This set of Cyber Security Interview Questions and Answers for freshers focuses on “Hacking Terminologies – 2”.
1. _________ are a specific section of any virus or malware that performs illicit activities in a system.
a) Malicious programs
Explanation: Payloads are parts of a virus that helps in performing malicious activities such as destroying information, blocking network traffic, compromising data, steal and spy for sensitive information.
2. ____________ is a scenario when information is accessed without authorization.
a) Data infiltration
b) Data Hack
c) Information compromise
d) Data Breach
Explanation: Data breach is the term used when the cyber-security incident takes place where sensitive information is accessed without authority.
3. ____________ is an attempt to steal, spy, damage or destroy computer systems, networks or their associated information.
b) Cyber attack
c) Digital hacking
d) Computer security
Explanation: Cyber attack can be defined as an attempt to steal, spy, damage or destroy different components of cyberspace such as computer systems, associated peripherals, network systems, and information.
4. ___________ is a device which secretly collects data from credit / debit cards.
a) Card Skimmer
b) Data Stealer
c) Card Copier
d) Card cloner
Explanation: Card skimmer is hardware that is installed and setup in ATMs secretly so that when any user will swipe or insert their card in the ATM, the skimmer will fetch all information from the magnetic strip.
5. _____________ is a technique used when artificial clicks are made which increases revenue because of pay-per-click.
Explanation: Clickfraud is an attack technique used when artificial clicks get generated to increase the revenue in ad-campaigns online.
6. __________ is the practice implemented to spy someone using technology for gathering sensitive information.
a) Cyber espionage
c) Digital Spying
Explanation: Cyber espionage is a practice done by both ethical and non-ethical hackers to spy on others for gathering confidential information.
7. ____________ is the way or technique through which majority of the malware gets installed in our system.
a) Drive-by click
b) Drive-by redirection
c) Drive-by download
d) Drive-by injecting USB devices
Explanation: An accidental yet dangerous action that takes place in the cyberspace which helps attackers place their malware into the victim’s system. This technique is called Drive-by download.
8. ______ is the term used for toolkits that are purchased and used for targeting different exploits.
a) Exploit bag
b) Exploit set
c) Exploit Toolkit
d) Exploit pack
Explanation: Exploit pack or Exploit kit is the term used for toolkits that are purchased and used for targeting different exploits.
9. Identity theft is the term used when a cyber-thief uses anybody’s personal information to impersonate the victim for their benefit.
Explanation: Identity theft is the term used when a cyber-thief uses anybody’s personal information to impersonate the victim for their benefit. In this type of cyber-crime, information like social security number, personal details, and images, hobbies and passion details, driving license number and address details are compromised.
10. _________ is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic.
Explanation: The technique and approach through which cyber-crooks develop fake web pages and sites to trick people for gaining personal details such as login ID and password as well as personal information, is known as pharming.
11. RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the hard drive.
Explanation: It is a special kind of malware that looks for sensitive data that you’ve stored in your hard drive. RAM-scraping is one of those kinds.
12. When you book online tickets by swiping your card, the details of the card gets stored in ______
a) database system
b) point-of-sale system
d) hard drives
Explanation: The point-of-sale system is a system where the retailer or company stores financial records and card details of the e-commerce system or online business transactions.
13. Point-of-sale intrusion does not deal with financial details and credit card information.
Explanation: Point-of-sale intrusion is an attack that deals with financial details and credit card information, where the payment system of the company or retailer is compromised and left with customer’s financial information at risk.
14. _______ are deadly exploits where the vulnerability is known and found by cyber-criminals but not known and fixed by the owner of that application or company.
a) Unknown attacks
b) Secret attacks
c) Elite exploits
d) Zero-day exploits
Explanation: Zero-day exploits are used to attack a system as soon as cyber-criminals came to know about the weakness or the day the weaknesses are discovered in a system. Hackers exploit these types of vulnerabilities before the creator releases the patch or fix the issue.
15. Zero-day exploits are also called __________
a) zero-day attacks
b) hidden attacks
c) un-patched attacks
d) un-fixed exploits
Explanation: Zero-day exploits are also called zero-day attacks where the vulnerability is known and found by cyber-criminals or ethical hackers but not known and fixed by the creator/owner of that application or company.
Sanfoundry Global Education & Learning Series – Cyber Security.
To practice all areas of Cyber Security for Interviews, here is complete set of 1000+ Multiple Choice Questions and Answers.