Basic Cybersecurity Test

Pre-Employment Tests

Basic Cybersecurity Test

Welcome to Basic Cybersecurity Test. Please attend the quiz in a quite place and with a stable internet connection. An use of unauthorized medium or any unfairness will violate the exam policy.

1 / 40

Category: Networking

Q1: Which program prevents unauthorized external access to a system?

2 / 40

Category: Networking

Q2: Which of the following statements about the ping command is correct?

3 / 40

Category: Networking

Q3: When contrasted to the TCP/IP paradigm, which of the following layers is an addition to the OSI model?

4 / 40

Category: Networking

Q4: The IP address provided to a client by a DHCP server _________

5 / 40

Category: Networking

Q5: Which of the following topologies does not belong to the broadcast category?

6 / 40

Category: Linux

Q1: What is the operating system's core?

7 / 40

Category: Linux

Q2: How do you add a file called "testfile" to the test.tar file?

8 / 40

Category: Linux

Q3. When a file is deleted from a Unix system using the ‘rm' command,

9 / 40

Category: Linux

Q4. Which of the following facilitates fast file system recovery?

10 / 40

Category: Linux

Q5. Kali Linux is a ______?

11 / 40

Category: Windows

Q1: The is a Microsoft security utility that is incorporated into Windows OS and is designed to filter network data from your Windows system and prohibit hazardous communications or the apps that initiate them.

12 / 40

Category: Windows

Q2. What run command can you use to see what apps are loaded, when you boot up your computer?

13 / 40

Category: Windows

Q3. Which command is used to create a directory or a subdirectory?

14 / 40

Category: Python

Q1. What will the following Python statement produce? >>>"tfltd"[2:]

15 / 40

Category: Python

Q2. What happens when the expression '5' == 5 is executed?

16 / 40

Category: Python

Q3. Why is the keyword ‘pass' used in a Python program?

17 / 40

Category: VAPT

Q1. What types of restriction is given by white box pentesting?

18 / 40

Category: VAPT

Q2. From below metioned statement Which one is the fist step for a security scanning process?

19 / 40

Category: VAPT

Q3. How anyone can know that a data breach has occurred on specific devices like pc, laptops, mobile?

20 / 40

Category: VAPT

Q4. Which methods of scanning do a good tester should perform for a vulnerability assessment and penetration testing?

21 / 40

Category: Web App Security

Q1. From below mentioned statement which one is not an XSS attack?

22 / 40

Category: Web App Security

Q2. Choose two client side attack?

23 / 40

Category: Web App Security

Q3. Acunetix and burp suite are usually used for?

24 / 40

Category: Web App Security

Q4. Which of the following can be regarded as a potential remedy for the SQL injection vulnerability?

25 / 40

Category: Web App Security

Q5. From the following statement Which one is not on OWASP's top 10 web application security risks?

26 / 40

Category: Wifi security and general hacking questions

Q1. This is the foremost used tool the works best for WEP and WPA cracking. This tool is additionally used FMS attack technique, PTW attack method?

27 / 40

Category: Wifi security and general hacking questions

Q2. Most vulnerable endpoint to an organization that uses online activity?

28 / 40

Category: Wifi security and general hacking questions

Q3. By which techniques it would be possible to break the supreme secure endpoint?

29 / 40

Category: Wifi security and general hacking questions

Q4. Which is not a sniffing attacks?

30 / 40

Category: Wifi security and general hacking questions

Q5. Which of the subsequent isn't an external threat to a laptop or a network?

31 / 40

Category: SQL

Q1: Which of the put away technique is utilized to test the SQL injection attack?

32 / 40

Category: SQL

Q2: What is a primary key ?

33 / 40

Category: SQL

Q3: How many types of Join are there in SQL ?

34 / 40

Category: Mobile Security

Q1: Phone OS contains open APIs that might be _____________ attack.

35 / 40

Category: Mobile Security

Q2: Which of the accompanying device is utilized for Blackjacking?

36 / 40

Category: Mobile Security

Q3: How to scan a mobile device vulnerability ?

37 / 40

Category: Mobile Security

Q4: Is it possible to record whatsapp call with SS7 Exploit?

38 / 40

Category: Malware/ Ransomware / Spyware/ Rootkit

Q1: Which malware cannot generate copies of themselves or clone them?

39 / 40

Category: Malware/ Ransomware / Spyware/ Rootkit

Q2:  Which of the malware gives privileges to the attacker's administrative controls and allows to do almost anything with the infected computers?

40 / 40

Category: Malware/ Ransomware / Spyware/ Rootkit

Q3: Which is valid about Worms?

0%