Cyber Security Englih
Ans: Aircrack-ng
Question. Which of the following is a popular IP address and port scanner?
Ans: Angry IP Scanner
Question. Which of the following is not an example of physical data leakage?
Ans: Phishing
Question. What is the unauthorized movement of data?
Ans: Data exfiltration
Question. Which of the following is not an information source over the internet for target attackers?
Ans: YouTube
Question. There are ........... types of scanning in ethical hacking and cyber-security
Ans: 3
Question. ............. is not a valid scanning method.Null Scan
Ans: Cloud scan
Question. Which of the following is the most important activity in system hacking?
Ans: Cracking passwords
Question. Which of the followings are the types of scanning?
Ans: Network, vulnerability, and port
Question. Which of the following database is queried by Whois?
Ans: ICANN
Question. Which of the following is the first computer virus?
Ans: Creeper
Question. We should turn on .............. to protect Our Computer from hacker.
Ans: Firewall
Question. What is Code red?
Ans: Virus
Question. Which of the following is also known as Malicious software?
Ans: Malware
Question. What are the common cyber-attacks which can be used by hackers to damage network?
Ans: Phishing & Password attacks,Malware & Malvertising,DDoS & Drive-by downloads
Question. A computer virus may be used to -
Ans: Corrupt data in your computer,Log the user's keystrokes,Access private data like user id and passwords
Question. Which of the following option is used to protect data and passwords?
Ans: Encryption
Question. What does TCP/ IP stands for?
Ans: Transmission control protocol / Internet protocol
Question. Which of the following wireless protocol uses TKIP?
Ans: WPA
Question. Which of the following can be considered as the elements of cyber security?
Ans: Network Security,Operational Security,Application Security
Question. In system hacking, which of the following is the most crucial activity?
Ans: Cracking passwords
Question. which one of the following usually used in the process of wi-fi-hacking?
Ans: Aircrack-ng
Question. Which database is queried by whois?
Ans: ICANN
Question. which of the following is most important in design of secure system?
Ans: Assessing vulnerability,Changing or Updating System according to vulnerability
Question. Which of the following is true about a computer security incident?
Ans: A computer security incident is a threat to policies that are related to computer security.,Threats or violations can be identified by unauthorized access to a system.,A security incident is a warning that there may be a threat to information or computer security. The warning could also be that a threat has already occurred.
Question. Which of the following are the types of computer security incidents?
Ans: Malicious code attack,Fraud and theft,Unauthorized access
Question. Accurately ___ and ___ incidents are the most challenging and essential parts of the incident response process.
Ans: Detecting / assessing
Question. Which of the following is a security incident indication?
Ans: A system alarm, or similar indication from an intrusion detection,DoS attack, or users not able to log into an account,System crashes, or poor system performance,Attempt to logon to a new user account
Question. Based on incident prioritization, which one of the following incidents should have first priority (Priority 1)?
Ans: MyUFL is down; hacking/compromise of critical UF system leading to service unavailability/disclosure of restricted data
Question. Which of the following is correct about incident response?
Ans: An incident response plan includes a policy that defines, in specific terms, what constitutes an incident and provides a step-by-step process that should be followed when an incident occurs,Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident),The goal of an incident response plan is to handle the situation in a way that limits damage and reduces recovery time and costs.
Comments
Post a Comment