JOIN ADRE 2.0 Telegram Group

Cyber Crime MCQs | Cyber Crime Short Questions and Answers

Questions
41 Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
A 65
B 65-D
C 67
D 70

Answer: 65
42 What type of attack uses a fraudulent server with a relay address?
A NTLM
B MITM
C NetBIOS
D SMB

Answer: MITM
Advertisement
Article and Schedule Quiz Start Test!

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

43 What port is used to connect to the Active Directory in Windows 2000?
A 80
B 445
C 139
D 389

Answer: 389
44 Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.
A Local networking
B Social engineering
C Physical entry
D Remote networking

Answer: Local networking
45 Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?
A Electronic Communications Interception of Oral Communications
B 18 U.S.C. § 1029
C Cyber Security Enhancement Act 2002
D 18 U.S.C. § 1030

Answer: Cyber Security Enhancement Act 2002
46 What is the proper command to perform an Nmap XMAS scan every 15seconds?
A nmap -sX -sneaky
B nmap -sX -paranoid
C nmap -sX -aggressive
D nmap -sX -polite

Answer: nmap -sX -sneaky
47 What is the purpose of a Denial of Service attack?
A Exploit a weakness in the TCP/IP stack
B To execute a Trojan on a system
C To overload a system so it is no longer operational
D To shutdown services by turning them off

Answer: To overload a system so it is no longer operational
48 What tool can be used to perform SNMP enumeration?
A DNSlookup
B Whois
C Nslookup
D IP Network Browser

Answer: IP Network Browser
49 The first phase of hacking an IT system is compromise of which foundation of security?
A Availability
B Confidentiality
C Integrity
D None of the Above

Answer: Confidentiality
50 How is IP address spoofing detected?
A Installing and configuring a IDS that can read the IP header
B Comparing the TTL values of the actual and spoofed addresses
C Implementing a firewall to the network
D Identify all TCP sessions that are initiated but does not complete successfully

Answer: Comparing the TTL values of the actual and spoofed addresses
51 A packet with no flags set is which type of scan?
A TCP
B XMAS
C IDLE
D NULL

Answer: NULL
52 What protocol is the Active Directory database based on?
A LDAP
B TCP
C SQL
D HTTP

Answer: LDAP
53 What are the types of scanning?
A Port, network, and services
B Network, vulnerability, and port
C Passive, active, and interactive
D Server, client, and network

Answer: Network, vulnerability, and port
54 What is the best statement for taking advantage of a weakness in the security of an IT system?
A Threat
B Attack
C Exploit
D Vulnerability

Answer: Exploit
55 Having individuals provide personal information to obtain a free offer provided through the Internet is considered what type of social engineering?
A Web-based
B Human-based
C User-based
D Computer-based

Answer: Computer-based
56 Which form of encryption does WPA use?
A Shared key
B LEAP
C TKIP
D None of the above

Answer: TKIP

ADRE 2.0 FULL LENGTH MOCK TEST

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!
Advertisement
Assam Direct Recruitment Test Series