1. To access over a
web server and its associated software is ………
hacking b. Ethical hacking c. Website hacking d. Computer hacking
2. In 1999, ______ stole the source code of the International
Space Station among other sensitive information of NASA.
a. Kevin Mitnick b.
Johan Helsinguis c. Linus
Torvalds d. Jonathan James
3._________ is a
filter designed to keep unwanted intruders outside a computer system or network
a. Exploit kit b.
Denial of services c. Firewall d. Spyware
5. What is OSCP
Security Certified Professional
Security Control Protocol
System Certified Professional
d. Online Status
6. In 2014, _____Malware designed to compromise
Point-of-Sale (POS) systems to steal credit card data
a. MyDoom b.Backoff c. Cryptolocker d.koobface
7. What is
the name of the viruses that fool a user into get and/or run them by pretending
to be useful applications?
a. iloveyou b. Worm c. Trojan horses d.CryptoLocker
9. _____ virus which keep out of
sight themselves to avoid detection from
any of the trusted resources
a. malware b.
10. Which of the program takes
certain functionalities of internet to
redirect into hackers start page?
a. Hijackers b.
Adware c. Dialer d. X-trojan