Cyber Crime MCQs | Cyber Crime Multiple Choice Questions and Answers

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

Questions
1 Why would a hacker use a proxy server?
A To create a stronger connection with the target
B To create a ghost server on the network
C To obtain a remote access connection
D To hide malicious activity on the network

Answer: To hide malicious activity on the network
2 What type of symmetric key algorithm using a streaming cipher to encrypt information?
A RC4
B Blowfish
C SHA
D MD5

Answer: RC4
Advertisement
Article and Schedule Quiz Start Test!
DOWNLOAD CURRENT AFFAIRS PDF FROM APP
3 Which of the following is not a factor in securing the environment against an attack on security?
A The education of the attacker
B The system configuration
C The network architecture
D The business strategy of the company

Answer: The business strategy of the company
4 To hide information inside a picture, what technology is used?
A Rootkits
B Bitmapping
C Steganography
D None of the above

Answer: Steganography
5 Which phase of hacking performs actual attack on a network or system?
A Reconnaissance
B Maintaining Access
C Scanning
D Gaining Access

Answer: Maintaining Access
6 Which of the following is not a typical characteristic of an ethical hacker?
A Excellent knowledge of Windows
B Understands the process of exploiting network vulnerabilities
C Patience, persistence and perseverance
D Has the highest level of security for the organization

Answer: Has the highest level of security for the organization
7 What type of rootkit will patch, hook, or replace the version of system call in order to hide information?
A Library level rootkits
B Kernel level rootkits
C System level rootkits
D None Of The Above

Answer: Library level rootkits
8 What are some of the most common vulnerabilities that exist in a network or system?
A Changing manufacturer, or recommended, settings of a newly installed application
B Additional unused features on commercial software packages
C Utilizing open source application code
D Balancing security concerns with functionality and ease of use of a system

Answer: Additional unused features on commercial software packages
9 What is the sequence of a TCP connection?
A SYN-ACK-FIN
B SYN-SYN ACK-ACK
C SYN-ACK
D None of the Above

Answer: SYN-SYN ACK-ACK
10 Which ports should be blocked to prevent null session enumeration?
A Ports 120 and 445
B Ports 135 and 136
C Ports 110 and 137
D Ports 135 and 139

Answer: Ports 135 and 139
11 Why would a ping sweep be used?
A To identify live systems
B To locate live systems
C To identify open ports
D To locate firewalls

Answer: To identify live systems
12 What are the port states determined by Nmap?
A Active, inactive, standby
B Open, half-open, closed
C Open, filtered, unfiltered
D Active, closed, unused

Answer: Open, filtered, unfiltered
13 Which of the following will allow footprinting to be conducted without detection?
A PingSweep
B Traceroute
C War Dialers
D ARIN

Answer: ARIN
14 Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________.
A Cracking
B Analysis
C Hacktivism
D Exploitation

Answer: Hacktivism
15 What is the most important activity in system hacking?
A Information gathering
B Cracking passwords
C Escalating privileges
D Covering tracks

Answer: Cracking passwords
16 Sniffing is used to perform ______________ fingerprinting.
A Passive stack
B Active stack
C Passive banner grabbing
D None of the above

Answer: Passive stack
17 Phishing is a form of ____________________.
A Spamming
B Identify Theft
C Impersonation
D Scanning

Answer: Impersonation
18 Why would HTTP Tunneling be used?
A To identify proxy servers
B Web activity is not scanned
C To bypass a firewall
D HTTP is a easy protocol to work with

Answer: To bypass a firewall
19 Which Nmap scan is does not completely open a TCP connection?
A SYN stealth scan
B TCP connect
C XMAS tree scan
D ACK scan

Answer: SYN stealth scan
20 Services running on a system are determined by _____________.
A The system’s IP address
B The Active Directory
C The system’s network name
D The port assigned

Answer: The port assigned
Assam Direct Recruitment Test Series

Teacher Eligibility Test

Assam Direct Recruitment Test Series