Cyber Commando Test Series 2025 Page 1 of 50 What is Cyber Security? Cyber Security provides security against malware Cyber Security provides security against cyber-terrorists Cyber Security protects a system from cyber attacks All of the mentioned Page 2 of 50 Which of the following is a type of cyber security? Cloud Security Network Security Application Security All of the above Page 3 of 50 Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information? Cyber attack Computer security Cryptography Digital hacking Page 4 of 50 Who is the father of computer security? Bob Thomas August Kerckhoffs Robert Charles Page 5 of 50 What does cyber security protect? Cyber security protects criminals Cyber security protects internet-connected systems Cyber security protects hackers None of the mentioned Page 6 of 50 What are the features of cyber security? Compliance Defense against internal threats Threat Prevention All of the above Page 7 of 50 Which of the following is a component of cyber security? Attacks Internet Of Things Database Attacks Page 8 of 50 Which of the following is not a cybercrime? Denial of Service Man in the Middle Malware AES Page 9 of 50 Which of the following is an objective of network security? Confidentiality Integrity Availability All of the above Page 10 of 50 Which of the following is a type of cyber attack? Phishing SQL Injections Password Attack All of the above Page 11 of 50 Which of the following can diminish the chance of data leakage? Authentication Cryptography Chorography Steganography Page 12 of 50 Which of the following is a Stuxnet? Trojan Antivirus Worm Virus Page 13 of 50 Which of the following is the least strong security encryption standard? WEP WPA WPA2 WPA3 Page 14 of 50 Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack? worms virus programs botnets Page 15 of 50 Which of the following is not an email-related hacking tool? Sendinc Mail PassView Email Finder Pro Mail Password Page 16 of 50 Which of the following term refers to a group of hackers who are both white and black hat? Yellow Hat hackers Grey Hat hackers Red Hat Hackers White-Black Hat Hackers Page 17 of 50 Which of the following online service’s privacy cannot be protected using Tor? Relay chats Login using ID Instant messaging Browsing data Page 18 of 50 Which of the following is not a step followed by cyber-criminals in data breaching? Fixing the bugs Attack the system Research and info-gathering Exfiltration Page 19 of 50 What is the existence of weakness in a system or network is known as? Threat Vulnerability Exploit Attack Page 20 of 50 Where did the term “hacker” originate? Bell’s Lab Harvard University New York University MIT Page 21 of 50 IT security in any firm or organization is maintained and handled by ____________________ IT Security Engineer Security Auditor CEO of the organization Software Security Specialist Page 22 of 50 Which of the following is defined as an attempt to harm, damage or cause threat to a system or network? Cyber Attack System hijacking Threats Digital crime Page 23 of 50 Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user? web pages websites emails ip tracker Page 24 of 50 Which of the following is not a type of peer-to-peer cyber-crime? Phishing Credit card details leak in the deep web Injecting Trojans to a target victim MiTM Page 25 of 50 Which of the following actions compromise cyber security? Exploit Threat Attack Vulnerability Page 26 of 50 Which of the following act violates cyber security? Vulnerability Threat Attack Exploit Page 27 of 50 Which of the following is not an advantage of cyber security? Protects system against viruses Gives privacy to users Minimizes computer freezing and crashes Makes the system slower Page 28 of 50 The full form of Malware is ________ Malfunctioning of Security Malicious Software Multipurpose Software Malfunctioned Software Page 29 of 50 XSS is abbreviated as __________ Cross Site Scripting X Site Scripting Cross Site Security Extreme Secure Scripting Page 30 of 50 Which of this is an example of physical hacking? Remote Unauthorised access Inserting malware loaded USB to a system SQL Injection on SQL vulnerable site DDoS (Distributed Denial of Service) attack Page 31 of 50 Which of them is not a wireless attack? Phishing Wireless Hijacking MAC Spoofing Eavesdropping Page 32 of 50 Which method of hacking will record all your keystrokes? Keyhijacking Keyjacking Keylogging Keyboard monitoring Page 33 of 50 Which of the following is not a type of cyber crime? Installing antivirus for protection Damage to data and systems Forgery Data theft Page 34 of 50 Cyber-laws are incorporated for punishing all criminals only. True False Page 35 of 50 Cyber-crime can be categorized into ________ types. 6 2 4 8 Page 36 of 50 In which year India’s IT Act came into existence? 2000 2001 2008 2023 Page 37 of 50 Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. 65 65-D 67 67B Page 38 of 50 In which year the Indian IT Act, 2000 got updated? 2006 2008 2009 2023 Page 39 of 50 Cracking digital identity of any individual or doing identity theft, comes under ____of IT Act. Section 65 Section 66A Section 66B Section 66C Page 40 of 50 _______ is a tool which can detect registry issues in an operating system. LANguard Network Security Scanner Maltego Ettercap Network Stumbler Page 41 of 50 ________ is a debugger and exploration tool. Netdog Netcat Tcpdump BackTrack Page 42 of 50 ________ is a popular command-line packet analyser. Tcpdump Metasploit Snort Wireshark Page 43 of 50 _________ framework made cracking of vulnerabilities easy like point and click. .Net Metasploit Zeus Ettercap Page 44 of 50 Wireshark is a ____________ tool. network protocol analysis network connection security connection analysis defending malicious packet-filtering Page 45 of 50 Which of the below-mentioned tool is used for Wi-Fi hacking? Wireshark Nessus Aircrack-ng Snort Page 46 of 50 Which of the following attack-based checks WebInspect cannot do? injecting shell code parameter injection directory traversal cross-site scripting Page 47 of 50 Risk and vulnerabilities are the same things. True False Page 48 of 50 There are ________ types of exploit. 2 Type 3 Type 4 Type 8 Type Page 49 of 50 Security bugs are also known as _______ security defect security problems system defect software error Page 50 of 50 A zero-day vulnerability is a type of vulnerability unknown to the creator or vendor of the system or software. True Fales Please provide your contact information to proceed.Email Address *First Name *Phone *Consent *Yes, I agree with the privacy policy and terms and conditions.Start Quiz