Hack Investigation & Security

Cybersecurity Engineer Test

Hack Investigation & Security

Personal Cyber Security Quiz  (Forensic & Hack removal)

1 / 85

Category: Forensics

 1. Which of the followings you should check as identification items while investigating cybercrime? (Choose all applicable answers)

2 / 85

Category: Forensics

2. Which of the following isn’t digital evidence?

3 / 85

Category: Forensics

 3. Which of the following is a memory acquisition tool?

4 / 85

Category: Forensics

 4. While preparing an iOS device for image acquisition,you should keep at least_____ charge on the device.

5 / 85

Category: Forensics

5. While preparing an iOS device for image acquisition,you should keep device switched off.

6 / 85

Category: Forensics

6. To acquire an encrypted iOS backup with AXIOM:

7 / 85

Category: Forensics

7. If SSH is present on an iOS device, AXIOM Process tries to connect to the device automatically by using the default SSH credentials

8 / 85

Category: Forensics

8. Which are default SSH credentials of an iOS device?

9 / 85

Category: Forensics

9. What is the requirement for memory acquisition of an iOS device?

10 / 85

Category: Forensics

10. To acquire a computer drive with AXIOM:

11 / 85

Category: Forensics

11. Which of the followings are forensic tool? (Choose all applicable answers)

12 / 85

Category: Forensics

12. What is “.lnk” file?

13 / 85

Category: Forensics

13. Which of the followings  tools can help us parse “Prefetch files” of Windows ? (Choose all applicable answers)

14 / 85

Category: Forensics

14. Which of the following is not Registry Analysis Tool?

15 / 85

Category: Forensics

15. Which of the followings  should be present in a forensic report? (Choose all applicable answers)

16 / 85

Category: Forensics

16. While doing forensic“Analysis” process comes after:

17 / 85

Category: Forensics

17. Which of the followings are browser artifacts? (Choose all applicable answers)

18 / 85

Category: Forensics

18. Prefetch files can be found in:

19 / 85

Category: Forensics

19. To turn on Windows 10 Timeline:

20 / 85

Category: Forensics

20. Install.log file has an immense value to see all the installations on  Mac.

21 / 85

Category: Forensics

21. On Mac Os  Key Chain  can be found in:

22 / 85

Category: Forensics

22. Background System Process on Mac OS can be found at “/System/Library/LaunchDaemons/”.

23 / 85

Category: Forensics

23. Background User Process on Mac OS can be found at: (Choose all applicable answers)

24 / 85

Category: Forensics

24. Which commands you can use to see what's 'Installed' on Mac? (Choose all applicable answers)

25 / 85

Category: Forensics

25. MacOs Key Chain  can be found in:

26 / 85

Category: Forensics

26. ExifTool is a command-line application used to read, write or edit file metadata information.

27 / 85

Category: Forensics

27. “/etc/resolv.conf” is the configuration file for local DNS name assignment on Linux.

