1. Adware are pre-chosen _______ developed to display ads.
a) banner
b) software
c) malware
d) shareware
Explanation: Adware is software that is displayed on system or web pages for showing pre-chosen ads.
2. ________ is an attack technique occurs when excess data gets written to a memory block.
a) Over buffering
b) Buffering
c) Buffer overflow
d) Memory full
Explanation: Buffer overflow is a flaw that occurs in memory when excessive data is written which makes the buffer allocated to seize.
3. Finding & publishing any user’s identity with the help of different personal details is called ________
a) Doxing
b) Data breaching
c) Personal data copying
d) Secure File Transferring Protocol
Explanation: When an identity of internet user is discovered and published by following his/her details over the internet is called doxing.
4. In IP address, IP is abbreviated as __________
a) Internet Program
b) Internet Protocol
c) Intuition Programs
d) Internet Pathway
Explanation: In IP Address, IP is abbreviated as Internet Protocol. It acts as a unique address or identifier of any computer or device in the internet.
5. Whaling is the technique used to take deep and _________ information about any individual.
a) sensitive
b) powerful
c) useless
d) casual
Explanation: Whaling uses phishing technique which helps hackers in stealing deep and sensitive information about any member of an organization. The information can be private addresses, phone number, future plans and projects, salary and bonuses.
6. _________ are a specific section of any virus or malware that performs illicit activities in a system.
a) Malicious programs
b) Worms
c) Spyware
d) Payload
Explanation: Payloads are parts of a virus that helps in performing malicious activities such as destroying information, blocking network traffic, compromising data, steal and spy for sensitive information.
7. ____________ is a scenario when information is accessed without authorization.
a) Data infiltration
b) Data Hack
c) Information compromise
d) Data Breach
Explanation: Data breach is the term used when the cyber-security incident takes place where sensitive information is accessed without authority.
8. ____________ is an attempt to steal, spy, damage or destroy computer systems, networks or their associated information.
a) Cyber-security
b) Cyber attack
c) Digital hacking
d) Computer security
Explanation: Cyber attack can be defined as an attempt to steal, spy, damage or destroy different components of cyberspace such as computer systems, associated peripherals, network systems, and information.
9. ___________ is a device which secretly collects data from credit / debit cards.
a) Card Skimmer
b) Data Stealer
c) Card Copier
d) Card cloner
Explanation: Card skimmer is hardware that is installed and setup in ATMs secretly so that when any user will swipe or insert their card in the ATM, the skimmer will fetch all information from the magnetic strip.
10. _____________ is a technique used when artificial clicks are made which increases revenue because of pay-per-click.
a) Clickjacking
b) Clickfraud
c) Keylogging
d) Click-hacking
Explanation: Clickfraud is an attack technique used when artificial clicks get generated to increase the revenue in ad-campaigns online.