-criminals(b) malware, penetration testers(c) trojans, cyber-criminals(d) virus, penetration testersI got this question during a job interview.Question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (c) trojans, cyber-criminals |
|
| 243. |
Trojans can not ______________(a) steal data(b) self-replicate(c) steal financial information(d) steal login credentialsThe question was posed to me in unit test.The origin of the question is Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» Right option is (B) self-replicate |
|
| 244. |
Some Trojans carry ransomware with them to encrypt the data and ask for ransom.(a) True(b) FalseThis question was posed to me during an online exam.This interesting question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security |
|
Answer» CORRECT answer is (a) True To explain: Trojans are usually created to carry out the following actions LIKE: modify data, COPY data to its creator, delete data from the infected system or blocking data by CARRYING ransomware embedded in it. |
|
| 245. |
Trojans do not do one of the following. What is that?(a) Deleting Data(b) Protecting Data(c) Modifying Data(d) Copying DataThe question was posed to me during an interview.My enquiry is from Attack Vectors in section Understanding Attack Vectors of Cyber Security |
|
Answer» The correct option is (b) Protecting Data |
|
| 246. |
Which of the following port is not used by Trojans?(a) UDP(b) TCP(c) SMTP(d) MPI got this question in an interview for internship.Question is taken from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (d) MP |
|
| 247. |
Which of them is not a proper way of getting into the system?(a) IM(b) Attachments(c) Official product sites(d) Un-trusted sites, freeware and pirated softwareI had been asked this question in quiz.This key question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct OPTION is (c) Official product sites |
|
| 248. |
Trojan creators do not look for _______________(a) Credit card information(b) Confidential data(c) Important documents(d) Securing systems with such programsThis question was posed to me during an online exam.I'm obligated to ask this question of Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct CHOICE is (d) Securing systems with such programs |
|
| 249. |
By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.(a) Trojan(b) Virus(c) Antivirus(d) Anti-malwareThis question was posed to me by my college professor while I was bunking the class.The doubt is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Correct CHOICE is (a) Trojan |
|
| 250. |
A ___________ is a small malicious program that runs hidden on infected system.(a) Virus(b) Trojan(c) Shareware(d) AdwareI got this question during an online exam.My question is taken from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right answer is (b) Trojan |
|