Cyber Security Questions and Answers Part-11

1. ________ is any action that might compromise cyber-security.
a) Threat
b) Vulnerability
c) Exploit
d) Attack

Answer: a
Explanation: Threat can be termed as a possible danger that may lead to breach the cyber security and may cause possible harm to the system or the network.

2. Existence of weakness in a system or network is called _______
a) Threat
b) Vulnerability
c) Exploit
d) Attack

Answer: b
Explanation: Vulnerability is the term used to define weakness in any network or system that can get exploited by an attacker. Exploiting the weakness can lead to the unexpected & undesirable event in cyber security.

3. When any IT product, system or network is in need for testing for security reasons, then the term used is called _________
a) Threat
b) Vulnerability
c) Target of Evaluation
d) Attack

Answer: c
Explanation: Target of Evaluation is the term used when any IT infrastructure, system, network require evaluation for security reasons or for fixing any bugs after being tested by penetration testers.

4. An/A ________ is an act that violates cyber-security.
a) Threat
b) Vulnerability
c) Exploit
d) Attack

Answer: d
Explanation: An “attack” or “cyber-attack” is an attempt taken by attackers to alter, delete, steal or expose any specific data by gaining unauthorized access.

5. ________ is a way to breach the security by using the vulnerability of that system.
a) Threat
b) Vulnerability
c) Exploit
d) Attack

Answer: c
Explanation: An exploit can be any data, piece of code, a program, sequence of commands or any software that uses the vulnerability or flaw of a system and helps attackers or cyber-criminals cause unanticipated behaviour.

6. _________ is an act of hacking by the means of which a political or social message is conveyed.
a) Hacktivism
b) Whistle-blowing
c) Surveillance
d) Pseudonymization

Answer: a
Explanation: Hacktivism is an act of defacing a website, or any network or system. Systems and networks are compromised with a political or social agenda.

7. _______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.
a) Data copying
b) Data masking
c) Data breaching
d) Data duplicating

Answer: b
Explanation: Data masking is the method used for developing or creating a structurally similar version of data of any organization that is not authentic. These types of unauthentic data are purposefully created for protecting the actual data.

8. Data masking is also known as _________
a) Data obfuscation
b) Data copying
c) Data breaching
d) Data duplicating

Answer: a
Explanation: Data obfuscation is the alternate term used for data masking, that is used for developing or creating a structurally similar version of data of any organization that is not authentic. These types of unauthentic data are purposefully created for protecting the actual data.

9. ________ automates an action or attack so that repetitive tasks are done at a faster rate.
a) Auto-bots
b) Cookie-bots
c) Robots
d) Bots

Answer: d
Explanation: Bots are a set of codes written which helps to perform repetitive tasks at a much faster rate than humans.

10. Backdoors are also known as ____________
a) Trap doors
b) Front doors
c) Cover doors
d) Back entry

Answer: a
Explanation: Trap-doors are hidden entry points in any already hacked system that is set to bypass security measures.