Cyber Security: Application of Technologies to Protect Systems and Data from Cyber Attacks

This is a computer science engineering quiz on cyber security, which includes the basics of cyber security, the importance of cyber security, how we can use cyber security to protect our system and data from cyber-attacks.

download.jpg
Start Quiz

The full form of Malware is ________

Malfunctioned Software Multipurpose Software Malicious Software Malfunctioning of Security

Who deploy Malwares to a system or network?

Criminal organizations, Black hat hackers, malware developers, cyber-terrorists Criminal organizations, White hat hackers, malware developers, cyber-terrorists Criminal organizations, Black hat hackers, software developers, cyber-terrorists Criminal organizations, gray hat hackers, Malware developers, Penetration testers

_____________ is a code injecting method used for attacking the database of a system / website.

HTML injection SQL Injection Malicious code injection XML Injection

XSS is abbreviated as __________

Extreme Secure Scripting Cross Site Security X Site Scripting Cross Site Scripting

This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?

SQL injection HTML Injection Cross Site Scripting (XSS) Cross Site Request Forgery (XSRF)

When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.

Database crash attack DoS (Denial of Service) attack Data overflow Attack Buffer Overflow attack

Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________

Session Hijacking Session Fixation Cookie stuffing Session Spying

Which of this is an example of physical hacking?

Remote Unauthorised access Inserting malware loaded USB to a system SQL Injection on SQL vulnerable site DDoS (Distributed Denial of Service) attack

Which of them is not a wireless attack?

Eavesdropping MAC Spoofing Wireless Hijacking Phishing

An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

Cyber-crime Cyber Attack System hijacking Digital crime

Which method of hacking will record all your keystrokes?

Keyhijacking Keyjacking Keylogging Keyboard monitoring

_________ are the special type of programs used for recording and tracking user’s keystroke.

Keylogger Trojans Virus Worms

These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.

Malware Remote Access Trojans Keyloggers Spyware

Stuxnet is a _________

Worm Virus Trojan Antivirus

___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain.

Cyber-warfare Cyber campaign Cyber-terrorism Cyber attack
Quiz/Test Summary
Title: Cyber Security: Application of Technologies to Protect Systems and Data from Cyber Attacks
Questions: 15
Contributed by:
james