Cyber Security Practice Test
What is the difference between "http://" (without the "s") and "http://" (with the "s") at the beginning of a URL?
Explanation:
The correct answer is
That information entered into the site is encrypted
Which of the following is a "phishing" attack example?
Explanation:
Phishing attacks are the practice of sending fraudulent communications that appear to come from a
reputable source. It is usually performed through email. The goal is to steal sensitive data like credit card
and login information or to install malware on the victim's machine.
Which of the following options is the best for securing your router?
Explanation:
That's only one method for securing your router. Once the router is set up, you can modify the default name
and password and log out as the administrator.
Large corporations are the only ones targeted by cybercriminals. Is this statement true or false?
Explanation:
Cyber criminals target companies of all sizes.
Which option is the best for determining who in a company should be in charge of cybersecurity?
Explanation:
Everyone, not just business owners, has a role to play in cybersecurity. For a secure culture, all employees should
be aware of basic cybersecurity principles and get frequent training.
What is the name of the law in India that governs internet usage?
Explanation:
The Assistive Technology Act was first passed by Congress and signed by the President as the
Technology-Related Assistance Act of 1988. Itโs often called the Tech Act for short and has been
reauthorized in 1994, 1998, and 2004. The Tech Act is intended to promote peopleโs awareness
of, and access to, assistive technology (AT) devices and services.
Which section of the Information Technology Act deals with the appointment of a Controller of Certifying Authorities?
Explanation:
Section 17 deals with the Appointment of Controller and other officers which says the Central Government
may notify in the Official Gazette to appoint 3 Controller of Certifying Authorities of this act to perform the
functions assigned to them, discharge his function.
A networked group of computers used by hackers to steal information is referred to as a...
Explanation:
A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can
be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker
to access the device and its connection. The owner can control the botnet using command and control (C&C)
software. The word "botnet" is a portmanteau of the words "robot" and "network". The term is usually used with
a negative or malicious connotation.
Which of the four passwords listed below is the most secure?
Explanation:
This password has all of the components of a strong password that experts recommend. It is made up of letters,
numbers, and symbols, and it includes both upper and lower case characters. It does not contain any dictionary
words.
Which of the following identifies a specific sequence of input or is triggered by a user ID or an unusual sequence of events?
Explanation:
The Trap doors are code that recognizes some special sequence of input or is triggered by being run from a
certain user ID by an unlikely sequence of events. Key Points. Trap Door: A trap door is a secret entry point
into a program that allows anyone to gain access to any system without going through the usual security
access procedures.
The very first computer virus is called
Explanation:
Creeper virus is a computer virus that is most commonly recognized as the first computer virus. In 1971,
Bob Thomas at BBN created Creeper as an experimental self-duplicating program that was intended not
to inflict damage on, but to illustrate a mobile application.
What is the file extension for storing e-mails locally in Outlook Express?
Explanation:
A PST file is a data storage file that contains personal information used by Microsoft Outlook and Exchange.
It may also include e-mail folders, contacts, addresses, and other data.
Criminals gain access to a computer and encrypt the user's personal information and files. Unless the user pays the thieves to decrypt the files, the user will be unable to view the information. This method is known as...
Explanation:
Ransomware Is a Serious and Growing Threat. Businesses and individuals face a dangerous and growing threat
to the safety of their personal information and data in the form of ransomware. Ransomware is a form of malware
that targets critical data and systems for the purpose of extortion.
What is the abbreviation for malicious software (software that is designed to cause computer malfunctions, collect sensitive data, or obtain unauthorized access to computer systems)?
Explanation:
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.
By contrast, software that causes unintentional harm due to some deficiency is typically described as a software bug.
A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware,
adware, rogue software, wiper and scareware.
Turning off your smartphone's GPS function prevents your phone's location from being tracked.
Explanation:
Smartphones can also be tracked using cellphone towers or Wi-Fi networks that they are connected to, in addition to GPS.
When someone tries to harm a group of people by using a computer, what do they call themself?
Explanation:
A cyber-terrorist is a criminal who uses computer technology and the Internet, especially to cause fear and
disruption. Some cyber-terrorists spread computer viruses, and others threaten people electronically. When
a crime involves computers, particularly a crime that terrorizes, or threatens real harm or significant disruption,
its perpetrator is a cyber-terrorist.
What term is used to describe the act of stealing money or resources on a timer?
Explanation:
A salami attack is when small attacks add up to one major attack that can go undetected due to the nature of this type
of cyber crime. It also known as salami slicing.
Is it safe to use a public Wi-Fi network (such as in an airport or cafรฉ) for critical activities like online banking if it requires a password?
Explanation:
Even though a public Wi-Fi network requires a password, other users may be able to read sensitive data sent
over that Wi-Fi network.
Which of the following is a cybercrime example?
Explanation:
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a
computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest,
information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating
defenses against potential hackers. The subculture that has evolved around hackers is often referred to as
the "computer underground".
What types of cybersecurity threats may a Virtual Private Network (VPN) help minimize?
Explanation:
A Virtual Private Network (VPN) allows users to establish an encrypted connection between their devices
and the internet, making it considerably more difficult for others to monitor their activities.
Which strategy is used for identity theft if the information is retrieved by looking through objects that the user has discarded?
Explanation:
In the world of information technology, dumpster diving is a technique used to retrieve information that
could be used to carry out an attack on a computer network
If a user receives a phone call from someone posing as a bank employee demanding that the user update personal information, what type of attack strategy is being used?
Explanation:
Pretexting is a type of social engineering attack. As I said pretexting is a type of social engineering attack
which means the attack is directly related to humans. The primary target in pretextings is to steal credentials
or steal money or even doing a privilege escalation.
Which provision of the Information Technology Act deals with computer system hacking and the penalties associated with it?
Explanation:
This section applies to a person who commits hacking. Hacking is when the person intentionally or knowingly
causes a wrongful loss or damage to the public or another person or destroys or deletes any information residing
in a computer resource or diminishes its utility or value or injures it by any means.
Nimda worm carried out what kind of attack?
Explanation:
Blended attack refers to the idea of using mixed techniques to invade one computer system to the next.
Blended attacks, then, can include computer viruses, worms, and Trojan horses. They typically exploit an
initial security flaw and move on to perform additional network damage.
Which of the following is a self-contained malicious program that does not require the use of a host application?
Explanation:
A worm virus refers to a malicious program that replicates itself, automatically spreading through a network.
In this definition of computer worms, the worm virus exploits vulnerabilities in your security software to steal
sensitive information, install backdoors that can be used to access the system, corrupt files, and do other kinds
of harm.