250+ TOP MCQs on Cyber Laws and IT laws and Answers

Cyber Security Quiz on “Cyber Laws and IT laws”.

1. Accessing computer without prior authorization is a cyber-crimes that come under _______
a) Section 65
b) Section 66
c) Section 68
d) Section 70

Answer: b
Clarification: Under section 66 of IT Act, 2000 which later came up with a much broader and precise law says that without prior authorization or permission, if any individual access any computer system, it is a cyber-crime.

2. Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.
a) Section 65
b) Section 66
c) Section 68
d) Section 70

Answer: b
Clarification: Under section 66 of IT Act, 2000 which later came up with a much broader and precise law (as IT Act, 2008) says that if any individual steals the identity or misuse any victim’s identity for his/her own profit, it is a cyber-crime.

3. Accessing Wi-Fi dishonestly is a cyber-crime.
a) True
b) False

Answer: a
Clarification: Under section 66 of IT Act, 2000 which later came up with a much broader and precise law (as IT Act, 2008) says that if any individual access anyone’s Wi-Fi network without the permission of the owner or for doing a malicious activity, it is a cyber-crime.

4. Download copy, extract data from an open system done fraudulently is treated as _________
a) cyber-warfare
b) cyber-security act
c) data-backup
d) cyber-crime

Answer: d
Clarification: Download copy, extract data from an open system done fraudulently is treated as according to section 66 of the Indian IT Act.

5. Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________
a) 2 lacs
b) 3 lacs
c) 4 lacs
d) 5 lacs

Answer: d
Clarification: Any cyber-crime that comes under section 66 of the Indian IT Act, the person accused of such cyber-crime gets fined of around five lacs rupees.

6. How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?
a) 1 year
b) 2 years
c) 3 years
d) 4 years

Answer: c
Clarification: Any cyber-crime that comes under section 66 of the Indian IT Act, the person accused of such cyber-crime gets fined of around five lacs rupees and 3 years of imprisonment.

7. Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.
a) Section 66
b) Section 67
c) Section 68
d) Section 69

Answer: b
Clarification: Any digital content which is either lascivious is not acceptable by the society or viewers or that digital item corrupts the minds of the audience, then the creator of such contents falls under the cyber-crime of section 67 of the Indian IT Act.

8. IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.
a) section 67-A
b) section 67-B
c) section 67-C
d) section 67-D

Answer: a
Clarification: IT Act 2008 makes cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under section 67 – A he/she has to pay a legitimate amount of fine.

9. If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.
a) 2
b) 3
c) 4
d) 5

Answer: d
Clarification: IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under section 67 – A he/she has to pay a legitimate amount of fine and imprisonment of five years.

10. Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.
a) Section 66
b) Section 67
c) Section 68
d) Section 69

Answer: b
Clarification: Using of spy cameras in malls and shops to capture private parts of any person, without the concern of that victim, then it comes under section 67 of IT Act, 2008 as a punishable offense.

11. Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.
a) True
b) False

Answer: a
Clarification: Using of spy cameras in malls and shops to capture private parts of any person, without the concern of that victim, then it comes under section 67 of IT Act, 2008 where the person doing such crime is punished with a fine of Rs. 5 Lacs.

12. Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________
a) 2 years
b) 3 years
c) 4 years
d) 5 years

Answer: b
Clarification: Using of spy cameras in malls and shops to capture private parts of any person, without the concern of that victim, then it comes under section 67 of IT Act, 2008 where the person doing such crime is punished with imprisonment of 3 years.

13. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
a) section 65
b) section 66
c) section 71
d) section 72

Answer: d
Clarification: Cyber-criminals and black hat hackers do one common form of cyber-crime that is a misuse of digital signatures. The law for this fraudulent act comes under section 72 of the Indian IT Act.

14. Sending offensive message to someone comes under _____________ of the Indian IT Act ______
a) section 66-A, 2000
b) section 66-B, 2008
c) section 67, 2000
d) section 66-A, 2008

Answer: d
Clarification: Sending an offensive message, emails o any digital content through an electronic medium to your recipient is a punishable offense that comes under section 66 – A of the Indian IT Act, 2008.

15. Stealing of digital files comes under __________ of the Indian IT Act.
a) section 66-A
b) section 66-B
c) section 66-C
d) section 66-D

Answer: c
Clarification: Stealing of digital files, e-documents from any system or cloud or electronic device is a punishable offense that comes under section 66 – C of the Indian IT Act.

16. Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.
a) True
b) False

Answer: a
Clarification: Section 79 of the Indian IT Act covers some of the corporate and business laws circulating technologies and cyberspace; declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.

250+ TOP MCQs on Email Security and Answers

Cyber Security Multiple Choice Questions on “Email Security”.

1. There are _______ major ways of stealing email information.
a) 2
b) 3
c) 4
d) 5

Answer: b
Clarification: There are three major ways of stealing email information. These are by stealing cookies, social engineering and password phishing technique.

2. Which of them is not a major way of stealing email information?
a) Stealing cookies
b) Reverse Engineering
c) Password Phishing
d) Social Engineering

Answer: b
Clarification: There are three major ways of stealing email information. These are by stealing cookies, social engineering and password phishing technique. Reverse engineering is not a way of stealing email information.

3. ____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.
a) Email security
b) Email hacking
c) Email protection
d) Email safeguarding

Answer: a
Clarification: Email security is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.

4. _____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.
a) Cloud
b) Pen drive
c) Website
d) Email

Answer: d
Clarification: Email is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks and to entice recipients in divulging sensitive information, by open attachments and/or by clicking on hyperlinks which in background install malware on the victim’s device.

5. Which of them is not a proper method for email security?
a) Use Strong password
b) Use email Encryption
c) Spam filters and malware scanners
d) Click on unknown links to explore

Answer: d
Clarification: Use of strong passwords and email encryption other than planting spam filters and installing malware scanners are some of the proper methods for email security.

6. If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.
a) True
b) False

Answer: a
Clarification: If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. This helps in initiating cookie stealing attack.

7. The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans.
a) attackers, malware
b) hackers, antivirus
c) penetration testers, malware
d) penetration testers, virus

Answer: a
Clarification: If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. This stored cookie which contains all your personal data about that website can be stolen away by attackers using malware or trojans.

8. If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.
a) memory
b) quarantine
c) cookies
d) hard drive

Answer: c
Clarification: If the data stored in the cookies is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.

9. Which of the following is a non-technical type of intrusion or attack technique?
a) Reverse Engineering
b) Malware Analysis
c) Social Engineering
d) Malware Writing

Answer: c
Clarification: Social Engineering is a non-technical type of intrusion or attack technique which relies heavily on human interaction. It involves tricking target users to break normal security postures.

10. Which of them is an example of grabbing email information?
a) Cookie stealing
b) Reverse engineering
c) Port scanning
d) Banner grabbing

Answer: a
Clarification: There are three major ways of stealing email information. These are by stealing cookies, social engineering and password phishing technique. The remaining three (in the option) are not ways of stealing email information.

11. _____________ is the technique used for tricking users to disclose their username and passwords through fake pages.
a) Social Engineering
b) Phishing
c) Cookie Stealing
d) Banner Grabbing

Answer: b
Clarification: Phishing is the technique used for tricking users to disclose their username and passwords through fake pages.

12. Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails.
a) trojans, redirected malicious URLs
b) antivirus, patches
c) cracked software, redirected malicious URLs
d) malware, security patches

Answer: a
Clarification: Using email hacking illicit hackers can send & spread malware, trojans, virus, worms, redirected malicious URLs which can take the target recipients to some infected webpage also.

13. Unsolicited Bulk E-mails (UBI) are called __________
a) SMS
b) MMS
c) Spam emails
d) Malicious emails

Answer: c
Clarification: Unsolicited Bulk E-mails (UBI) are an act of sending unwanted emails which one has no specific or important thing in it. Email spams are actually junk emails that are sent by commercial firms as an advertisement of their products and services.

14. Fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information.
a) True
b) False

Answer: a
Clarification: Yes, fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information. Email users must stay aware of such e-frauds.

15. Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as _____________ details _________ and passwords.
a) credit card, antivirus name
b) credit card, login ID
c) cell phone, antivirus name
d) car model, account ID

Answer: b
Clarification: Fraudulent email messages are some fake email messages that seem legitimate which ask for your confidential bank details such as credit card details, cell phone number, Login ID and passwords.

250+ TOP MCQs on Web Server Attacks and Answers

Cyber Security Multiple Choice Questions on “Web Server Attacks”.

