MCQ Mojo
access_time
menu
Quiz
Web Stories
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
Quiz
Quiz
/
Ethical Hacking Class 12 MCQ Questions With Answers
1.
The main advantage of asymmetric cryptography is that it offers better security because it uses two different keys.
True
False
2.
Create single or multiple files, view contents of a file
cd
cat
chmod
xdg-open
3.
Vulnerability without a patch
PII
Zero Day
Hack Value
Daisy Chaining
4.
A watering hole attack is when an attacker will typically what?
Target websites associated with water companies
Target drinks companies
Infect websites visited by the target victims or particular groups
Infect a user's computer directly
5.
Which of these backups will take the longest to complete?
full backup
differential backup
incremental backup
6.
The Copyright, Designs and Patents Act 1988 is designed to protect all types of IP. What does IP stand for?
Individual Patents
Intellectual Patents
Individual Property
Intellectual Property
7.
A Dictionary Attack is what?
Throwing dictionaries at a person
Using all the words in the Collins English Dictionary to guess passwords
Using a compiled list of common passwords with software to try them all
Trying all possible passwords
8.
Which of these is traditionally known as an Ethical Hacker?
White hat hacker
Grey hat hacker
Black hat hacker
9.
NAC helps with mitigation of Zero-day attacks
True
False
10.
The Internet of Things will connect inanimate objects to the network with intelligent sensors.
True
False
11.
This command executes a sequence of commands that target a specific vulnerability found in a system or application?
Exploit
Overflow
Injection
Options
12.
The Police and Justice Act 2006 modifies what other Act of Parliament?
Data Protection Act 1998
Copyright, Design and Patents Act 1988
Computer Misuse Act 1990
Regulation of Investigatory Powers Act 2000
13.
Are smartphones classed as IoT
True
False
14.
When a flaw in a computer system is fixed this is called a _________.
Patch
buggy
Both A & B
None of these
15.
In computing, unencrypted data is also known as ________.
Ciphertext
Plaintext
Encrypted text
Both A & B
16.
What is the most basic form of defence against a cyber attack that stops unusual network connections?
Antivirus
Encryption
Firewalls
Passwords
Report Question
Previous
Next
warning
Submit
access_time
Time
Report Question
A bunch of text
Support mcqmojo.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page