Cyber Attacks MCQ Questions And Answers
Cyber Attacks MCQs : This section focuses on "Cyber Attacks" in Cyber Security. These Multiple Choice Questions (MCQ) should be practiced to improve the Cyber Security skills required for various interviews (campus interview, walk-in interview, company interview), placements, entrance exams and other competitive examinations.
1. A cyberattack is any offensive maneuver that targets?
A. computer information systems
B. infrastructures
C. computer networks
D. All of the above
View Answer
Ans : D
Explanation: A cyberattack is any offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.
2. A product that facilitates a cyberattack is sometimes called a ?
A. weapon
B. cyberweapon
C. c-weapon
D. cyberwarfare
View Answer
Ans : B
Explanation: A product that facilitates a cyberattack is sometimes called a cyberweapon.
3. Which of the following is designed to perform legitimate tasks but it also performs unknown and unwanted activity?
A. Viruses
B. Worms
C. Trojan horses
D. Semantic attack
View Answer
Ans : C
Explanation: A Trojan horse is designed to perform legitimate tasks but it also performs unknown and unwanted activity.
4. A worm does not need another file or program to copy itself; it is a self-sustaining running program.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : A
Explanation: True, A worm does not need another file or program to copy itself; it is a self-sustaining running program.
5. which factor is a measure of the actual damage achieved by an attack?
A. Cyberwarfare
B. Spectacularity
C. Vulnerability
D. All of the above
View Answer
Ans : B
Explanation: The spectacularity factor is a measure of the actual damage achieved by an attack, meaning that the attack creates direct losses (usually loss of availability or loss of income) and garners negative publicity.
6. Which attack attempts to alter system resources or affect their operation?
A. active attack
B. passive attack
C. dual attack
D. third-party attack
View Answer
Ans : A
Explanation: An active attack attempts to alter system resources or affect their operation
7. The full form of Malware is ________
A. Malfunctioned Software
B. Multipurpose Software
C. Malicious Software
D. Malfunctioning of Security
View Answer
Ans : C
Explanation: Different types of harmful software and programs that can pose threats to a system, network or anything related to cyberspace are termed as Malware. Examples of some common malware are Virus, Trojans, Ransomware, spyware, worms, rootkits etc.
8. _____________ is a code injecting method used for attacking the database of a system / website.
A. HTML injection
B. SQL Injection
C. Malicious code injection
D. XML Injection
View Answer
Ans : B
Explanation: SQLi (Structured Query Language Injection) is a popular attack where SQL code is targeted or injected; for breaking the web application having SQL vulnerabilities. This allows the attacker to run malicious code and take access to the database of that server
9. Compromising a users session for exploiting the users data and do malicious activities or misuse users credentials is called ___________
A. Session Fixation
B. Cookie stuffing
C. Session Spying
D. Session Hijacking
View Answer
Ans : D
Explanation: Using session hijacking, which is popularly known as cookie hijacking is an exploitation method for compromising the users session for gaining unauthorized access to users information.
10. A cyberattack may steal, alter, or destroy a specified target by hacking into a susceptible system
A. Yes
B. No
C. Can be yes or no
D. Can not say
View Answer
Ans : A
Explanation: Yes, A cyberattack may steal, alter, or destroy a specified target by hacking into a susceptible system
Discussion