1. Which of the following is not an appropriate way to compromise web servers?
a) Misconfiguration in OS
b) Using network vulnerabilities
c) Misconfiguration in networks
d) Bugs in OS which allow commands to run on web servers

Answer: b
Clarification: Websites get hosted on web servers. Web servers are actually computers running that makes us available & accessible files (web pages) through the internet. Various ways that can help compromise a web server are a misconfiguration of network or OS, bugs in web server’s OS etc.

2. Which of the following is not an appropriate method of defacing web server?
a) Fetching credentials through MiTM
b) Brute-forcing Admin Password
c) IP address spoofing
d) DNS Attack through cache poisoning

Answer: c
Clarification: Various ways which can help a hacker deface the web server. These are by fetching credentials through MiTM, brute-forcing administrator password, DNS attack through cache poisoning, FTP server intrusion and many more.

3. Which of the following is not an appropriate method of defacing web server?
a) Mail server intrusion
b) Web application bugs
c) Web shares misconfiguration
d) Sessions hijacking

Answer: d
Clarification: Defacing the web server can be done in various ways by fetching credentials through brute-forcing administrator password, through cache poisoning, mail server intrusion, web app bugs and many more.

4. _________ is one of the most widely used web server platforms.
a) IIS
b) IAS
c) ISS
d) AIS

Answer: a
Clarification: Websites get hosted on web servers. Web servers are actually computers running that makes us available & accessible files (web pages) through the internet. IIS is one of the most widely used web server platforms.

5. IIS stands for __________________
a) Interconnected Information Server
b) Interconnected Information Services
c) Internet Information Server
d) Internet Information Services

Answer: d
Clarification: Web servers are actually computers running that makes us available & accessible files (web pages) through the internet. The most widely used web server platform is the IIS (Internet Information Services).

6. ____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote PC.
a) Spyware
b) ASP Trojan
c) Web ransomware
d) Stuxnet

Answer: b
Clarification: ASP Trojan is a tiny script that if uploaded to a web server can give hacker complete control of remote PC. ASP Trojan can be easily attached to web applications creating a backdoor in web server hacking.

7. ____________ logs all the visits in log files which is located at <%systemroot%>logfiles.
a) IIS
b) Microsoft Server
c) Linux
d) IAS

Answer: a
Clarification: Internet Information Services logs all the visits in log files which are located at <%systemroot%>logfiles. IIS (Internet Information Services) is one of the most widely used web server platforms.

8. Which of the following is not a web server attack type?
a) DOS attack
b) Website Defacement using SQLi
c) Directory Traversal
d) Password guessing

Answer: d
Clarification: The web servers are actually computers running that makes us available & accessible files (web pages) through the internet. Different web server attack types are through DOS attack, website defacement using SQLi and directory traversal.

9. ______________ tool clears the log entries in the IIS log files filtered by an IP address.
a) CleanIISLoging
b) CleanLogger
c) CleanIISLog
d) ClearIISLog

Answer: c
Clarification: IIS (Internet Information Services) is one of the most widely used web server platform. IIS logs all the visits in log files which are located at <%systemroot%>logfiles. CleanIISLog tool clears the log entries in the IIS log files filtered by an IP address.

10. CleanIISLog is not a hacking tool.
a) True
b) False

Answer: b
Clarification: CleanIISLog tool is used to clear the log entries in the IIS log files filtered by an IP address. It is a hacking tool which can help in easily remove all traces of her log file from the server.

11. Which of the following is not an appropriate countermeasure for web server hacking?
a) Patch updates need to be done regularly
b) Not to use default configurations
c) Use IDS and firewalls with signature updates
d) Use low-speed internet

Answer: d
Clarification: To protect against web server hacking, one need to patch updates regularly, not to use default configurations, use IDS and firewalls with signature updates.

12. Which of the following is not an appropriate countermeasure for web server hacking?
a) Using OS or antivirus without updates
b) Scan web server applications for vulnerabilities
c) Using secure protocols
d) Follow strict access control policy

Answer: a
Clarification: For defending against web server hacking, one needs to scan web server applications for vulnerabilities, make use of secure protocols, and follow strict access control policy.