28 / 85

Category: Forensics

28. Linux user account information are stored in______.

29 / 85

Category: Forensics

29. Linux failed login attempts records are found in ______.

30 / 85

Category: Forensics

30. Kali Linux “Live” provides a “forensic mode”.

31 / 85

Category: Forensics

31. What is “Xplico”?

32 / 85

Category: Forensics

32. Which of the followings are Linux Live CD used in forensic? (Choose all applicable answers)

33 / 85

Category: Forensics

33. What is “HELIX3 Free”?

34 / 85

Category: Forensics

34. Which of the followings are hex editor? (Choose all applicable answers)

35 / 85

Category: Forensics

 35. FTK Imager doesn’t have any portable version .

36 / 85

Category: Forensics

36. What is “Volatility”?

37 / 85

Category: Forensics

37. For Image OSINT,you can use:(Choose all applicable answers)

38 / 85

Category: Forensics

38. For Person OSINT:(Choose all applicable answers)

39 / 85

Category: Forensics

39. For Username OSINT,you can use:

40 / 85

Category: Forensics

40. You can use “ https://conifer.rhizome.org/“,for:

41 / 85

Category: Hack Removal

1. What is the process of checking battery performance in IOS devices?

42 / 85

Category: Hack Removal

2. Processes of checking whether the iPhone is JailBroken or not: (Choose all applicable answers)

43 / 85

Category: Hack Removal

3. Checking Crashing Apps in iPhone:

44 / 85

Category: Hack Removal

4. Write down the process of checking unknown applications in IOS devices:

45 / 85

Category: Hack Removal

5. Steps to clear history in IOS devices:

46 / 85

Category: Hack Removal

6. Steps of Resetting iPhone as a New One:

47 / 85

Category: Hack Removal

7. Steps to clear website data in IOS devices:

48 / 85

Category: Hack Removal

8. To backup from iTunes to Desktop iCloud needed to be Enabled:

49 / 85

Category: Hack Removal

9. To turn on "Find My iPhone" steps should be:

50 / 85

Category: Hack Removal

10. Steps to remotely wipe an iPhone once located with Find My iPhone:

51 / 85

Category: Hack Removal

11. Creating a longer password in IOS devices: (Choose all applicable answers)

52 / 85

Category: Hack Removal

12. Process of Auto-wipe iPhone content: (Choose all applicable answers)

53 / 85

Category: Hack Removal

13. What kind of symptoms are arise when a phone get hacked? (Choose all applicable answers)

54 / 85

Category: Hack Removal

14. How people get hacked in their mobile devices?

55 / 85

Category: Hack Removal

15. What is not responsible for hacking mobile devices?

56 / 85

Category: Hack Removal

16. Downloading unknown apps may the cause of mobile devices hacking.

57 / 85

Category: Hack Removal

17. Which one can be the cause for hacking mobile devices?

58 / 85

Category: Hack Removal

18. Which step needs to be taken to detect Hack/Malware in mobile devices?

59 / 85

Category: Hack Removal

19. Which are signs of Malware attack in a mobile device? (Choose all applicable answers)

60 / 85

Category: Hack Removal

20. Ways to get rid of Malware/Spyware/Hack in mobile devices: (Choose all applicable answers)

61 / 85

Category: Hack Removal

21. Clear History & Website Data is a way to get rid of Malware/Spyware/Hack in mobile devices.

62 / 85

Category: Hack Removal

22. Select a way thus a phone can be hacked: (Choose all applicable answers)

63 / 85

Category: Hack Removal

23. Sign of Hacking of a phone. (Choose all applicable answers)

64 / 85

Category: Hack Removal

24. Phone is being overheated even when it is not being used is a symptom of: (Choose all applicable answers)

65 / 85

Category: Hack Removal

25. Which one is not a sign of Hack/Malware/Spyware in mobile devices?

66 / 85

Category: Hack Removal

26. Which are the signs of phone being hacked or infected by malware? (Choose all applicable answers)

67 / 85

Category: Hack Removal

27. How to Check for Malware on Android using Google Play Protect:

68 / 85

Category: Hack Removal

28. The process of recovery of Facebook account if the password has changed: (Choose all applicable answers)

69 / 85

Category: Hack Removal

29. The process of recovery of Facebook account if no access to email:

70 / 85

Category: Hack Removal

30. The process of recovery of Facebook account if Password and email address changed:

71 / 85

Category: Hack Removal

31. If victim’s email address has been changed, then Facebook will send an email to victim’s previously entailing email address and notify victim about the email change.

72 / 85

Category: Hack Removal

32. "If victim did not do this, please secure victim’s account" appears in facebook when:

73 / 85

Category: Hack Removal

33. To recover Facebook account, victim may be asked to upload: (Choose all applicable answers)

74 / 85

Category: Hack Removal

34. Steps to recover a Facebook ID using Email Change Notification:

75 / 85

Category: Hack Removal

35. After sending victim’s ID, Facebook will response to victim in:

76 / 85

Category: Hack Removal

36. To request a login link in Instagram in Android:

77 / 85

Category: Hack Removal

37. To report a hacked account on Instagram on Android:

78 / 85

Category: Hack Removal

38. To report a hacked account on Instagram on IOS is: 

79 / 85

Category: Hack Removal

39. A photo of victim’s self-holding a paper with a handwritten code instagram provided to victim is needed to verify victim’s identity.

80 / 85

Category: Hack Removal

40. Steps to recovering Instagram account by using Facebook:

81 / 85

Category: Hack Removal

41. Which one contains LinkedIN hacked account recovery form?

82 / 85

Category: Hack Removal

42. What information needed to recover a hacked LinkedIN account?

83 / 85

Category: Hack Removal

43. How many ways to recover a google account?

84 / 85

Category: Hack Removal

44. What kind of information needed to recover a google account? (Choose all applicable answers)

85 / 85

Category: Hack Removal

45. Which is the correct path for checking Device Administrator permission on Android?

0%

Device Security

Cybersecurity Engineer Test

Device Security

Personal Cyber Security Quiz  (Computer security & Mobile security)

1 / 60

Category: Computer Security

1.Which of the following contains the “scanning process” while checking malware in windows?

 

2 / 60

Category: Computer Security

2.What are the steps to quarantine items using Group Policy?

3 / 60

Category: Computer Security

3.You shouldn’t back up all your documents and files before you start removing the malware infection.

 

4 / 60

Category: Computer Security

4.The steps to protect files from unauthorized access:

 

5 / 60

Category: Computer Security

5.What should you write on run to open the Local Group Policy Editor?

 

6 / 60

Category: Computer Security

6. BitLocker  is a free encryption tool.

 

7 / 60

Category: Computer Security

7.Restart by pressing ____ key over and over again until it takes you to the Safe Mode with Networking

 

8 / 60

Category: Computer Security

8.Which of the following can be used to open “Settings” in windows 10?(Choose all applicable answers)

 

9 / 60

Category: Computer Security

9.Which for good practices while securing Windows 10?(Choose all applicable answers)

 

10 / 60

Category: Computer Security

10.If you turn on the device encryption,it will save you from Ransomware.

 

11 / 60

Category: Computer Security

11.Which is the shortcut to open the Run command?

 

12 / 60

Category: Computer Security

12.From “Safe Mode” you can download necessary software such as antivirus, firewall etc.

 

13 / 60

Category: Computer Security

13.Which OS has the “Last Known Good Configuration” boot option?(Choose all applicable answers)

 

14 / 60

Category: Computer Security

14.Which of the following is the Boot Log File?

 

15 / 60

Category: Computer Security

15.Windows defender works better than any other third party endpoint solution.

 

16 / 60

Category: Computer Security

16.If CleanMyMac X doesn’t report a clean bill of health,what should you press?

 

17 / 60

Category: Computer Security

17.Which one should you open first to turn on the firewall on Mac OS?

