Download PDF
Free download in PDF Cyber Crime Multiple Choice Questions and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams like UPSC, SSC, NDA etc. These short solved questions or quizzes are provided by Gkseries.
(1)
Why would a hacker use a proxy server?
[A]
To create a stronger connection with the target
[B]
To create a ghost server on the network
[C]
To obtain a remote access connection
[D]
To hide malicious activity on the network
Answer: To hide malicious activity on the network
(2)
What type of symmetric key algorithm using a streaming cipher to encrypt information?
[A]
RC4
[B]
Blowfish
[C]
SHA
[D]
MD5
(3)
Which of the following is not a factor in securing the environment against an attack on security?
[A]
The education of the attacker
[B]
The system configuration
[C]
The network architecture
[D]
The business strategy of the company
Answer: The business strategy of the company
(4)
To hide information inside a picture, what technology is used?
[A]
Rootkits
[B]
Bitmapping
[C]
Steganography
[D]
None of the above
(5)
Which phase of hacking performs actual attack on a network or system?
[A]
Reconnaissance
[B]
Maintaining Access
[C]
Scanning
[D]
Gaining Access
Answer: Maintaining Access
(6)
Which of the following is not a typical characteristic of an ethical hacker?
[A]
Excellent knowledge of Windows
[B]
Understands the process of exploiting network vulnerabilities
[C]
Patience, persistence and perseverance
[D]
Has the highest level of security for the organization
Answer: Has the highest level of security for the organization
(7)
What type of rootkit will patch, hook, or replace the version of system call in order to hide information?
[A]
Library level rootkits
[B]
Kernel level rootkits
[C]
System level rootkits
[D]
None Of The Above
Answer: Library level rootkits
(8)
What are some of the most common vulnerabilities that exist in a network or system?
[A]
Changing manufacturer, or recommended, settings of a newly installed application
[B]
Additional unused features on commercial software packages
[C]
Utilizing open source application code
[D]
Balancing security concerns with functionality and ease of use of a system
Answer: Additional unused features on commercial software packages
(9)
What is the sequence of a TCP connection?
[A]
SYN-ACK-FIN
[B]
SYN-SYN ACK-ACK
[C]
SYN-ACK
[D]
None of the Above
(10)
Which ports should be blocked to prevent null session enumeration?
[A]
Ports 120 and 445
[B]
Ports 135 and 136
[C]
Ports 110 and 137
[D]
Ports 135 and 139
Answer: Ports 135 and 139
(11)
Why would a ping sweep be used?
[A]
To identify live systems
[B]
To locate live systems
[C]
To identify open ports
[D]
To locate firewalls
Answer: To identify live systems
(12)
What are the port states determined by Nmap?
[A]
Active, inactive, standby
[B]
Open, half-open, closed
[C]
Open, filtered, unfiltered
[D]
Active, closed, unused
Answer: Open, filtered, unfiltered
(13)
Which of the following will allow footprinting to be conducted without detection?
[A]
PingSweep
[B]
Traceroute
[C]
War Dialers
[D]
ARIN
(14)
Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________.
[A]
Cracking
[B]
Analysis
[C]
Hacktivism
[D]
Exploitation
(15)
What is the most important activity in system hacking?
[A]
Information gathering
[B]
Cracking passwords
[C]
Escalating privileges
[D]
Covering tracks
Answer: Cracking passwords
(16)
Sniffing is used to perform ______________ fingerprinting.
[A]
Passive stack
[B]
Active stack
[C]
Passive banner grabbing
[D]
None of the above
(17)
Phishing is a form of ____________________.
[A]
Spamming
[B]
Identify Theft
[C]
Impersonation
[D]
Scanning
(18)
Why would HTTP Tunneling be used?
[A]
To identify proxy servers
[B]
Web activity is not scanned
[C]
To bypass a firewall
[D]
HTTP is a easy protocol to work with
Answer: To bypass a firewall
(19)
Which Nmap scan is does not completely open a TCP connection?
[A]
SYN stealth scan
[B]
TCP connect
[C]
XMAS tree scan
[D]
ACK scan
(20)
Services running on a system are determined by _____________.
[A]
The system’s IP address
[B]
The Active Directory
[C]
The system’s network name
[D]
The port assigned
Answer: The port assigned
Please share this page