Google News
logo
Cyber Security - Quiz(MCQ)
A)
Work factor
B)
Least privileges
C)
Least common mechanism
D)
Security through obscurity

Correct Answer : Option (D) :   Security through obscurity


Explanation : The "Security through obscurity" is an approach which just opposite to the Open Design principle.

A)
40
B)
80
C)
100
D)
160

Correct Answer : Option (B) :   80


Explanation : The default port number used by the apache and several other web servers is 80.

A)
IP
B)
Hex
C)
URL
D)
Binary

Correct Answer : Option (C) :   URL


Explanation : DNS stands for the Domain name system; the main work of a DNS is to translate the Domain name into an IP address that is understandable to the computers.

A)
Root
B)
Guest
C)
Client
D)
Administrative

Correct Answer : Option (D) :   Administrative


Explanation : If a user uses the Root account of the UNIX operating system, he can carry out all types of administrative functions because it provides all necessary privileges and rights to a user.

A)
Kevin Poulsen
B)
Kevin Mitnick
C)
John Draper
D)
John von Neumann

Correct Answer : Option (A) :   Kevin Poulsen


Explanation : The SIPRNET (or Advanced Research Project Agency Network) system was first hacked by Kevin Poulsen as he breaks into the Pentagon network.

A)
Cracking
B)
Phreaking
C)
Spraining
D)
Phishing

Correct Answer : Option (B) :   Phreaking


Explanation : Phreaking is considered as one of the oldest phone hacking techniques used by hackers to make free calls.

A)
DEFCON
B)
DEVON
C)
OSCON
D)
SECTION

Correct Answer : Option (A) :   DEFCON


Explanation : DEFCON is one of the most popular and largest Hacker's as well as the security consultant's conference. It is always held once a year in Las Vegas, Nevada, where hackers of all types (such as black hats, gray hats, and white hat hackers), government agents as well as security professionals from around the world attend the conference attends this meeting.

A)
Misconfiguration in OS
B)
Misconfiguration in networks
C)
Using network vulnerabilities
D)

Correct Answer : Option (C) :   Using network vulnerabilities


Explanation : Websites get hosted on web servers. Web servers are actually computers running that makes us available & accessible files (web pages) through the internet. Various ways that can help compromise a web server are a misconfiguration of network or OS, bugs in web server’s OS etc.

A)
Brute-forcing Admin Password
B)
Fetching credentials through MiTM
C)
DNS Attack through cache poisoning
D)
IP address spoofing

Correct Answer : Option (D) :   IP address spoofing


Explanation : Various ways which can help a hacker deface the web server. These are by fetching credentials through MiTM, brute-forcing administrator password, DNS attack through cache poisoning, FTP server intrusion and many more.

A)
Internet Information Server
B)
Interconnected Information Server
C)
Internet Information Services
D)
Interconnected Information Services

Correct Answer : Option (C) :   Internet Information Services


Explanation : Web servers are actually computers running that makes us available & accessible files (web pages) through the internet. The most widely used web server platform is the IIS (Internet Information Services).