Cyber Security Englih

Question. Which of the following tool is used for Wi-Fi hacking?

Ans: Aircrack-ng


Question. Which of the following is a popular IP address and port scanner?

Ans: Angry IP Scanner


Question. Which of the following is not an example of physical data leakage?

Ans: Phishing


Question. What is the unauthorized movement of data?

Ans: Data exfiltration


Question. Which of the following is not an information source over the internet for target attackers?

Ans: YouTube


Question. There are ........... types of scanning in ethical hacking and cyber-security

Ans: 3


Question. ............. is not a valid scanning method.Null Scan

Ans: Cloud scan


Question. Which of the following is the most important activity in system hacking?

Ans: Cracking passwords


Question. Which of the followings are the types of scanning?

Ans: Network, vulnerability, and port


Question. Which of the following database is queried by Whois?

Ans: ICANN


Question. Which of the following is the first computer virus?

Ans: Creeper


Question. We should turn on .............. to protect Our Computer from hacker.

Ans: Firewall


Question. What is Code red?

Ans: Virus


Question. Which of the following is also known as Malicious software?

Ans: Malware


Question. What are the common cyber-attacks which can be used by hackers to damage network?

Ans: Phishing & Password attacks,Malware & Malvertising,DDoS & Drive-by downloads


Question. A computer virus may be used to -

Ans: Corrupt data in your computer,Log the user's keystrokes,Access private data like user id and passwords


Question. Which of the following option is used to protect data and passwords?

Ans: Encryption


Question. What does TCP/ IP stands for?

Ans: Transmission control protocol / Internet protocol


Question. Which of the following wireless protocol uses TKIP?

Ans: WPA


Question. Which of the following can be considered as the elements of cyber security?

Ans: Network Security,Operational Security,Application Security


Question. In system hacking, which of the following is the most crucial activity?

Ans: Cracking passwords


Question. which one of the following usually used in the process of wi-fi-hacking?

Ans: Aircrack-ng


Question. Which database is queried by whois?

Ans: ICANN


Question. which of the following is most important in design of secure system?

Ans: Assessing vulnerability,Changing or Updating System according to vulnerability


Question. Which of the following is true about a computer security incident?

Ans: A computer security incident is a threat to policies that are related to computer security.,Threats or violations can be identified by unauthorized access to a system.,A security incident is a warning that there may be a threat to information or computer security. The warning could also be that a threat has already occurred.


Question. Which of the following are the types of computer security incidents?

Ans: Malicious code attack,Fraud and theft,Unauthorized access


Question. Accurately ___ and ___ incidents are the most challenging and essential parts of the incident response process.

Ans: Detecting / assessing


Question. Which of the following is a security incident indication?

Ans: A system alarm, or similar indication from an intrusion detection,DoS attack, or users not able to log into an account,System crashes, or poor system performance,Attempt to logon to a new user account


Question. Based on incident prioritization, which one of the following incidents should have first priority (Priority 1)?

Ans: MyUFL is down; hacking/compromise of critical UF system leading to service unavailability/disclosure of restricted data


Question. Which of the following is correct about incident response?

Ans: An incident response plan includes a policy that defines, in specific terms, what constitutes an incident and provides a step-by-step process that should be followed when an incident occurs,Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident),The goal of an incident response plan is to handle the situation in a way that limits damage and reduces recovery time and costs.

Comments

Popular posts from this blog

জন্ম নিবন্ধন যাচাই

জন্ম নিবন্ধন সংশোধন

জন্ম নিবন্ধন