Cyber-Security-Quiz-4

Check your Knowledge with a Cyber Security Quiz

Cyber Security is a big issue these days. All businesses need a certain amount of Cyber Security knowledge to protect themselves from hackers and other cyber attacks. In addition, it involves a lot of information. It is hard to keep track of all the latest threats and ensure that your business is prepared. This Cyber Security Quiz will test your knowledge around some of the biggest cyber threats of today.Here are 20 questions that you can do when you’re working on your Cyber Security Quiz. Read them and you’ll be ready to handle anything that comes your way.

Let’s discuss the most essential cyber security quiz questions.

Because ……….. software can block suspicious software in real-time, it has an advantage over such established anti-virus detection techniques as fingerprinting or heuristics.

Fill the blank with an appropriate answer

The term “computer virus” is attributed to __.

Select one:
a. Herman Hollerith
b. Fred Cohen
c. Charles Babbage
d. Albert Einstein

Two types of perimeter monitoring software are ……. monitoring and egress monitoring.

Fill the blank with an appropriate answer

__ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions.

Select one:
a. Fingerprint-based scanners
b. Behavior-blocking software
c. Generic decryption technology
d. Heuristic scanners

Computer viruses first appeared in the early __.

Select one:
a. 1960s
b. 1970s
c. 1980s
d. 1990s

A bot propagates itself and activates itself, whereas a worm is initially controlled from some central facility.

Select one:
True
False

A computer ……. is a piece of software that can “infect” other programs or any type of executable content and tries to replicate itself.

Fill the blank with an appropriate answer

A virus that attaches to an executable program can do anything that the program is permitted to do.

Select one:
True
False

The ideal solution to the threat of malware is __.

Select one:
a. identification
b. removal
c. detection
d. prevention

A __________ attack is a bot attack on a computer system or network that causes a loss of service to users. 

Select one: 
a. spam 
b. phishing 
c. DDoS 
d. sniff

Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.

Select one:
True
False

Sometimes referred to as the …….., the Infection Mechan is the means by which a virus spreads or propagates.

Fill the blank with an appropriate answer

A ………….. is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user’s knowledge or consent.

Fill the blank with an appropriate answer

During the __ the virus is idle.

Select one:
a. dormant phase
b. propagation phase
c. triggering phase
d. execution phase

__ are used to send large volumes of unwanted e-mail.

Select one:
a. Rootkits
b. Spammer programs
c. Downloaders
d. Auto-rooters

Sometimes known as a …………., the logic bomb is the event or condition that determines when the payload is activated or delivered.

Fill the blank with an appropriate answer

Every bot has a distinct IP address.

Select one:
True
False

A Trojan horse is an apparently useful program containing hidden code that, when invoked, performs some harmful function.

Select one:
True
False

A logic bomb is the event or condition that determines when the payload is activated or delivered.

Select one:
True
False

E-mail is a common method for spreading macro viruses.

Select one:
True
False

Answers

  1. dynamic analysis
  2. b
  3. Ingress
  4. b
  5. c
  6. False
  7. Virus
  8. True
  9. d
  10. c
  11. False
  12. Infection Mechan
  13. drive by downloa
  14. a
  15. b
  16. logic bomb
  17. True
  18. True
  19. True
  20. True