Cyber Security Questions and Answers Part-13

1. __________ is the practice implemented to spy someone using technology for gathering sensitive information.
a) Cyber espionage
b) Cyber-spy
c) Digital Spying
d) Spyware

Answer: a
Explanation: Cyber espionage is a practice done by both ethical and non-ethical hackers to spy on others for gathering confidential information.

2. ____________ is the way or technique through which majority of the malware gets installed in our system.
a) Drive-by click
b) Drive-by redirection
c) Drive-by download
d) Drive-by injecting USB devices

Answer: c
Explanation: An accidental yet dangerous action that takes place in the cyberspace which helps attackers place their malware into the victim’s system. This technique is called Drive-by download.

3. ______ is the term used for toolkits that are purchased and used for targeting different exploits.
a) Exploit bag
b) Exploit set
c) Exploit Toolkit
d) Exploit pack

Answer: d
Explanation: Exploit pack or Exploit kit is the term used for toolkits that are purchased and used for targeting different exploits.

4. Identity theft is the term used when a cyber-thief uses anybody’s personal information to impersonate the victim for their benefit.
a) True
b) False

Answer: a
Explanation: Identity theft is the term used when a cyber-thief uses anybody’s personal information to impersonate the victim for their benefit. In this type of cyber-crime, information like social security number, personal details, and images, hobbies and passion details, driving license number and address details are compromised.

5. _________ is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic.
a) Cyber-replication
b) Mimicking
c) Website-Duplication
d) Pharming

Answer: a
Explanation: The technique and approach through which cyber-crooks develop fake web pages and sites to trick people for gaining personal details such as login ID and password as well as personal information, is known as pharming.

6. RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the hard drive.
a) True
b) False

Answer: a
Explanation: It is a special kind of malware that looks for sensitive data that you’ve stored in your hard drive. RAM-scraping is one of those kinds.

7. When you book online tickets by swiping your card, the details of the card gets stored in ______
a) database system
b) point-of-sale system
c) servers
d) hard drives

Answer: b
Explanation: The point-of-sale system is a system where the retailer or company stores financial records and card details of the e-commerce system or online business transactions.

8. Point-of-sale intrusion does not deal with financial details and credit card information.
a) True
b) False

Answer: b
Explanation: Point-of-sale intrusion is an attack that deals with financial details and credit card information, where the payment system of the company or retailer is compromised and left with customer’s financial information at risk.

9. _______ are deadly exploits where the vulnerability is known and found by cyber-criminals but not known and fixed by the owner of that application or company.
a) Unknown attacks
b) Secret attacks
c) Elite exploits
d) Zero-day exploits

Answer: d
Explanation: Zero-day exploits are used to attack a system as soon as cyber-criminals came to know about the weakness or the day the weaknesses are discovered in a system. Hackers exploit these types of vulnerabilities before the creator releases the patch or fix the issue.

10. Zero-day exploits are also called __________
a) zero-day attacks
b) hidden attacks
c) un-patched attacks
d) un-fixed exploits

Answer: a
Explanation: Zero-day exploits are also called zero-day attacks where the vulnerability is known and found by cyber-criminals or ethical hackers but not known and fixed by the creator/owner of that application or company.