 

18 / 60

Category: Computer Security

18.Turning on FileVault will disable automatic login on Mac OS.

 

19 / 60

Category: Computer Security

19.What are the steps of disabling Spotlight Suggestions?

20 / 60

Category: Computer Security

20.Which is the shortcut of turning on private browsing in Safari?

 

21 / 60

Category: Computer Security

21. Restarting the computer by pressing the Power button along with the keyboard command Shift-Control-Option is used to “Check the disk for errors” on Mac OS.

 

22 / 60

Category: Computer Security

22.Which of the following are Common Malware Symptoms seen on a Mac OS? (Choose all applicable answers)

 

23 / 60

Category: Computer Security

23.To update system software on Mac OS:

 

24 / 60

Category: Computer Security

24.Which tab contains "Login Items" in Mac OS’s system preferences?

25 / 60

Category: Computer Security

25.What Are the Most Recent Mac Malware Threats?(Choose all applicable answers)

 

26 / 60

Category: Computer Security

26.Immediately shutting down Mac and restoring from a recent backup is good practice while fighting against malware.

 

27 / 60

Category: Computer Security

27.Which of the following aren’t  Mac’s built-in security features? (Choose all applicable answers)

 

28 / 60

Category: Computer Security

28.To check the disk for errors on Mac:

 

29 / 60

Category: Computer Security

29.To To reset the NVRAM on Mac:

 

30 / 60

Category: Computer Security

30.First Aid is used to _____ on Mac OS.

 

31 / 60

Category: Computer Security

31.To secure SSH on Linux:(Choose all applicable answers)

 

32 / 60

Category: Computer Security

32. To enable online and ssh access on Linux,you should run:(Choose all applicable answers)

 

33 / 60

Category: Computer Security

33.Which of the following can help to create a strong password?

 

34 / 60

Category: Computer Security

34.Which of the following isn’t a good practice for Linux security & privacy settings?

35 / 60

Category: Computer Security

35.To find the scheduled tasks on Linux:

 

36 / 60

Category: Computer Security

36.  Using  the NIS service for centralized authentication in Linux is a good practice.

 

37 / 60

Category: Computer Security

37.Which of the following can be used to monitor suspicious log messages on Linux? (Choose all applicable answers)

 

38 / 60

Category: Computer Security

38. “netstat -nap” command is used to display all the listening ports in Linux.

 

39 / 60

Category: Computer Security

39. Why is “fail2ban” used in Linux?

 

40 / 60

Category: Computer Security

40. To set up password rules in Linux:

 

41 / 60

Category: Mobile Security Quiz

1.Which one is not a checklist for security and privacy for iOS security?

 

42 / 60

Category: Mobile Security Quiz

2.How to set up a passcode on an iOS device?

 

43 / 60

Category: Mobile Security Quiz

3.How to Enable “Erase Data” to delete data after 10 failed passcode attempts in IOS devices:

44 / 60

Category: Mobile Security Quiz

4.Steps to disable notifications in the lock screen for sensitive apps in IOS devices:

 

45 / 60

Category: Mobile Security Quiz

5.Steps to Turn off “Share My Location.” in IOS devices:

 

46 / 60

Category: Mobile Security Quiz

6.Steps to turn off location services for the apps that do not require it in iOS devices:

 

47 / 60

Category: Mobile Security Quiz

7.How to turn off access to sensitive data for apps that do not need it in IOS devices:(Choose all applicable answers)

 

48 / 60

Category: Mobile Security Quiz

8.Steps to review the installed apps in IOS devices:(Choose all applicable answers)

 

49 / 60

Category: Mobile Security Quiz

9.To turn off read receipts so people are not notified when their message is seen in IOS devices is: “Settings > Messages > Send Read Receipts”

 

50 / 60

Category: Mobile Security Quiz

10.Steps to reset advertising identifier from time to time in IOS devices:

 

51 / 60

Category: Mobile Security Quiz

11. Process to turn on “Limit ad tracking” in iOS devices is:

 

52 / 60

Category: Mobile Security Quiz

12.Steps to make your iPhone lockout sooner:

 

53 / 60

Category: Mobile Security Quiz

13.Process to enable 2-factor authentication in iOS devices:

 

54 / 60

Category: Mobile Security Quiz

14.Disabling SIRI in IOS: Settings > SIRI and Search > Turn off “Allow SIRI when locked”.

 

55 / 60

Category: Mobile Security Quiz

15.Steps to Turn on "find my iPhone":

 

56 / 60

Category: Mobile Security Quiz

16.Which one is privacy focused web browser?(Choose all applicable answers)

 

57 / 60

Category: Mobile Security Quiz

17.Turning off "auto-fill" is one of the best security practices.

 

58 / 60

Category: Mobile Security Quiz

18.Turning on "location sharing" in images on the iPhone is one of the best security practices.

 

59 / 60

Category: Mobile Security Quiz

19.Steps to disabling photo stream:

 

60 / 60

Category: Mobile Security Quiz

20.Steps to turn off backup images:

 

0%

Account Security

Cybersecurity Engineer Test

Account Security

Personal Cyber Security Quiz  (Personal account &  Email and Social media account)

1 / 80

Category: Account Security

1.After how many days user should change their password in Amazon pay?

2 / 80

Category: Account Security

2.What are the exact steps to setup two-step verification in Amazon pay?

