Cyber Security Questions and Answers Part-12

1. Adware are pre-chosen _______ developed to display ads.
a) banner
b) software
c) malware
d) shareware

Answer: b
Explanation: Adware is software that is displayed on system or web pages for showing pre-chosen ads.

2. ________ is an attack technique occurs when excess data gets written to a memory block.
a) Over buffering
b) Buffering
c) Buffer overflow
d) Memory full

Answer: c
Explanation: Buffer overflow is a flaw that occurs in memory when excessive data is written which makes the buffer allocated to seize.

3. Finding & publishing any user’s identity with the help of different personal details is called ________
a) Doxing
b) Data breaching
c) Personal data copying
d) Secure File Transferring Protocol

Answer: a
Explanation: When an identity of internet user is discovered and published by following his/her details over the internet is called doxing.

4. In IP address, IP is abbreviated as __________
a) Internet Program
b) Internet Protocol
c) Intuition Programs
d) Internet Pathway

Answer: b
Explanation: In IP Address, IP is abbreviated as Internet Protocol. It acts as a unique address or identifier of any computer or device in the internet.

5. Whaling is the technique used to take deep and _________ information about any individual.
a) sensitive
b) powerful
c) useless
d) casual

Answer: a
Explanation: Whaling uses phishing technique which helps hackers in stealing deep and sensitive information about any member of an organization. The information can be private addresses, phone number, future plans and projects, salary and bonuses.

6. _________ are a specific section of any virus or malware that performs illicit activities in a system.
a) Malicious programs
b) Worms
c) Spyware
d) Payload

Answer: d
Explanation: Payloads are parts of a virus that helps in performing malicious activities such as destroying information, blocking network traffic, compromising data, steal and spy for sensitive information.

7. ____________ is a scenario when information is accessed without authorization.
a) Data infiltration
b) Data Hack
c) Information compromise
d) Data Breach

Answer: d
Explanation: Data breach is the term used when the cyber-security incident takes place where sensitive information is accessed without authority.

8. ____________ is an attempt to steal, spy, damage or destroy computer systems, networks or their associated information.
a) Cyber-security
b) Cyber attack
c) Digital hacking
d) Computer security

Answer: b
Explanation: Cyber attack can be defined as an attempt to steal, spy, damage or destroy different components of cyberspace such as computer systems, associated peripherals, network systems, and information.

9. ___________ is a device which secretly collects data from credit / debit cards.
a) Card Skimmer
b) Data Stealer
c) Card Copier
d) Card cloner

Answer: a
Explanation: Card skimmer is hardware that is installed and setup in ATMs secretly so that when any user will swipe or insert their card in the ATM, the skimmer will fetch all information from the magnetic strip.

10. _____________ is a technique used when artificial clicks are made which increases revenue because of pay-per-click.
a) Clickjacking
b) Clickfraud
c) Keylogging
d) Click-hacking

Answer: b
Explanation: Clickfraud is an attack technique used when artificial clicks get generated to increase the revenue in ad-campaigns online.