Information Technology and Cybr law

onlinepsc,gst,india,kerala, UPSC, KERALA PSC, RAILAWAY, competitive examination

Online Examination

UPSC, PSC, BANK, RAILWAY,etc. Examination Questions

Questions about Information Technology including Kerala Administrative Service (KAS), Secretariat Assistant, Panchayath Secretary, BDO, Auditor, Assistant, LDC and LGS examination level questions. You need a lot of experience in taking an online exam.

Question1:-An unwanted software that does mischief or permanent damage to your computer



malware or malicious software


Question2:- Virus, Trojan,backdoor, worms are:



malware


Question3:-A program that can infect other programs by modifying them to include a,possibly evolved version of itself



Virus


Question4:-_______it attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels



virus


Question5:- Which type of virus make change after each infection



Metamorphic


Question6:-__________ spread from computer to computer with the help of human interaction.



Virus


Question7:- Requires the spreading of an infected host file:



virus


Question8:-_____ are programs that replicate themselves from system to system without the use of a host file



Worms


Question9:-________Spread more rapidly than viruses



worms


Question10:-_________spread with uniform speed as programmed



Virus


Question11:-This is an average computer program that says it will do one thing [it says can it is a game.calender,weather monitor],But instead when you run the program it damages your computer



Trojan


Question12:-A _______ is a malware program that gives an intruder administrative control over a target computer



Remote access Trojan (RAT)


Question13:- ________ are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment



Remote access Trojan (RAT)


Question14:- _________ enables administrative control, it makes it possible for the intruder to do just about anything on the targeted computer



Remote access Trojan (RAT)


Question15:-A ______ is a means of access to a computer program that bypasses security mechanisms



back door


Question16:- A program or hardware device that captures every key depression on the computer:



Key stroke loggers / Key loggers


Question17:- ___________ is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted etc.



Key stroke loggers / Key loggers


Question18:- _________is the art of manipulating people into performing actions or divulging confidential information



Social Engineering


Question19:-Hackers use _____________ to obtain information that will allow him/her to gain unauthorized access to a valued system and the information that resides on that system



Social Engineering attacks


Question20:- The act of creating and using an invented situation in order to convince a target to release information or grant access to sensitive materials



Pretexting


Question21:-This type of attack is usually implemented over the phone and can be used to obtain customer information, phone records, banking records and is also used by private investigators



Pretexting


Question22:-A Hacker will call someone up and imitate a person of authority and slowly retrieve information from them.



Phone Social Engineering


Question23:- What is PGP



Pretty Good Privacy (PGP)

Widely used secure e-mail software-originally a file encryption/decryption facility



Question24:-What is S/MIME



S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending


Question25:- What is Smishing



The name is derived from SMS Phishing, is the technology used for false text messages on cell phones


Question26:- _________ is a device that allows wireless devices to connect to a wired network using Wi-Fi



wireless Access Point


Question27:- A Wi-Fi network access point or area is called as__________



Hotspot


Question28:- What is WEP



Wired Equivalent Privacy


Question29:- What is WPA



Wi-Fi Protected Access


Question30:-What is WPA2



Wi-Fi Protected Access II


Question31:-What is PSK



PSK (pre shared key),Uses PSK (pre shared key) for home or small office networks


Question32:-_________ is an open standard for short-range digital radio to interconnect a variety of devices Cell phones, PDA, notebook computers, modems, cordless phones, pagers, laptop computers, printers, cameras by developing a single-chip, low-cost, radio-based wireless network technology



Bluetooth


Question33:-Bluetooth Frequency ?



2.45 GHz (2483.5 MHs)


Question34:- _________ system Used to monitor for “suspicious activity” on a network ?



Intrusion Detection


Question35:-________ attack Make a network service unusable or unavailable, usually by overloading the server or network



Denial of Service


Question36:-Which are the type of attacks existing in Denial of Service attack



SYN flooding ,SMURF ,Distributed attacks, Mini Case Study: Code-Red


Question38:-Send SYN packets with bogus source address



SYN flooding attack


Question39:-One attack acting as Source IP address of a broadcast ping is forged:



SMURF


Question40:-If an attacker learns the associated TCP state for the connection, then the connection can be hijacked. this attack is called as ___________



TCP Attack


Question41:-Attacker can insert malicious data into the TCP stream, and the recipient will believe it came from the original source. this attack is called as ___________



TCP Attack


Question42:-What is a SIEM?



Security Information Event Management


Question43:- __________ is a key or a secret word which is used to protect your information from bad people or others in the cyber world



Password


Question44:-_________ word Used for authentication, to prove your identity or to gain access to resources



Password


Question45:- ___________ is a type of malware which restricts access to the computer system that it infects, and demands a ransom (compensation) paid to the creator(s) of the malware in order for the restriction to be removed.



Ransomware


Question46:- ___________ can also encrypt a user’s personal files and documents in order to hold them hostage until the user pays the attacker and receives a key code from them releasing the hold on their computer.



Ransomware


Question47:-______ is a category of malware that demands some form of compensation, a ransom, in return for data or functionality held hostage



Ransomware


Question48:- Which ransomware recently attack all over the world, including Kerala ?



