Information Technology and Cybr law

onlinepsc,gst,india,kerala, UPSC, KERALA PSC, RAILAWAY, competitive examination

Online Examination

UPSC/PSC/BANK/RAILWAY,etc. examination questions

Questions about Information Technology including Kerala Administrative Service (KAS), Secretariat Assistant, Panchayath Secretary, BDO, Auditor, Assistant, LDC and LGS examination level questions. You need a lot of experience in taking an online exam.

Question1:-SSL stand for



Secure Socket Layer


Question2:- TLS



Transport Layer Security


Question3:-IETF



Internet Engineering Task Force


Question4:-TCP



Transmission Control Protocol


Question5:-MAC



Message Authentication Code


Question6:- CA in IT Act



Certificate Authority


Question7:- POP3 is a _______



Protocol


Question8:- what is pop3



Post office Protocol


Question9:-What is PGP



Pretty Good Privacy (PGP )


Question10:- PGP is a ____________



Protocol


Question11:-HTTP



Hypertext Transfer Protocol


Question12:-HTTPS



Hypertext Transfer Protocol Secured


Question13:- Buffer overflow attack



It is a DoS attack is simply to send more traffic to a network address


Question14:-ICMP



Internet Control Message Protocol


Question15:-SYN attack



An attacker can send a number of connection requests very rapidly and then fail to respond to the reply.


Question16:- Teardrop attack



This type of denial of service attack


Question17:-smurf attack



In this attack, the perpetrator sends an IP ping request to a reciveing site, the ping packet specify the commands.


Question18:-DES



Data Encryption Standards


Question19:-NIST



National Institute of Stndards Technology


Question20:-Data encryption Algorithsms



DSA(Digital signature algorithm), RSA, SHA, MD5, MAC


Question21:-Data confidentiality



Authorized person should be able to access the data.


Question22:- Data integrity



Data should remain the same


Question23:-What is PAP.



Password Authentication Protocol


Question24:- What is CHAP.



Challenge Handshake Authentication Protocol


Question25:-RADIUS



Remote Authentication Dial in User Service


Question26:-RAID



Redundant Array of Inexpensive Disks


Question27:- What is digital water mark?



Pieces of information added to the digital data ( audio, video, or small image), to identifying the original data.it is commonly used for copyright protection.


Question28:- What is digital forensc



Is a brach of forensic scinece, encompassing the recovery and investigation of material found in digital device, often in relation to computer crime.


Question29:- UPS



Uninterruptable power supply


Question30:-WIPS



Wireless Intrusion Preventions System


Question31:- WIDS



Wireless Intrusion Detection System


Question32:- WPA



wifi protected access


Question33:- public key algoritham ___________



Asymmetric


Question34:- RDBMS



Relational Database Management System


Question35:- SQL



Structured Query Lnaguage


Question36:- SIM card



Subscriber Indentity Module card


Question38:-MM card



Multi Media card


Question39:-SD card



Secure Digital card


Question40:-FAT 12



It is used only on floppy disk


Question41:- FAT 16



MS DOS, Windows95/98


Question42:- FAT



File Allocation Table


Question43:-UFS



Unix File System


Question44:- CDFS



Compact Disk File System , it is used for CD


Question45:-som hacker access the data and destroy the data or system



Black hat hacker


Question46:- ISO



International Organization for standardization


Question47:-UDF



Universal Disk Format , it is used for DVD, CD


Question48:- SNMP



Simple Network Management Protocol


Question49:-USB



Universal Serail Bus


Question50:-TFTP



Trivial File Transfer Protocol


Question51:-WEP



Wireless Encryption Protocol


Question52:- WPA



Wifi Protected Access


Question53:-Social Engineering ?



A non technical kind of intrusion that relies heavily on human interaction.


Question54:- Reverse Social Engineering



A person asking him or her for personal information or ID. They first create problem, then encouraging employee to ask for solution.


