access over a web server and its associated software is ………
hacking b. Ethical hacking c. Website hacking d. Computer hacking
2. In 1999, ______ stole the source code of the International
Space Station among other sensitive information of NASA.
a. Kevin Mitnick b.
Johan Helsinguis c. Linus
Torvalds d. Jonathan James
3._________ is a
filter designed to keep unwanted intruders outside a computer system or network
a. Exploit kit b.
Denial of services c. Firewall d. Spyware
5. What is OSCP
Security Certified Professional
Security Control Protocol
System Certified Professional
d. Online Status
6. In 2014, _____Malware designed to compromise
Point-of-Sale (POS) systems to steal credit card data
a. MyDoom b.Backoff c. Cryptolocker d.koobface
7. What is
the name of the viruses that fool a user into downloading and/or executing them
by pretending to be useful applications?
a. iloveyou b. Worm c. Trojan horses d.CryptoLocker
9. _____ virus which hides themselves
to avoid detection from any of the
a. malware b.
10. Which of the program takes
certain functionalities of internet to
redirect into hackers start page?
a. Hijackers b.
Adware c. Dialer d. X-trojan