3 / 80

Category: Account Security

3.Amazon Pay will send you an invoice asking you to pay by Amazon.com Gift Cards. Amazon.com Gift Cards entered into your Amazon.com account can be used when making purchases with Amazon Pay on third-party websites.

4 / 80

Category: Account Security

4.Which one is the Genuine Amazon Pay website?(Choose all applicable answers)

5 / 80

Category: Account Security

5.Asking for which information isn't a symptom of a phishing email in Amazon pay?

6 / 80

Category: Account Security

6.Which email isn’t an authentic Amazon pay email?

7 / 80

Category: Account Security

7.How can you receive 2 step verification codes from amazon?(Choose all applicable answers)

8 / 80

Category: Account Security

8.User should link their Paypal account with Debit card instead of Credit card.

9 / 80

Category: Account Security

9.Which is the appropriate security measurement for general user of Paypal? (Choose all applicable answers)

10 / 80

Category: Account Security

10.Paypal supports “SMS-based key” for security.

11 / 80

Category: Account Security

11.On the “Security” page of Paypal, you will see the option to specify a _______

12 / 80

Category: Account Security

12.You'll get the option in Paypal under "Get security key":

13 / 80

Category: Account Security

13.What are the best tips for Paypal sellers?(Choose all applicable answers)

14 / 80

Category: Account Security

14.Once the two accounts are properly merged, microsoft creates a skype alias to let you keep signing in with a skype username.

15 / 80

Category: Account Security

15.To update skype account to a microsoft account ones need to visit the following URL:

16 / 80

Category: Account Security

16.To ensure the skype account and microsoft account are fully merged, ones need to enter ________ to login:

17 / 80

Category: Account Security

17.After merging skype and microsoft accounts, skype account becomes also a microsoft account.

18 / 80

Category: Account Security

18.To turn off default public settings in venmo ones should follow the following steps:

19 / 80

Category: Account Security

19.To change the privacy settings of past transactions in venmo:

 

20 / 80

Category: Account Security

20.On iPhone, To set your PIN for venmo:(Choose all applicable answers)

21 / 80

Category: Account Security

21.To add a PIN code to the venmo app, ones need to perform the following actions:

22 / 80

Category: Account Security

22.Ones should link their Bank Account with venmo.

23 / 80

Category: Account Security

23.Which notification is not a type of venmo notifications?

24 / 80

Category: Account Security

24.Which steps should be taken to use zoom securely:(Choose all applicable answers)

25 / 80

Category: Account Security

25.Which steps should not be taken to use zoom securely:

26 / 80

Category: Account Security

26.The steps of setting zoom meeting password:

27 / 80

Category: Account Security

27.The steps of setting random zoom meeting IDs:

28 / 80

Category: Account Security

28.The steps of enabling waiting room:

29 / 80

Category: Account Security

29.To disable file transfer in zoom:

30 / 80

Category: Account Security

30.To disable Allow removed participants to rejoin in zoom:

 

31 / 80

Category: Account Security

31.To disable "Join before host" in zoom:

32 / 80

Category: Account Security

32.To Restrict permissions and screen sharing in zoom:

33 / 80

Category: Account Security

33.In order to lock meeting in zoom, following steps are at the bottom of your Zoom window: “Participants-->Lock Meeting”.

34 / 80

Category: Account Security

34.Which mail is the reporting mail of phishing for Netflix?

35 / 80

Category: Account Security

35.Which of the following section contains "Account Information" in Netflix?

36 / 80

Category: Account Security

36.Which of the following section contains "Communication Settings" in Netflix?

37 / 80

Category: Account Security

37.Which of the following section contains "Payment and Billing Information" in Netflix?

38 / 80

Category: Account Security

38.Which of the following section contains details of any profiles that have been created within your Netflix member account?

39 / 80

Category: Account Security

39.Which of the following section contains "IP address information" in Netflix?

40 / 80

Category: Account Security

40.Which of the following section contains "Content Interaction History" in Netflix?

41 / 80

Category: Social Media and Email Security

1.If you remove saved login information from a browser and want to login again , you have to enter your password and email.

42 / 80

Category: Social Media and Email Security

2.The steps of setting username in Facebook:

43 / 80

Category: Social Media and Email Security

3.Emails from Facebook about your account always come from:

44 / 80

Category: Social Media and Email Security

4.If you forget to log out from Facebook, later you can log out remotely.

45 / 80

Category: Social Media and Email Security

5.What are the steps to review list of devices on which you won’t have to use a login code in Facebook?

46 / 80

Category: Social Media and Email Security

6.What are the steps to set account as “Private Account” in Instagram?

47 / 80

Category: Social Media and Email Security

7.What are the supported method for 2FA in Instagram?

48 / 80

Category: Social Media and Email Security

8.To check where you’re logged in Instagram :

49 / 80

Category: Social Media and Email Security

9.While logging in from a public computer always mark the “Remember Me” box to be secure.

50 / 80

Category: Social Media and Email Security

10.Instagram shows security and login emails on ”Emails from Instagram” tab for:

51 / 80

Category: Social Media and Email Security

11. It's good to use at least _____ or more characters as LinkedIn password.

52 / 80

Category: Social Media and Email Security

12.What are the steps to set up Two-step verification on LinkedIn?

53 / 80

Category: Social Media and Email Security

13.You can’t add more than one email to an Linkedin  account according to Linkedin’s security policy.