Question55:- Section 419 IPC



Whn the fraudster by stolen identifying information impersonate the victim to commit fraud or cheating.


Question56:-Section 420 IPC



Disclossing valuable personal data in the nature of identifiable information whcih is used later to swindle money from victim account.


Question57:-Section 468 IPC



Commits frogery of website which is in the nature of electronic reocord to lure the victim to pass theri identifiable information in order to cheat them.


Question58:- 471 IPC



Dishonestly uses as genuine , the aforesaid fake website in the nature of electronic records.


Question59:-SQL injection is an __________.



Cyber attack


Question60:-Polymorphic virus



These virus change their characteristics after each attack.


Question61:-Metamorphic virus.



Viruses rewrite themselves completely each time they are to infect newly executable , it can reprogram itself.


Question62:-What is Worm.



A self replicating program able to propagate itself across network.


Question63:-Phreaking



is a slang word, closily linked with computer hacking.


Question64:-Ping of death



This attack modifies the IP portion of the Header.


Question65:-SYN Flood attack



This attack radomly opens up many TCP ports.


Question66:-CPU hogging



These attacks constitute program sucah as trojan horses or viruses that tie up CPU cycles, memory or other resources.


Question67:-Smurf attack



Sending a large number of spoofed ICMP echo or ping, regquest to broadcast address.


Question68:-Man in the Middle Attack



A hacker have access to network packetes that come across the network.


Question69:-VIRUS



Vital information Resource under Siege


Question70:-________ is a program that can replicate itself and can make harmful to the other computer programs.



Virus


Question71:-What is difference between Virs and Worms



Work copies itself and run independently and travel across a network. A virus is dependent upon a host file or boot sector.


Question72:-Cyber Bullying



Consistently harass somebody over the internet.


Question73:-Thumbsucking



a portable sotrage device succh as usb drives (thumbdrive) to illicitly download confidential data from a network endpoint.


Question74:-Thumbsucking is known as



podslurping


Question75:-Carder



A person who is engaged in online credit card fraud.


Question76:-The use of ipod etc. to download information illegally



pod slurping


Question77:- Use bluetooth devices to approach and stole information



Bluesnafing


Question78:-Botnet



A collection infected computer


Question79:-WiFi



Wireless Fidelity


Question80:-802.11 indicate ___________ net work



wifi network


Question81:-802.16 indicate ___________ net work



WiMax


Question82:-802.15 indicate ___________ net work



Bluetooth


Question83:-__________ used to connect a wireless card to an antena



Pigtails


Question84:-white listing



Whitelisting is the input validation, all input may only pass if it is validated as known good input.


Question85:-Sanitizing



Sanitizing is tha approach to defuse a posiiblly malicious (infected) input and to replace it by non malicious input.


Question86:- ASCII



American Standard Code for Information Interchange


Question87:-UTF



Unicode Transformation Format


Question88:-XACML



Extensible access control markup language.


Question89:-Cookie



is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.

It can be used by spyware to track user's browsing activities.



Question90:-Secret key system is known as



private key or symmetric key cryptography


=====================================

Question91:-Load testing



Load tests are software testing, end to end performance test under normal and anticipated peak production load.


Question92:-smoke test



The smoke test is the initial run of a performance test to see if your application can perform its operation under a normal load.


Question93:-SQLi



SQL injection


Question94:-XSS



Cross site scripting, The hacker inserts malicious data into a dynamic webpage.


Question95:-dot dot slash (../) attack



The web application is manipulated to allow access to files or other resources of the web server, that are not normally accessible.


Question96:-Another name of dot dot slash attack



Dierctory traversal attack


Question97:-crawling



Action taken by a program as it browses page to page on a website.


Question98:-Net extortion



Copying the company's confidential data in order to extort said company for huge amount.


Question99:-Web jacking



The hacker gains access and control over the website of another.


Question100:-Computer vandalism



destroying or damaging propery of others.