250+ TOP MCQs on Deep Web and Darknet and Answers

Cyber Security Multiple Choice Questions on “Deep Web and Darknet”.

1. The ____________ is anything which your search engine cannot search.
a) Haunted web
b) World Wide Web
c) Surface web
d) Deep Web

Answer: d
Clarification: The Deep Web is anything which your search engine cannot search. Whereas, the surface web is that part of the web which can be indexed by any popular search engine.

2. The ______________ is categorized as an unknown segment of the Deep Web which has been purposely kept hidden & is inaccessible using standard web browsers.
a) Haunted web
b) World Wide Web
c) Dark web
d) Surface web

Answer: c
Clarification: The Dark web is categorized as an unknown segment of the Deep Web which has been purposely kept hidden & is inaccessible using standard web browsers.

3. ________________ is a network construct over the internet that is encrypted. It offers anonymity to its users. Tor (The Onion Router) is a common service of Darknet.
a) Freenet
b) Darknet
c) ARPANET
d) Stuxnet

Answer: b
Clarification: Darknet is a network construct over the internet that is encrypted. It offers anonymity to its users. Tor (The Onion Router) is a common service of Darknet.

4. A special tool is necessary for entering the network which is _______________ that helps the anonymous internet users to access into the Tor’s network and use various Tor services.
a) Opera browser
b) Mozilla browser
c) Chrome browser
d) Tor browser

Answer: d
Clarification: Special tool is necessary for entering the network which is a Tor browser that helps the anonymous internet users to access into the Tor’s network and use various Tor services.

5. ____________ is also a part of darknet that is employed for transferring files anonymously.
a) Freenet
b) Darknet
c) ARPANET
d) Stuxnet

Answer: a
Clarification: A network construct over the internet that is encrypted and not always accessible is the darknet. It offers anonymity to its users. Freenet is also a part of darknet that is employed for transferring files anonymously.

6. One example of a popular website on ______________ is the silk-road that was used to sell drugs that were later taken down by the FBI.
a) Freenet
b) Darknet
c) ARPANET
d) Stuxnet

Answer: b
Clarification: Darknet offers anonymity to its users. It has a collection of websites with special anonymous features. One example of a popular website on darknet is the silk-road that was used to sell drug which was later taken down by the FBI.

7. Deep web is also known as ______________
a) Freenet
b) Darknet
c) ARPANET
d) Hidden web

Answer: d
Clarification: Deep Web is also known as the hidden web. Whereas, the surface web is that part of the web which can be indexed by any popular search engine. This invisible web is not indexed by standard search engines.

8. The popular computer scientist _____________ has coined the term “deep web” in the year 2001.
a) Mr. Tim B. Lee
b) Mr. Narcos Maralli
c) Mr. Michael K. Bergman
d) Mr. Ken Thompson

Answer: c
Clarification: The popular computer scientist Mr. Michael K. Bergman has coined the term “deep web” in the year 2001. The Deep Web is anything which your search engine cannot search.

9. The popular computer scientist Mr. Michael K. Bergman has coined the term “deep web” in the year ____________
a) 2000
b) 2001
c) 2002
d) 2003

Answer: b
Clarification: The popular computer scientist Mr. Michael K. Bergman has coined the term “deep web” in the year 2001. This invisible web uses the encrypted browser and search engines and so is not indexed by standard search engine.

10. The __________ was a huge marketplace of Dark Web specifically famous for selling of illegal drugs & narcotics as well as you can find a wide range of other goods for sale.
a) Silk Road
b) Cotton Road
c) Dark Road
d) Drug Road

Answer: a
Clarification: The Silk Road was a huge marketplace of Dark Web specifically famous for selling of illegal drugs & narcotics as well as you can find a wide range of other goods for sale.

11. Your online activity can still be tracked even if you use different Tor services, but not in much detail.
a) True
b) False

Answer: a
Clarification: The Tor browser helps the anonymous internet users to access into the Tor’s network & use various Tor services. Though it preserves your anonymity your online activity can still be tracked even if you use different Tor services, but not in much detail.

12. Tor (The Onion Router) is not a service or part of the darknet.
a) True
b) False

Answer: b
Clarification: Tor (The Onion Router) is not a service or part of the darknet. A special tool is necessary for entering the network which is a Tor browser that helps the anonymous internet users to access into the Tor’s network and use various Tor services.