54 / 80

Category: Social Media and Email Security

14.Which of the following you can see on LinkedIn’s  “Active sessions details”?

55 / 80

Category: Social Media and Email Security

15.From where you can see your permitted services in LinkedIN?

56 / 80

Category: Social Media and Email Security

16.Setting up 2FA can ensure no one can hack your Gmail account.

57 / 80

Category: Social Media and Email Security

17.Which of the following you can find from Gmail’s logged in devices section”?(Choose all applicable answers)

58 / 80

Category: Social Media and Email Security

18.To change password on Gmail:(Choose all applicable answers)

59 / 80

Category: Social Media and Email Security

19.From where you can update your recovery email for Gmail? (Choose all applicable answers)

60 / 80

Category: Social Media and Email Security

20.You can set  auto-delete option to your Web & App Activity associated with your Gmail, which are older than:(Choose all applicable answers)

61 / 80

Category: Social Media and Email Security

21.Which tab contains the “Manage third-party access” option in Gmail?

62 / 80

Category: Social Media and Email Security

22.Currently Yahoo doesn’t offer “Yahoo Account Key” for Login method.

63 / 80

Category: Social Media and Email Security

23.Yahoo shows sign in history for the_______

64 / 80

Category: Social Media and Email Security

24.Which of the following are good practices while creating passwords for Yahoo?(Choose all applicable answers)

65 / 80

Category: Social Media and Email Security

25.To set up Account Key for yahoo from browser,you need:

66 / 80

Category: Social Media and Email Security

26.Which of the following tab contains password changing option while using yahoo from browser?(Choose all applicable answers)

67 / 80

Category: Social Media and Email Security

27.To change password on AOL:

68 / 80

Category: Social Media and Email Security

28.To  enable 2-step verification on AOL:

69 / 80

Category: Social Media and Email Security

29.Which are the correct steps to enable recovery contact information on AOL?

70 / 80

Category: Social Media and Email Security

30.You should forward suspicious AOL emails to:

 

71 / 80

Category: Social Media and Email Security

31.Which are the correct steps to change twitter password from browser?

72 / 80

Category: Social Media and Email Security

32. Which are the correct steps to enable two-factor authentication on Twitter?

73 / 80

Category: Social Media and Email Security

33.To check logged devices and apps in twitter, you need to go to:

 

74 / 80

Category: Social Media and Email Security

34. If Password reset protection is enabled, you must provide ________ associated with your account in order to reset your password.

 

75 / 80

Category: Social Media and Email Security

35.Which of the following are available for Twitter’s two-factor verification ? (Choose all applicable answers)

 

76 / 80

Category: Social Media and Email Security

36.Which are the correct steps to enable password reset protect on twitter?

 

77 / 80

Category: Social Media and Email Security

37.Which of the following you can find from Twitter’s current active session?(Choose all applicable answers)

78 / 80

Category: Social Media and Email Security

38.Which of the following are available for Snapchat’s two-factor verification ?(Choose all applicable answers)

 

79 / 80

Category: Social Media and Email Security

39.Snapchat’s encryption is limited to snaps only, so it doesn’t apply to text messages or group chat messages sent on Snapchat.

80 / 80

Category: Social Media and Email Security

40.Whats the default option  set by Snapchat for your account?

0%

CCSP Test 4 (Module 1 to 4)

Cybersecurity Engineer Test

CCSP Test 4 (Module 1 to 4)

1 / 100

Category: Phishing and Social Engineering Attacks

1. Which statement is correct?

2 / 100

Category: Phishing and Social Engineering Attacks

2. An email from your boss asks for the name, addresses, and credit card information of the company’s top clients. The email says it’s urgent and to please reply right away. You should reply right away. True or False?

3 / 100

Category: Phishing and Social Engineering Attacks

3. If you fall for a phishing scam, what should you do to limit the damage?

4 / 100

Category: Phishing and Social Engineering Attacks

4. Look at the following image of HSBC login page: It’s not a phishing page.

5 / 100

Category: Phishing and Social Engineering Attacks

5. The following image proof that the email isn’t a phishing and a genuine email.

6 / 100

Category: Phishing and Social Engineering Attacks

6. You get a text message from a vendor who asks you to click on a link to renew your password so that you can log in to its website. You should:

7 / 100

Category: Phishing and Social Engineering Attacks

7. The best way to avoid phishing is to

8 / 100

Category: Phishing and Social Engineering Attacks

8. What should you look for in the URL to make sure that a site is safe before adding personal information?

9 / 100

Category: Phishing and Social Engineering Attacks

9. How can you detect a phishing scam?

10 / 100

Category: Phishing and Social Engineering Attacks

10. What is a phishing scam?

11 / 100

Category: Phishing and Social Engineering Attacks

11.  Which of the following would probably not help to prevent phishing?

12 / 100

Category: Phishing and Social Engineering Attacks

12. Which of the following describe 'Social engineering'? (Choose all applicable answers)

13 / 100

Category: Phishing and Social Engineering Attacks

13. Making phone calls to trick people into giving up information is known as ____

14 / 100

Category: Phishing and Social Engineering Attacks

14. Social Engineering takes advantage of which security flaw in a computer system?

15 / 100

Category: Phishing and Social Engineering Attacks

15. What cyber scam is described by this statement - "a cyber attack intended to redirect a website's traffic to another, fake site."

