Information Technology and Cybr law

onlinepsc,gst,india,kerala, UPSC, KERALA PSC, RAILAWAY, competitive examination

Online Examination

UPSC, PSC, BANK, RAILWAY,etc. Examination Questions

Questions about Information Technology including Kerala Administrative Service (KAS), Secretariat Assistant, Panchayath Secretary, BDO, Auditor, Assistant, LDC and LGS examination level questions. You need a lot of experience in taking an online exam.

Question1:-An unwanted software that does mischief or permanent damage to your computer

malware or malicious software

Question2:- Virus, Trojan,backdoor, worms are:


Question3:-A program that can infect other programs by modifying them to include a,possibly evolved version of itself


Question4:-_______it attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels


Question5:- Which type of virus make change after each infection


Question6:-__________ spread from computer to computer with the help of human interaction.


Question7:- Requires the spreading of an infected host file:


Question8:-_____ are programs that replicate themselves from system to system without the use of a host file


Question9:-________Spread more rapidly than viruses


Question10:-_________spread with uniform speed as programmed


Question11:-This is an average computer program that says it will do one thing [it says can it is a game.calender,weather monitor],But instead when you run the program it damages your computer


Question12:-A _______ is a malware program that gives an intruder administrative control over a target computer

Remote access Trojan (RAT)

Question13:- ________ are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment

Remote access Trojan (RAT)

Question14:- _________ enables administrative control, it makes it possible for the intruder to do just about anything on the targeted computer

Remote access Trojan (RAT)

Question15:-A ______ is a means of access to a computer program that bypasses security mechanisms

back door

Question16:- A program or hardware device that captures every key depression on the computer:

Key stroke loggers / Key loggers

Question17:- ___________ is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted etc.

Key stroke loggers / Key loggers

Question18:- _________is the art of manipulating people into performing actions or divulging confidential information

Social Engineering

Question19:-Hackers use _____________ to obtain information that will allow him/her to gain unauthorized access to a valued system and the information that resides on that system

Social Engineering attacks

Question20:- The act of creating and using an invented situation in order to convince a target to release information or grant access to sensitive materials


Question21:-This type of attack is usually implemented over the phone and can be used to obtain customer information, phone records, banking records and is also used by private investigators


Question22:-A Hacker will call someone up and imitate a person of authority and slowly retrieve information from them.

Phone Social Engineering

Question23:- What is PGP

Pretty Good Privacy (PGP)

Widely used secure e-mail software-originally a file encryption/decryption facility

Question24:-What is S/MIME

S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending

Question25:- What is Smishing

The name is derived from SMS Phishing, is the technology used for false text messages on cell phones

Question26:- _________ is a device that allows wireless devices to connect to a wired network using Wi-Fi

wireless Access Point

Question27:- A Wi-Fi network access point or area is called as__________


Question28:- What is WEP

Wired Equivalent Privacy

Question29:- What is WPA

Wi-Fi Protected Access

Question30:-What is WPA2

Wi-Fi Protected Access II

Question31:-What is PSK

PSK (pre shared key),Uses PSK (pre shared key) for home or small office networks

Question32:-_________ is an open standard for short-range digital radio to interconnect a variety of devices Cell phones, PDA, notebook computers, modems, cordless phones, pagers, laptop computers, printers, cameras by developing a single-chip, low-cost, radio-based wireless network technology


Question33:-Bluetooth Frequency ?

2.45 GHz (2483.5 MHs)

Question34:- _________ system Used to monitor for “suspicious activity” on a network ?

Intrusion Detection

Question35:-________ attack Make a network service unusable or unavailable, usually by overloading the server or network

Denial of Service

Question36:-Which are the type of attacks existing in Denial of Service attack

SYN flooding ,SMURF ,Distributed attacks, Mini Case Study: Code-Red

Question38:-Send SYN packets with bogus source address

SYN flooding attack

Question39:-One attack acting as Source IP address of a broadcast ping is forged:


Question40:-If an attacker learns the associated TCP state for the connection, then the connection can be hijacked. this attack is called as ___________

TCP Attack

Question41:-Attacker can insert malicious data into the TCP stream, and the recipient will believe it came from the original source. this attack is called as ___________

TCP Attack

Question42:-What is a SIEM?

Security Information Event Management

Question43:- __________ is a key or a secret word which is used to protect your information from bad people or others in the cyber world


Question44:-_________ word Used for authentication, to prove your identity or to gain access to resources


Question45:- ___________ is a type of malware which restricts access to the computer system that it infects, and demands a ransom (compensation) paid to the creator(s) of the malware in order for the restriction to be removed.


Question46:- ___________ can also encrypt a user’s personal files and documents in order to hold them hostage until the user pays the attacker and receives a key code from them releasing the hold on their computer.


