Cyber Crime MCQs | Cyber Crime Short Questions and Answers

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

Questions
41 Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
A 65
B 65-D
C 67
D 70

Answer: 65
42 What type of attack uses a fraudulent server with a relay address?
A NTLM
B MITM
C NetBIOS
D SMB

Answer: MITM
Advertisement
Article and Schedule Quiz Start Test!
DOWNLOAD CURRENT AFFAIRS PDF FROM APP
43 What port is used to connect to the Active Directory in Windows 2000?
A 80
B 445
C 139
D 389

Answer: 389
44 Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.
A Local networking
B Social engineering
C Physical entry
D Remote networking

Answer: Local networking
45 Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?
A Electronic Communications Interception of Oral Communications
B 18 U.S.C. § 1029
C Cyber Security Enhancement Act 2002
D 18 U.S.C. § 1030

Answer: Cyber Security Enhancement Act 2002
46 What is the proper command to perform an Nmap XMAS scan every 15seconds?
A nmap -sX -sneaky
B nmap -sX -paranoid
C nmap -sX -aggressive
D nmap -sX -polite

Answer: nmap -sX -sneaky
47 What is the purpose of a Denial of Service attack?
A Exploit a weakness in the TCP/IP stack
B To execute a Trojan on a system
C To overload a system so it is no longer operational
D To shutdown services by turning them off

Answer: To overload a system so it is no longer operational
48 What tool can be used to perform SNMP enumeration?
A DNSlookup
B Whois
C Nslookup
D IP Network Browser

Answer: IP Network Browser
49 The first phase of hacking an IT system is compromise of which foundation of security?
A Availability
B Confidentiality
C Integrity
D None of the Above

Answer: Confidentiality
50 How is IP address spoofing detected?
A Installing and configuring a IDS that can read the IP header
B Comparing the TTL values of the actual and spoofed addresses
C Implementing a firewall to the network
D Identify all TCP sessions that are initiated but does not complete successfully

Answer: Comparing the TTL values of the actual and spoofed addresses
51 A packet with no flags set is which type of scan?
A TCP
B XMAS
C IDLE
D NULL

Answer: NULL
52 What protocol is the Active Directory database based on?
A LDAP
B TCP
C SQL
D HTTP

Answer: LDAP
53 What are the types of scanning?
A Port, network, and services
B Network, vulnerability, and port
C Passive, active, and interactive
D Server, client, and network

Answer: Network, vulnerability, and port
54 What is the best statement for taking advantage of a weakness in the security of an IT system?
A Threat
B Attack
C Exploit
D Vulnerability

Answer: Exploit
55 Having individuals provide personal information to obtain a free offer provided through the Internet is considered what type of social engineering?
A Web-based
B Human-based
C User-based
D Computer-based

Answer: Computer-based
56 Which form of encryption does WPA use?
A Shared key
B LEAP
C TKIP
D None of the above

Answer: TKIP
Assam Direct Recruitment Test Series

Teacher Eligibility Test

Assam Direct Recruitment Test Series