250+ TOP MCQs on Hacking Terminologies and Answers

Cyber Security Multiple Choice Questions on “Hacking Terminologies”.

1. ________ is any action that might compromise cyber-security.
a) Threat
b) Vulnerability
c) Exploit
d) Attack

Answer: a
Clarification: Threat can be termed as a possible danger that may lead to breach the cyber security and may cause possible harm to the system or the network.

2. Existence of weakness in a system or network is called _______
a) Threat
b) Vulnerability
c) Exploit
d) Attack

Answer: b
Clarification: Vulnerability is the term used to define weakness in any network or system that can get exploited by an attacker. Exploiting the weakness can lead to the unexpected & undesirable event in cyber security.

3. When any IT product, system or network is in need for testing for security reasons, then the term used is called _________
a) Threat
b) Vulnerability
c) Target of Evaluation
d) Attack

Answer: c
Clarification: Target of Evaluation is the term used when any IT infrastructure, system, network require evaluation for security reasons or for fixing any bugs after being tested by penetration testers.

4. An/A ________ is an act that violates cyber-security.
a) Threat
b) Vulnerability
c) Exploit
d) Attack

Answer: d
Clarification: An “attack” or “cyber-attack” is an attempt taken by attackers to alter, delete, steal or expose any specific data by gaining unauthorized access.

5. ________ is a way to breach the security by using the vulnerability of that system.
a) Threat
b) Vulnerability
c) Exploit
d) Attack

Answer: c
Clarification: An exploit can be any data, piece of code, a program, sequence of commands or any software that uses the vulnerability or flaw of a system and helps attackers or cyber-criminals cause unanticipated behaviour.

6. _________ is an act of hacking by the means of which a political or social message is conveyed.
a) Hacktivism
b) Whistle-blowing
c) Surveillance
d) Pseudonymization

Answer: a
Clarification: Hacktivism is an act of defacing a website, or any network or system. Systems and networks are compromised with a political or social agenda.

7. _______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.
a) Data copying
b) Data masking
c) Data breaching
d) Data duplicating

Answer: b
Clarification: Data masking is the method used for developing or creating a structurally similar version of data of any organization that is not authentic. These types of unauthentic data are purposefully created for protecting the actual data.

8. Data masking is also known as _________
a) Data obfuscation
b) Data copying
c) Data breaching
d) Data duplicating

Answer: a
Clarification: Data obfuscation is the alternate term used for data masking, that is used for developing or creating a structurally similar version of data of any organization that is not authentic. These types of unauthentic data are purposefully created for protecting the actual data.

9. ________ automates an action or attack so that repetitive tasks are done at a faster rate.
a) Auto-bots
b) Cookie-bots
c) Robots
d) Bots

Answer: d
Clarification: Bots are a set of codes written which helps to perform repetitive tasks at a much faster rate than humans.

10. Backdoors are also known as ____________
a) Trap doors
b) Front doors
c) Cover doors
d) Back entry

Answer: a
Clarification: Trap-doors are hidden entry points in any already hacked system that is set to bypass security measures.

11. Adware are pre-chosen _______ developed to display ads.
a) banner
b) software
c) malware
d) shareware

Answer: b
Clarification: Adware is software that is displayed on system or web pages for showing pre-chosen ads.

12. ________ is an attack technique occurs when excess data gets written to a memory block.
a) Over buffering
b) Buffering
c) Buffer overflow
d) Memory full

Answer: c
Clarification: Buffer overflow is a flaw that occurs in memory when excessive data is written which makes the buffer allocated to seize.

13. Finding & publishing any user’s identity with the help of different personal details is called ________
a) Doxing
b) Data breaching
c) Personal data copying
d) Secure File Transferring Protocol

Answer: a
Clarification: When an identity of internet user is discovered and published by following his/her details over the internet is called doxing.

14. In IP address, IP is abbreviated as __________
a) Internet Program
b) Internet Protocol
c) Intuition Programs
d) Internet Pathway

Answer: b
Clarification: In IP Address, IP is abbreviated as Internet Protocol. It acts as a unique address or identifier of any computer or device in the internet.

15. Whaling is the technique used to take deep and _________ information about any individual.
a) sensitive
b) powerful
c) useless
d) casual

Answer: a
Clarification: Whaling uses phishing technique which helps hackers in stealing deep and sensitive information about any member of an organization. The information can be private addresses, phone number, future plans and projects, salary and bonuses.