Question47:-______ is a category of malware that demands some form of compensation, a ransom, in return for data or functionality held hostage


Question48:- Which ransomware recently attack all over the world, including Kerala ?


Question49:- ________Secretly monitors anything and everything you do


Question50:-_________ Bug is a serious vulnerability in the popular OpenSSL cryptographic software library


Question51:-________ bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software


Question52:-Changing data before or as it enters the system. this attack is called as ?

Data diddling

Question53:- Original user does not sign off properly,Intruder gains accesses to files via the original user id. This attack is called as?


Question54:- Search garbage and recycling bins for personal information:


Question55:-Salami technique


Question56:-Illicit program left within a completed legitimate program, Permits unauthorized and unknown entry to the program :


Question57:- Illegal instructions placed inside a legitimate program, Program does something useful and destructive at the same time:

Trojan horse

Question58:-Software to bypass security systems:


Question59:-Invade the computer system and cause something unexpected to occur,May interfere with function of PC:


Question60:- What is DNS

Domain Name System

Question61:-What is the first part of URL

Protocol (https or http)

Question62:- Default port of the Server will be ________


Question63:-Protocol for copying files between client and an FTP server


Question64:-What is FTP?

File Transfer protocol

Question65:- What is TFTP?

Trivial File Transfer Protocol (TFTP) is a lightweight version for small memory devices

Question66:-_________ allows a user to run commands and programs remotely on another computer across the Internet?


Question67:-FTP port?


Question68:-Telnet port ?


Question69:-SMTP port?

25, 465, 587

Question70:-Gopher port ?


Question71:-__________is a TCP/IP application layer protocol designed for distributing, searching, and retrieving documents over the Internet.

Gopher protocol

Question72:-finger port ?


Question73:-__________simple network protocols for the exchange of human-oriented status and user information.


Question74:-HTTP port ?


Question75:-_________ is a good program and is free for home use but is no longer free for educational use


Question76:-____________ is sending, receiving, or forwarding sexually explicit messages, photographs or images, primarily between mobile phones. It may also include the use of a computer or any digital device.


Question77:-Device which limits internet connections, Limit network uses to only approved ones, Prevent malicious software reporting information, Prevent outside attacks


Question78:-__________ is listening in to a conversation, spying prying or snooping of data


Question79:-________ is the authorized discovery and mapping of system, services or vulnerabilities. It is also known as information gathering


Question80:- What is DoS attack ?

Denial of Service (DoS) ATTACKSDenial of service implies that an attacker disables or corrupt networks, systems or services with the intent to deny services to intended users

Question81:- what is DDoS attack ?

Distributed Denial –of-Service Attacks (DDoS)
DDoS attack uses attack methods similar to standard DoS attacks but operates on a much larger scale.

Question82:-_______ network no two computers can communicate with each other directly, the communication between them has to take place through the Host computer


Question83:-In _________ network there is a host computer and all other computers are connected to it


Question84:-No host computer exists in a _________ network. All computers are connected in a ring form by closed loop in a manner that passes data from one computer to another.

Ring Network

Question85:-A single network cable runs in the building or campus and all other nodes are connected/ linked along with this communication line with two end points called __________ network

BUS Network

Question86:-A _________ network provides redundant communication paths between small or all devices

Mesh Network

Question87:- A _______ network integrates the Star and Bus topologies

Tree Network

Question88:-What is LAN ?

LAN (Local Area Network):-
Networks used for single room, building or small area

Question89:-What is MAN ?

MAN (Metropolitan Area Network):-
It is used to connect branches or outlets of organization or to exchange inter-organizational information in a city

Question90:-What is WAN ?

WAN (Wide Area Network):-
It is used for regional, national or global area.

Question91:-Data transmitted in one way is called as ?

SimplexIs (Is one way communication>
Eg. Television transmission, Telegram

Question92:-Both communicate in the same medium, but only one can use the line at a time, one is in send mode other one is in received mode:

Eg. Wireless messenger

Question93:- Permits information to flow simultaneously in both directions

Full Duplex

Question94:-A set of computer networks made up of a large number of smaller networks using different networking protocols Is called ___________


Question95:-_______sending and receiving of messages to other users connected to the internet.


Question96:-An early form of representing information as Graphical Icons or Symbols that could be displayed in window and then downloaded. It has been replaced by WWW


Question97:-A number of discussion groups that allow users to post questions and replies sorted by topic


Question98:-refers to specific kind of internet is platform independent, Global availability, Distributed computing, Hypermedia support, Fast and easy development of applications, easy and quick information retrieval, client server architecture


Question99:-_________ is a type of information system that facilitates communication within the organization, among widely dispersed departments, divisions and regional locations. Data can be available through browser


Question100:- ____________ is private network that uses the internet protocol and the public telecommunication system to securely share part of a business information or operations with suppliers, vendors, partners, customers


Question101:-__________ spread from computer to computer. it has the capability to travel without any human action.