Google News
logo
Cyber Security - Quiz(MCQ)
A)
MiTM
B)
Browser Hijacker
C)
Cookie-stealing
D)
Browser hacking

Correct Answer : Option (B) :   Browser Hijacker


Explanation : Browser hijacking is a technique that takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference.

A)
Adware
B)
Spyware
C)
Ransomware
D)
Shareware

Correct Answer : Option (C) :   Ransomware


Explanation : Ransomware has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization; where the ransomware compromise the system by encrypting all files and ask for some ransom in order to unlock or decrypt all files.

A)
Keeping backup of
B)
Not saving
C)
Deleting all
D)
Keeping in pen drive

Correct Answer : Option (A) :   Keeping backup of


Explanation : Keeping a secured backup of the important and precious file is a solution to prevent your files from ransomware. The backup should have to be made in some secured cloud storage of any other location (server) in an encrypted form.

A)
item licensing
B)
code-licensing
C)
product licensing
D)
algorithm-licensing

Correct Answer : Option (C) :   product licensing


Explanation : Product licensing is the technique to obtain permission from a firm or organization for using, manufacturing & selling one or more products within a definite market area. This is done by the company for security reasons and usually takes a royal fee/amount from its users.

A)
work-load
B)
employee access
C)
admin permission
D)
installing unwanted apps

Correct Answer : Option (B) :   employee access


Explanation : It is important to limit employee access to all data and information as well as limit the authority for installing software. Otherwise, any employee with illicit intention may install programs that are either pirated version or may cause damage to the internal corporate network.

A)
strangers, antivirus
B)
unknown, antivirus
C)
unknown, firewalls
D)
strangers, keyloggers

Correct Answer : Option (D) :   strangers, keyloggers


Explanation : One must isolate payment systems and payment processes from those computers that you think are used by strangers or may contain keyloggers. Otherwise, your card details and PIN may get compromised.

A)
Open-Design
B)
Fail-safe Defaults
C)
Least privilege
D)
None of the Above

Correct Answer : Option (B) :   Fail-safe Defaults


Explanation : The fail-safe Defaults principle of cyber security restricts how privileges are initiated whenever a subject or object is created. In cases where the privileges, rights, access or some other security-related attribute is not granted explicitly, it should also not granted access to the object.

A)
Least privileges
B)
Open Design
C)
Separation of Privileges
D)
Noe of the Above

Correct Answer : Option (A) :   Least privileges


Explanation : The example given in the above question refers to the least privileges principle of cyber security. The least privileges principle of cyber security states that no rights, access to the system should be given to any of the employees of the organization unless he/she needs those particular rights, access in order to complete the given task. In short, we can say that its primary work is to restrict or control the assignment of rights to the employees.

A)
CSS
B)
DVD Player
C)
Only A
D)
Both A and B

Correct Answer : Option (D) :   Both A and B


Explanation : The Open Design is a kind of open design artifact whose documentation is publically available, which means anyone can use it, study, modify, distribute, and make the prototypes. However, the CSS (or Content Scrambling System) and DVD Player are both examples of open design.

A)
Work Factor
B)
Psychological Acceptability
C)
Compromise Recording
D)
Least Common Mechanism

Correct Answer : Option (B) :   Compromise recording


Explanation : The principle called compromise factor states that in some cases, it is more beneficial to records or document the details of the intrusion that to adopt more efficient measures to avoid it.