Cyber Crime MCQs | Cyber Crime Multiple Choice Questions and Answers

(1) Why would a hacker use a proxy server?
[A] To create a stronger connection with the target
[B] To create a ghost server on the network
[C] To obtain a remote access connection
[D] To hide malicious activity on the network
Answer: To hide malicious activity on the network
(2) What type of symmetric key algorithm using a streaming cipher to encrypt information?
[A] RC4
[B] Blowfish
[C] SHA
[D] MD5
Answer: RC4

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

Article and Schedule Quiz Start Test!
(3) Which of the following is not a factor in securing the environment against an attack on security?
[A] The education of the attacker
[B] The system configuration
[C] The network architecture
[D] The business strategy of the company
Answer: The business strategy of the company
(4) To hide information inside a picture, what technology is used?
[A] Rootkits
[B] Bitmapping
[C] Steganography
[D] None of the above
Answer: Steganography
(5) Which phase of hacking performs actual attack on a network or system?
[A] Reconnaissance
[B] Maintaining Access
[C] Scanning
[D] Gaining Access
Answer: Maintaining Access
(6) Which of the following is not a typical characteristic of an ethical hacker?
[A] Excellent knowledge of Windows
[B] Understands the process of exploiting network vulnerabilities
[C] Patience, persistence and perseverance
[D] Has the highest level of security for the organization
Answer: Has the highest level of security for the organization
(7) What type of rootkit will patch, hook, or replace the version of system call in order to hide information?
[A] Library level rootkits
[B] Kernel level rootkits
[C] System level rootkits
[D] None Of The Above
Answer: Library level rootkits
(8) What are some of the most common vulnerabilities that exist in a network or system?
[A] Changing manufacturer, or recommended, settings of a newly installed application
[B] Additional unused features on commercial software packages
[C] Utilizing open source application code
[D] Balancing security concerns with functionality and ease of use of a system
Answer: Additional unused features on commercial software packages
(9) What is the sequence of a TCP connection?
[A] SYN-ACK-FIN
[B] SYN-SYN ACK-ACK
[C] SYN-ACK
[D] None of the Above
Answer: SYN-SYN ACK-ACK
(10) Which ports should be blocked to prevent null session enumeration?
[A] Ports 120 and 445
[B] Ports 135 and 136
[C] Ports 110 and 137
[D] Ports 135 and 139
Answer: Ports 135 and 139
(11) Why would a ping sweep be used?
[A] To identify live systems
[B] To locate live systems
[C] To identify open ports
[D] To locate firewalls
Answer: To identify live systems
(12) What are the port states determined by Nmap?
[A] Active, inactive, standby
[B] Open, half-open, closed
[C] Open, filtered, unfiltered
[D] Active, closed, unused
Answer: Open, filtered, unfiltered
(13) Which of the following will allow footprinting to be conducted without detection?
[A] PingSweep
[B] Traceroute
[C] War Dialers
[D] ARIN
Answer: ARIN
(14) Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________.
[A] Cracking
[B] Analysis
[C] Hacktivism
[D] Exploitation
Answer: Hacktivism
(15) What is the most important activity in system hacking?
[A] Information gathering
[B] Cracking passwords
[C] Escalating privileges
[D] Covering tracks
Answer: Cracking passwords
(16) Sniffing is used to perform ______________ fingerprinting.
[A] Passive stack
[B] Active stack
[C] Passive banner grabbing
[D] None of the above
Answer: Passive stack
(17) Phishing is a form of ____________________.
[A] Spamming
[B] Identify Theft
[C] Impersonation
[D] Scanning
Answer: Impersonation
(18) Why would HTTP Tunneling be used?
[A] To identify proxy servers
[B] Web activity is not scanned
[C] To bypass a firewall
[D] HTTP is a easy protocol to work with
Answer: To bypass a firewall
(19) Which Nmap scan is does not completely open a TCP connection?
[A] SYN stealth scan
[B] TCP connect
[C] XMAS tree scan
[D] ACK scan
Answer: SYN stealth scan
(20) Services running on a system are determined by _____________.
[A] The system’s IP address
[B] The Active Directory
[C] The system’s network name
[D] The port assigned
Answer: The port assigned

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!