16 / 100

Category: Phishing and Social Engineering Attacks

16. What cyber scam is described by this statement - " fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication." (Choose all applicable answers)

17 / 100

Category: Phishing and Social Engineering Attacks

17. You can always tell the difference between a real website and a fake pharming website?

18 / 100

Category: Phishing and Social Engineering Attacks

18. Thieves look over your shoulder or even watch from a distance using binoculars, in order to get those pieces of information is:

19 / 100

Category: Phishing and Social Engineering Attacks

19. An unauthorized person wearing a fake ID badge, enters a secured area by closely following an authorized person through a door requiring key access is called:

20 / 100

Category: Phishing and Social Engineering Attacks

20. What information are scammers looking to gain through social engineering? (Choose all applicable answers)

21 / 100

Category: Phishing and Social Engineering Attacks

21. Which is NOT a sign of Fraudulent email attachment?

22 / 100

Category: Phishing and Social Engineering Attacks

22. Subset of electronic spam involving nearly identical message sent to many recipients by email

23 / 100

Category: Phishing and Social Engineering Attacks

23. Social engineering is designed to:

24 / 100

Category: Phishing and Social Engineering Attacks

24. Phishing can be mitigated through the use of: (Choose all applicable answers)

25 / 100

Category: Phishing and Social Engineering Attacks

25. "Hi! This is Sulaiman, CFO Secretary. I'm working on an urgent project and lost my system password. Can you help me out? ” Which one is correct of this human-based Social Engineering?

26 / 100

Category: Mobile Application Penetration Testing

1. Which attack vector used for financial loss? (Choose all applicable answers)

27 / 100

Category: Mobile Application Penetration Testing

2. TCP attacks are under in:

28 / 100

Category: Mobile Application Penetration Testing

3. Define full form of ADB.

29 / 100

Category: Mobile Application Penetration Testing

4. Mobile application threats are: (Choose all applicable answers)

30 / 100

Category: Mobile Application Penetration Testing

5. Which one doesn’t comply mobile device management?

31 / 100

Category: Mobile Application Penetration Testing

6. What are the proper steps of mobile penetration testing?

32 / 100

Category: Mobile Application Penetration Testing

7. Which operating system specially developed for mobile penetration testing? (Choose all applicable answers)

33 / 100

Category: Mobile Application Penetration Testing

8. What is the benefit of encryption on mobile devices?

34 / 100

Category: Mobile Application Penetration Testing

9. Jail breaking a phone refers to what?

35 / 100

Category: Mobile Application Penetration Testing

10. iOS is based on which operating system?

36 / 100

Category: Mobile Application Penetration Testing

11. What could a company do to protect itself from a loss of data when a phone is stolen? (Choose all applicable answers)

37 / 100

Category: Mobile Application Penetration Testing

12. A utility for auditing WordPress from Android is __________.

38 / 100

Category: Mobile Application Penetration Testing

13. What utility could be used to avoid sniffing of traffic?

39 / 100

Category: Mobile Application Penetration Testing

14. Jennifer has captured the following URL: www.se.com/&w25/session=22525. She realizes that she can perform a session hijack. Which utility would she use?

40 / 100

Category: Mobile Application Penetration Testing

15. Jennifer is concerned about her scans being tracked back to her tablet. What could she use to hide the source of the scans?

41 / 100

Category: Mobile Application Penetration Testing

16. What option would you use to install software that’s not from the Google Play store?

42 / 100

Category: Mobile Application Penetration Testing

17. Which technology can provide protection against session hijacking?

43 / 100

Category: Mobile Application Penetration Testing

18. When a device is rooted, what is the effect on security?

44 / 100

Category: Mobile Application Penetration Testing

19. Session hijacking can be thwarted with which of the following?

45 / 100

Category: Mobile Application Penetration Testing

20. A denial of service application for Android is __________.

46 / 100

Category: Mobile Application Penetration Testing

21. A man-in-the-browser attack delivered by a piece of malware can be prevented by which of the following?

47 / 100

Category: Mobile Application Penetration Testing

22. An attack that can be performed using FaceNiff is __________.

48 / 100

Category: Mobile Application Penetration Testing

23. Remote wipes do what? (Choose all applicable answers)

49 / 100

Category: Mobile Application Penetration Testing

24. A session hijack can be used against a mobile device using all of the following except?

50 / 100

Category: Mobile Application Penetration Testing

25. NetCut is used to do what? (Choose all applicable answers)

51 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

1. Which is not a designation of cyber security professional?

52 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

2. A vulnerability assessor and a penetration tester perform same functionality.

53 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

3. Which bug bounty platform is the best?

54 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

4. We can find cyber security related works at:________. (Choose all applicable answers)

55 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

5. Which job role is the highest paid?

56 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

6. Facebook, Google has their own bug bounty platform:

57 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

7. Which one is a bug bounty platform?

58 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

8. In a bug bounty platform, bug submission shouldn’t be:

59 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

9. Any newly discovered bug is defined as:

60 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

10. The full form of CEH is:

61 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

11. Full form of CISA is “Certified Information Security Auditor”

62 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

12. Full form of CISM:

63 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

13. Which certification is the highest paid in the world?

64 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

14. Which one is the most effective path to select

65 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

15. LPT is a certification of:

66 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

16. Choosing cyber security career path is the most basic step to be an information security analyst.

67 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

17. ISC2 stands for:

68 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

18. SANS stands for:

69 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

19. Which organizations need cyber security specialists? (Choose all applicable answers)

70 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

20. The job role of “Vulnerability Assessment and Penetration Testing” is for: ________ . (Choose all applicable answers)

71 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

21. LPT stands for:

72 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

22. Which is not a skill of cyber security engineers?

73 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

23. “PCI DSS” stands for:

74 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

24. Which policy is for healthcare sector?

75 / 100

Category: Vendor Certifications and Opportunities for Cyber Security Professionals

25. Cyber security specialists should have knowledge of cyber security guidelines and policy.

76 / 100

Category: Cyber Law and Ethics

1. If any person commits fraud by means of any digital or electronic medium then that activity of that particular person will be an offense under the Act and the person will be penalized with imprisonment for a term not exceeding ______ years or by fine not exceeding _____ lacs taka or with _____.

