- What is a logic bomb?
A) Hardware failure
B) Malicious code triggered by condition
C) Backup tool
D) Firewall
Answer: B - What is phishing commonly used for?
A) System repair
B) Stealing sensitive information
C) Data backup
D) File compression
Answer: B - Which attack involves redirecting users to fake sites?
A) Spoofing
B) Backup
C) Patch
D) Encryption
Answer: A - What is sniffing?
A) Monitoring network traffic
B) Deleting files
C) Backup
D) Formatting disk
Answer: A - What is ethical hacking permission called?
A) Illegal access
B) Authorization
C) Spoofing
D) Cracking
Answer: B - Which tool is used for password cracking?
A) John the Ripper
B) Paint
C) Excel
D) Word
Answer: A - What is hash function used for?
A) Encrypting data
B) Converting data into fixed value
C) Deleting files
D) Backup
Answer: B - What is salting in passwords?
A) Weakening security
B) Adding random data to passwords
C) Removing password
D) Backup
Answer: B - What is phishing attack example?
A) Fake bank email
B) System update
C) Backup
D) Antivirus
Answer: A - What is network security?
A) Protecting network from attacks
B) Deleting files
C) Backup
D) Programming
Answer: A - What is vulnerability assessment?
A) System repair
B) Identifying weaknesses
C) Backup
D) Encryption
Answer: B - What is exploit?
A) Security patch
B) Code that takes advantage of vulnerability
C) Backup
D) Antivirus
Answer: B - Which attack steals cookies?
A) Session hijacking
B) Backup
C) Patch
D) Firewall
Answer: A - What is ARP spoofing?
A) Fake MAC-IP mapping
B) Backup
C) Encryption
D) Hardware
Answer: A - What is DNS spoofing?
A) Fake DNS response
B) Backup
C) Update
D) Antivirus
Answer: A - What is backdoor?
A) Secret access method
B) Firewall
C) Backup
D) Patch
Answer: A - What is cyber espionage?
A) Legal work
B) Stealing confidential data
C) Backup
D) Programming
Answer: B - What is hacktivism?
A) Hacking for political/social cause
B) Backup
C) Programming
D) Antivirus
Answer: A - What is password policy?
A) Rules for passwords
B) Backup
C) Patch
D) Firewall
Answer: A - What is penetration test phase 1?
A) Exploitation
B) Reconnaissance
C) Reporting
D) Cleanup
Answer: B - What is reconnaissance?
A) Gathering information
B) Deleting files
C) Backup
D) Encryption
Answer: A - What is scanning phase?
A) Finding open ports
B) Backup
C) Patch
D) Firewall
Answer: A - What is exploitation phase?
A) Using vulnerabilities
B) Backup
C) Update
D) Antivirus
Answer: A - What is reporting phase?
A) Documenting results
B) Backup
C) Patch
D) Hardware
Answer: A - What is footprinting?
A) Collecting target info
B) Backup
C) Patch
D) Firewall
Answer: A - What is vulnerability management?
A) Fixing weaknesses
B) Backup
C) Encryption
D) Programming
Answer: A - What is ethical hacker skill?
A) Coding knowledge
B) Painting
C) Singing
D) Drawing
Answer: A - What is social engineering example?
A) Pretending IT staff
B) Backup
C) Patch
D) Firewall
Answer: A - What is phishing SMS called?
A) Smishing
B) Backup
C) Patch
D) Firewall
Answer: A - What is voice phishing called?
A) Vishing
B) Backup
C) Patch
D) Firewall
Answer: A - What is data encryption standard?
A) DES
B) CPU
C) RAM
D) UPS
Answer: A - What is AES?
A) Advanced Encryption Standard
B) Backup
C) Patch
D) Firewall
Answer: A - What is HTTPS?
A) Secure protocol
B) Virus
C) Hardware
D) Backup
Answer: A - What is SSL?
A) Security layer protocol
B) Backup
C) Patch
D) Hardware
Answer: A - What is digital signature?
A) Electronic authentication
B) Backup
C) Patch
D) Firewall
Answer: A - What is cyber warfare?
A) Online conflict
B) Backup
C) Patch
D) Hardware
Answer: A - What is identity theft?
A) Stealing personal identity
B) Backup
C) Patch
D) Firewall
Answer: A - What is spam?
A) Unwanted emails
B) Backup
C) Patch
D) Firewall
Answer: A - What is firewall type?
A) Packet filtering
B) Backup
C) Patch
D) CPU
Answer: A - What is IDS?
A) Intrusion Detection System
B) Backup
C) Patch
D) Hardware
Answer: A - What is IPS?
A) Intrusion Prevention System
B) Backup
C) Patch
D) Hardware
Answer: A - What is honeypot?
A) Trap system for attackers
B) Backup
C) Patch
D) Firewall
Answer: A - What is cyber threat?
A) Potential attack
B) Backup
C) Patch
D) Hardware
Answer: A - What is risk assessment?
A) Evaluating threats
B) Backup
C) Patch
D) Firewall
Answer: A - What is ethical hacking rule?
A) Permission required
B) No rules
C) Illegal access
D) Hiding identity
Answer: A - What is vulnerability patch?
A) Fix for security flaw
B) Backup
C) Virus
D) Hardware
Answer: A - What is cyber defense?
A) Protecting systems
B) Backup
C) Patch
D) Programming
Answer: A - What is digital forensics?
A) Investigating cyber crimes
B) Backup
C) Patch
D) Hardware
Answer: A - What is ethical hacking benefit?
A) Improved security
B) Data loss
C) Virus
D) Attack
Answer: A - What is safest practice online?
A) Sharing passwords
B) Using strong security measures
C) Ignoring updates
D) No antivirus
Answer: B
Pages: 1 2