SV
StudyVirus
Get our free app!Download Free

Cyber Security — Set 5

Technology · साइबर सुरक्षा · Questions 4150 of 50

00
0/10
1

What does 'SQL Injection' target?

💡

Correct Answer: B. Databases

The correct answer is 'Databases'. SQL injection is a technique where an attacker inserts malicious code into a database query. This can allow them to view, modify, or delete sensitive data from the database. It is one of the most common web application vulnerabilities.

2

What is 'Ransomware' primarily used for?

💡

Correct Answer: A. Extorting money from victims

The correct answer is 'Extorting money from victims'. Ransomware locks or encrypts files and demands a ransom for the decryption key. It has become a major global threat to healthcare systems and government agencies. Prevention includes keeping regular backups and not opening suspicious attachments.

3

What is the primary function of a 'Digital Certificate'?

💡

Correct Answer: B. To verify the identity of a website or user

Digital certificates are used in public key infrastructure to link a public key to an identity. They are essential for secure communication over the web using SSL/TLS. They are issued by trusted third parties called Certificate Authorities.

4

Which of these is a sign of a potential phishing attempt?

💡

Correct Answer: B. Sense of urgency and suspicious sender address

Phishing emails often pressure the user to act quickly to avoid an 'account suspension'. They often contain subtle misspellings in the URL or the sender's domain. Always verify requests for sensitive info through an official channel.

5

What is 'Encryption'?

💡

Correct Answer: B. Scrambling data to make it unreadable without a key

Encryption is the process of converting plaintext into ciphertext. It ensures that even if data is intercepted, it cannot be read by unauthorized parties. It is used in everything from WhatsApp messages to online banking.

6

What is a 'Vulnerability' in cybersecurity?

💡

Correct Answer: A. A weakness or flaw in a system that can be exploited

Vulnerabilities can exist in hardware, software, or even human processes. Security researchers find these flaws and report them so they can be fixed. Exploiting a vulnerability is the first step in most cyberattacks.

7

Which organization is a leading global body for setting cybersecurity standards?

💡

Correct Answer: B. NIST

The National Institute of Standards and Technology (NIST) provides frameworks widely used by organizations globally. Its Cybersecurity Framework helps manage and reduce cybersecurity risk. Following these standards is often a requirement for government contractors.

8

What is the main purpose of a 'Backup'?

💡

Correct Answer: B. To ensure data can be recovered if the original is lost

Backups involve creating a copy of important data on a separate device or cloud storage. They are the last line of defense against hardware failure and ransomware. It is recommended to follow the 3-2-1 backup rule.

9

What is 'Pharming'?

💡

Correct Answer: B. Redirecting website traffic to a fake site without the user's knowledge

Pharming is more sophisticated than phishing because it doesn't rely on clicking a link in an email. It often involves poisoning the DNS cache to misdirect the user. The goal is to steal login credentials and personal information.

10

What is a 'Keylogger'?

💡

Correct Answer: A. Software that records every keystroke made on a keyboard

Keyloggers are a type of surveillance software used to steal passwords and other confidential info. They can run invisibly in the background without the user's knowledge. Antimalware software is usually needed to detect and remove them.