77 / 100

Category: Cyber Law and Ethics

2. If any person commits fraud by means of any digital or electronic medium then that activity of that particular person will be an offense under the Act for the second time, the person will be penalized with imprisonment for a term not exceeding ______ years or by fine not exceeding _____ lacs taka or with _____.

78 / 100

Category: Cyber Law and Ethics

3. Punishment for Publishing, sending of offensive, false or fear inducing data information second time is:

79 / 100

Category: Cyber Law and Ethics

4. If any person commits or aids and abets in committing an offence under Official Secrets Act, 1923 (Act No XIX of 1923) through computer, digital device, computer network, digital network or through any other digital medium then he will be punished to a term of imprisonment not exceeding 14(fourteen) years or with fine not exceeding Tk.25 (Twenty Five) Lac or with both.

80 / 100

Category: Cyber Law and Ethics

5. Punishment for Illegal Entrance in Critical Information Infrastructure for second time:

81 / 100

Category: Cyber Law and Ethics

6. Punishment for illegal entrance in computer, digital device, computer system, etc is:

82 / 100

Category: Cyber Law and Ethics

7. Punishment for second time damage of computer, computer System, etc is:

83 / 100

Category: Cyber Law and Ethics

8. What is the punishment for offenses relating to Computer Source Code Change?(Choose all applicable answers)

84 / 100

Category: Cyber Law and Ethics

9. Punishment for Any propaganda or campaign against liberation war, Cognition of liberation war, Father of the nation, National Anthem or National Flag:

85 / 100

Category: Cyber Law and Ethics

10. If any person commits forgery by means of any digital or electronic medium,  the person will be penalized with imprisonment for a term not exceeding 5 (five) years or with a fine not exceeding 5 (five) lacs taka or with both for second time.

86 / 100

Category: Cyber Law and Ethics

11. Punishment for Digital or Electronic Fraud for second time is:

87 / 100

Category: Cyber Law and Ethics

12. Punishment for Digital or Electronic Forgery is:

88 / 100

Category: Cyber Law and Ethics

13. If any person intentionally or knowingly uses any computer, computer Program, computer system, computer network, digital device, digital system or digital network with the intention of deceiving or cheating carries the identity of another person or shows any person’s identity as his own, or intentionally by forgery assuming the identity of a alive or dead person as one’s own for the following purpose will be penalized by imprisonment for a term not exceeding 5 (five) years or fine not exceeding 5 (five) lacs taka or both.

89 / 100

Category: Cyber Law and Ethics

14. If any person without any legal authority collects, sells, takes possession, supplies or uses any person’s identity information then the punishment will be:

90 / 100

Category: Cyber Law and Ethics

15. Punishment for committing Cyber-terrorism is:

91 / 100

Category: Cyber Law and Ethics

16. Punishment for Publication, Broadcast, etc. of such information in any website or in any electronic format that hampers the religious sentiment or values is:

92 / 100

Category: Cyber Law and Ethics

17. Punishment for publishing, broadcasting etc defamation information is:

93 / 100

Category: Cyber Law and Ethics

18. E-Transaction without legal authority Offence and Punishment is:

94 / 100

Category: Cyber Law and Ethics

19. The Deterioration of Act-order and Punishment is:

95 / 100

Category: Cyber Law and Ethics

20. Punishment for Breaching Government Secret Offence is:

96 / 100

Category: Cyber Law and Ethics

21. Punishment of Illegal Transferring, Saving etc. of Data-Information can be:

97 / 100

Category: Cyber Law and Ethics

22. If a person commits hacking then it will be considered an offence for second time or repeatedly then:

98 / 100

Category: Cyber Law and Ethics

23. If a person cause financial damage to another person under Section 22 digital or electronic forgery, under Section 23 digital or electric fraud and under Section 24 identification fraud or by means of disguise, the tribunal, may order him to compensate the affected person by giving money equivalent to the damage caused or a suitable amount after considering the damage caused.

99 / 100

Category: Cyber Law and Ethics

24. The Offence mentioned in Sections 17, 19, 21, 22, 23, 24, 26, 27, 28, 30, 31, 32, 33 and 34 are imperceptible and bailable offence.

100 / 100

Category: Cyber Law and Ethics

25. If a person cause financial damage to another person under Section 22 digital or electronic forgery, under Section 23 digital or electric fraud and under Section 24 identification fraud or by means of disguise, the tribunal, may order him to compensate the affected person by giving money equivalent to the damage caused or a suitable amount after considering the damage caused.

0%

CCSP Test 2 (Module 1 to 4)

Cybersecurity Engineer Test

CCSP Test 2 (Module 1 to 4)

1 / 100

Category: Vulnerability Assessment and Scanning Segment -02

1. You are a consultant for an IT company. Your boss asks you to determine the topology of the network. What is the best device to use in this circumstance? 