250+ TOP MCQs on Popular Tools used in Security and Answers

Cyber Security Multiple Choice Questions on “Popular Tools used in Security”.

1. Which of the following attach is not used by LC4 to recover Windows password?
a) Brute-force attack
b) Dictionary attack
c) MiTM attack
d) Hybrid attacks

Answer: c
Clarification: LC4 is a password auditing and recovery tool; used for testing strength of a password and also helps in recovering lost Microsoft Windows passwords using a hybrid attack, brute-force attack as well as using a dictionary attack.

2. ____________ is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network.
a) Wireshark
b) Nessus
c) Snort
d) WebInspect

Answer: b
Clarification: Nessus is a popular and proprietary network vulnerability scanning tool developed by Tenable Network Security. It helps in easily identifying vulnerabilities and fix them, which includes missing patches and software flaws.

3. _____________ is a tool which can detect registry issues in an operating system.
a) Network Stumbler
b) Ettercap
c) Maltego
d) LANguard Network Security Scanner

Answer: d
Clarification: LANguard Network Security Scanner helps in monitoring networks by scanning connected machines to provide information for every node. It can also be used for identifying registry issues.

4. Network Stumbler is a Windows Wi-Fi monitoring tool.
a) True
b) False

Answer: a
Clarification: Network Stumbler is a popular tool that helps in detecting WLANs and helps hackers in finding non-broadcasting wireless networks. It is popularly used as Wi-Fi scanning and monitoring tool for Windows.

5. ToneLoc is abbreviated as __________
a) Tone Locking
b) Tone Locator
c) Tone Locker
d) Tune Locator

Answer: c
Clarification: ToneLoc is a popular and primitive tool written for MS-DOS users. It is basically used by malicious attackers to guess user accounts, finding entry points in modems and locating modems connected in the network.

6. __________ is a debugger and exploration tool.
a) Netdog
b) Netcat
c) Tcpdump
d) BackTrack

Answer: b
Clarification: Netcat is an easy Unix utility that helps in reading and writing data across network connections, using TCP or UDP protocol. It is popularly used as a debugger and exploration tool that is found free for Windows and Mac OS also.

7. __________ is a popular command-line packet analyser.
a) Wireshark
b) Snort
c) Metasploit
d) Tcpdump

Answer: d
Clarification: Tcpdump is a popular command-line network packet analyzer. It allows its user in displaying TCP / IP as well as other data packets being transmitted or received over the computer network.

8. ________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location.
a) EventLog Analyser
b) NordVPN
c) Wireshark
d) PacketFilter Analyzer

Answer: a
Clarification: EventLog Analyser is a tool that basically keeps the log of data from networks, devices as well as applications in a single location. Latest encryption techniques are used for securing its stored data.

9. ______________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes.
a) Outlook
b) Nessus
c) Mailbox Exchange Recovery
d) Mail Exchange Recovery toolkit

Answer: c
Clarification: Mailbox Exchange Recovery is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes. This tool is popularly used by ethical hackers and cyber-forensics investigators in recovering emails, calendars, attachments, contacts from inaccessible mail-servers.

10. ________________ helps in protecting businesses against data breaches that may make threats to cloud.
a) Centrify
b) Mailbox Exchange Recovery
c) Nessus
d) Dashline

Answer: a
Clarification: Centrify helps in protecting businesses against data breaches that may make threats to the cloud. This is done by securing Centrify users by providing internal, external and privileged users.

11. __________ is a popular corporate security tool that is used to detect the attack on email with cloud only services.
a) Cain and Abel
b) Proofpoint
c) Angry IP Scanner
d) Ettercap

Answer: b
Clarification: Proofpoint is a popular corporate security tool that is used to detect an attack on email with cloud-only services. It helps firms detect attack vectors and loopholes in different security systems through which attackers may gain access.

12. _____________ helps in protecting corporate data, communications and other assets.
a) Snort
b) CipherCloud
c) Burp Suit
d) Wireshark

Answer: b
Clarification: CipherCloud helps in protecting corporate data, different communications as well as other assets. This includes anti-virus scanning facility, encryption & traffic monitoring. In addition, it provides mobile security support also.