Wannacry


Question49:- ________Secretly monitors anything and everything you do



Spyware


Question50:-_________ Bug is a serious vulnerability in the popular OpenSSL cryptographic software library



Heartbleed


Question51:-________ bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software



Heartbleed


Question52:-Changing data before or as it enters the system. this attack is called as ?



Data diddling


Question53:- Original user does not sign off properly,Intruder gains accesses to files via the original user id. This attack is called as?



Piggybacking


Question54:- Search garbage and recycling bins for personal information:



Scavenging


Question55:-Salami technique



Embezzlement


Question56:-Illicit program left within a completed legitimate program, Permits unauthorized and unknown entry to the program :



Trapdoor


Question57:- Illegal instructions placed inside a legitimate program, Program does something useful and destructive at the same time:



Trojan horse


Question58:-Software to bypass security systems:



Zapping


Question59:-Invade the computer system and cause something unexpected to occur,May interfere with function of PC:



Pests


Question60:- What is DNS



Domain Name System


Question61:-What is the first part of URL



Protocol (https or http)


Question62:- Default port of the Server will be ________



80


Question63:-Protocol for copying files between client and an FTP server



FTP


Question64:-What is FTP?



File Transfer protocol


Question65:- What is TFTP?



Trivial File Transfer Protocol (TFTP) is a lightweight version for small memory devices


Question66:-_________ allows a user to run commands and programs remotely on another computer across the Internet?



Telnet


Question67:-FTP port?



21


Question68:-Telnet port ?



23


Question69:-SMTP port?



25, 465, 587


Question70:-Gopher port ?



70


Question71:-__________is a TCP/IP application layer protocol designed for distributing, searching, and retrieving documents over the Internet.



Gopher protocol


Question72:-finger port ?



79


Question73:-__________simple network protocols for the exchange of human-oriented status and user information.



Finger


Question74:-HTTP port ?



80


Question75:-_________ is a good program and is free for home use but is no longer free for educational use



Ad-aware


Question76:-____________ is sending, receiving, or forwarding sexually explicit messages, photographs or images, primarily between mobile phones. It may also include the use of a computer or any digital device.



Sexting


Question77:-Device which limits internet connections, Limit network uses to only approved ones, Prevent malicious software reporting information, Prevent outside attacks



FireWalls


Question78:-__________ is listening in to a conversation, spying prying or snooping of data



Eavesdropping


Question79:-________ is the authorized discovery and mapping of system, services or vulnerabilities. It is also known as information gathering



Reconnaissance


Question80:- What is DoS attack ?



Denial of Service (DoS) ATTACKSDenial of service implies that an attacker disables or corrupt networks, systems or services with the intent to deny services to intended users



Question81:- what is DDoS attack ?



Distributed Denial –of-Service Attacks (DDoS)
DDoS attack uses attack methods similar to standard DoS attacks but operates on a much larger scale.


Question82:-_______ network no two computers can communicate with each other directly, the communication between them has to take place through the Host computer



Star


Question83:-In _________ network there is a host computer and all other computers are connected to it



Star


Question84:-No host computer exists in a _________ network. All computers are connected in a ring form by closed loop in a manner that passes data from one computer to another.



Ring Network


Question85:-A single network cable runs in the building or campus and all other nodes are connected/ linked along with this communication line with two end points called __________ network



BUS Network


Question86:-A _________ network provides redundant communication paths between small or all devices



Mesh Network


Question87:- A _______ network integrates the Star and Bus topologies



Tree Network


Question88:-What is LAN ?



LAN (Local Area Network):-
Networks used for single room, building or small area


Question89:-What is MAN ?



MAN (Metropolitan Area Network):-
It is used to connect branches or outlets of organization or to exchange inter-organizational information in a city


Question90:-What is WAN ?



WAN (Wide Area Network):-
It is used for regional, national or global area.


Question91:-Data transmitted in one way is called as ?



SimplexIs (Is one way communication>
Eg. Television transmission, Telegram


Question92:-Both communicate in the same medium, but only one can use the line at a time, one is in send mode other one is in received mode:



Halfduplex
Eg. Wireless messenger


Question93:- Permits information to flow simultaneously in both directions



Full Duplex


Question94:-A set of computer networks made up of a large number of smaller networks using different networking protocols Is called ___________



Internet


Question95:-_______sending and receiving of messages to other users connected to the internet.



E-mail


Question96:-An early form of representing information as Graphical Icons or Symbols that could be displayed in window and then downloaded. It has been replaced by WWW



Gopher


Question97:-A number of discussion groups that allow users to post questions and replies sorted by topic



USnet


Question98:-refers to specific kind of internet interface.it is platform independent, Global availability, Distributed computing, Hypermedia support, Fast and easy development of applications, easy and quick information retrieval, client server architecture



Web


Question99:-_________ is a type of information system that facilitates communication within the organization, among widely dispersed departments, divisions and regional locations. Data can be available through browser



Intranet


Question100:- ____________ is private network that uses the internet protocol and the public telecommunication system to securely share part of a business information or operations with suppliers, vendors, partners, customers



Extranet


Question101:-__________ spread from computer to computer. it has the capability to travel without any human action.



worms