2 / 100

Category: Vulnerability Assessment and Scanning Segment -02

2. Which of the following can enable you to find all the open ports on an entire network?

3 / 100

Category: Vulnerability Assessment and Scanning Segment -02

3. What can hackers accomplish using malicious port scanning?

4 / 100

Category: Vulnerability Assessment and Scanning Segment -02

4. Why would a security administrator use a vulnerability scanner?

5 / 100

Category: Vulnerability Assessment and Scanning Segment -02

5. Using 3-way handshake, it is possible to check for open ports.

6 / 100

Category: Vulnerability Assessment and Scanning Segment -02

6. Port scanning is a method of finding out which services a host computer offers

7 / 100

Category: Vulnerability Assessment and Scanning Segment -02

7. A closed port can be vulnerable to an attack

8 / 100

Category: Vulnerability Assessment and Scanning Segment -02

8. Wireshark capture performance is inversely proportional to packet size

9 / 100

Category: Vulnerability Assessment and Scanning Segment -02

9. Wireshark detects TCP retransmissions using which of the following methods?

10 / 100

Category: Vulnerability Assessment and Scanning Segment -02

10. Which of the following is NOT mitigated by Network Security?

11 / 100

Category: Vulnerability Assessment and Scanning Segment -02

11. which command below will perform a ping scan on a host’s IP address?

12 / 100

Category: Vulnerability Assessment and Scanning Segment -02

12. How are hosts identified?

13 / 100

Category: Vulnerability Assessment and Scanning Segment -02

13. A ______________ is a simple network scanning technique used for determining which range of IP address map to live hosts.

14 / 100

Category: Vulnerability Assessment and Scanning Segment -02

14. Wireshark is a ____________ tool

15 / 100

Category: Vulnerability Assessment and Scanning Segment -02

15. The TCP handshake consists of SYN, SYN/ACK and ACK packets

16 / 100

Category: Vulnerability Assessment and Scanning Segment -02

16. The filter ip.addr == 10.10.10.10 can be used as a capture filter

17 / 100

Category: Vulnerability Assessment and Scanning Segment -02

17. Which of this Nmap do not check?

18 / 100

Category: Vulnerability Assessment and Scanning Segment -02

18. Port number 443 and 23 is used by which of the following?

19 / 100

Category: Vulnerability Assessment and Scanning Segment -02

19. ICMP is used in

20 / 100

Category: Vulnerability Assessment and Scanning Segment -02

20. What type of scan is defined by following command: nmap -O 192.168.0.101

21 / 100

Category: Vulnerability Assessment and Scanning Segment -02

21. Which command provides all port scanning function:

22 / 100

Category: Vulnerability Assessment and Scanning Segment -02

22. Scanning is performed in which phase of a pen test?

23 / 100

Category: Vulnerability Assessment and Scanning Segment -02

23. In port scanning, a _________ is always associated with an IP address (usually of the host system) & the type of protocol (UDP or TCP) employed for communication

24 / 100

Category: Vulnerability Assessment and Scanning Segment -02

24. Which of them is not a standard scanning type or terminology?

25 / 100

Category: Vulnerability Assessment and Scanning Segment -02

25. ____________ scanning is a procedure to identify active hosts on your network

26 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

1. According to OWASP what is the most dangerous web vulnerability?

27 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

2. What is sql injection? 

28 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

3. SQL injection is an attack in which _________ code is inserted into strings that are later passed to an instance of SQL Server

29 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

4. _______________ is time based SQL injection attack

30 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

5. Which of the following is NOT a characteristic of a SQL injection attack?

31 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

6. All of the following are SQL vulnerabilities EXCEPT _____

32 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

7. Point out the wrong statement

33 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

8. Which of the following script is an example of Quick detection in the SQL injection attack?

34 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

9. Which statement is used to extract data from a database?

35 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

10. With SQL, how do you select all the columns from a table named "Persons"?

36 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

11. Which character returns all the data found in a table?

37 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

12. Where can we use SQL injection ?(Choose all applicable answers)

38 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

13. SQL injection is used in web application only

39 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

14. How does SQL Injection Work?

40 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

15. Why is SQL Injection Significant?

41 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

16. What is it called when we move from privileges to privileges in a database server?

42 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

17. Which character is most likely to be used for an SQL injection attack

43 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

18. Which of the following is NOT a SQL command?

44 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

19. SQL injection is not that common and does not cause much damage when launched against a website

45 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

20. Which of the following automated tools are used for SQLi attack ?

46 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

21. Database errors should:

47 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

22. An SQL injection is often used to attack what?

48 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

23. What types of attack can not be occur using SQL injection?

49 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

24. Which type of sql injection is this: http : // example.com / index . php ? id = 1 ' and 0 union select 1,2,3-- -

50 / 100

Category: SQL Injection -01 (Introduction & Basic SQLi)

25. How can we prevent SQL Injection? (Choose all applicable answers)

51 / 100

Category: SQL Injection 02 (Firewall & Firewall Bypassing Techniques)

1. Which of the following script is example of SQL injection attack?

52 / 100

Category: SQL Injection 02 (Firewall & Firewall Bypassing Techniques)

2. Select the firewall bypass method during sql injection in MySQL : (Choose all applicable answers)