Cyber Security — Set 4
Technology · साइबर सुरक्षा · Questions 31–40 of 50
What is the primary function of an Antivirus software?
Correct Answer: C. To detect and remove malicious software
Antivirus software scans files and programs for known signatures of malware. Modern versions also use heuristic analysis to detect new and unknown threats based on their behavior. It is a fundamental component of personal computer security.
What is 'Data Sovereignty'?
Correct Answer: D. Data being subject to the laws of the country where it is located
Data sovereignty is a critical issue for cloud computing and international business. It means that the legal protections and access rights for data depend on geographical location. Many organizations choose local data centers to comply with national sovereignty laws.
In cyber security, what does 'CIA Triad' stand for?
Correct Answer: C. Confidentiality, Integrity, and Availability
The CIA Triad is a model designed to guide policies for information security within an organization. Confidentiality ensures privacy, Integrity ensures data accuracy, and Availability ensures data is accessible when needed. Balancing these three elements is a core challenge for security professionals.
Which of these is a common method used by hackers to crack passwords by testing common words?
Correct Answer: D. Dictionary Attack
A dictionary attack uses a list of common words, names, and variations to guess a password. It is much faster than a pure brute force attack that tries every possible character combination. Using random strings of characters makes this type of attack ineffective.
What is the role of a 'Proxy Server' in internet security?
Correct Answer: A. To act as an intermediary between a user and the internet
A proxy server can hide a user's IP address from the websites they visit. It can also be used to filter content and speed up access by caching frequently used data. Organizations often use proxies to monitor employee web usage.
What is 'Bio-hacking' in a security context?
Correct Answer: B. Modifying one's own body with electronic implants
Bio-hacking often involves sub-dermal implants like RFID chips that can be used for authentication or access control. While it sounds futuristic, it raises significant ethical and security concerns. Some enthusiasts use it to interact with smart home devices directly.
What is 'White Box Testing' in software security?
Correct Answer: B. Testing software with full knowledge of the internal code and structure
White box testing allows a security analyst to examine the code line-by-line for potential vulnerabilities. This is more thorough than 'black box testing,' where the analyst only sees the external interface. It is a critical part of the software development lifecycle.
Which of these is a common 'Man-in-the-Middle' (MitM) attack vector?
Correct Answer: A. Unsecured public Wi-Fi
In a MitM attack, the hacker secretly relays and possibly alters the communication between two parties. Unsecured public Wi-Fi in cafes or airports is a prime location for such interceptions. Using a VPN is the best defense when connecting to public networks.
What is 'Digital Forensics'?
Correct Answer: B. The process of uncovering and interpreting data from digital devices after a crime
Digital forensics experts use specialized tools to recover deleted files and track user activity. Their findings are often used as evidence in legal proceedings. This field is essential for investigating financial fraud, data breaches, and other cybercrimes.
What is the 'Dark Web'?
Correct Answer: B. A part of the internet that is hidden and requires specific software to access
The Dark Web is often accessed using the Tor browser to maintain high levels of anonymity. While used for legitimate privacy reasons, it is also a hub for illegal markets and forums. It is distinct from the 'Deep Web,' which simply refers to non-indexed web pages.