1.
A coffee shop that collects payments from customers by debit / credit cards would be liable under the data privacy law
Correct Answer
A. True
Explanation
A coffee shop that collects payments from customers by debit/credit cards would be liable under the data privacy law because they are handling sensitive financial information of their customers. The data privacy law is designed to protect personal information and ensure that businesses handle it securely. Collecting payments through debit/credit cards involves storing and processing customer data, which makes the coffee shop responsible for protecting that data from unauthorized access or breaches. Therefore, they would be liable under the data privacy law.
2.
A hacker can use a remote administration Trojan to shutdown an infected computer even if the power is switched off in the victim computer.
Correct Answer
B. False
Explanation
A remote administration Trojan is a type of malware that allows a hacker to gain unauthorized access to a victim's computer. While it can enable the hacker to perform various malicious activities on the infected computer, such as stealing data or controlling it remotely, it does not have the capability to turn on or shut down the computer if the power is switched off. Therefore, the statement that a hacker can use a remote administration Trojan to shutdown an infected computer even if the power is switched off is false.
3.
A Social engineer convinces a person to give him sensitive information without his knowledge.
Correct Answer
A. True
Explanation
In this scenario, the statement is describing a situation where a social engineer is able to manipulate and deceive a person into unknowingly divulging sensitive information. This is a common tactic used by social engineers, who often rely on psychological manipulation and social skills to exploit human vulnerabilities. Therefore, the answer "True" indicates that the statement accurately describes a social engineering technique.
4.
How to trace website ?
Correct Answer
A. Http://www.domaintools.com/
Explanation
The given answer, http://www.domaintools.com/, is the correct answer for tracing a website. DomainTools is a website that provides various tools for investigating and analyzing domains, including domain ownership information, DNS records, and historical data. By using DomainTools, users can trace the details and history of a website, such as its registration information, IP address, and any associated domains or subdomains. This can be helpful for identifying the owner of a website, checking its credibility, or investigating any suspicious activities.
5.
What is the google hacking code for Email ?
Correct Answer
D. Intitle:index.of inbox
Explanation
The correct answer is "intitle:index.of inbox". This code is used in Google hacking to search for email inboxes that have been indexed by Google. By using the "intitle:" operator, it specifies that the search should focus on the title of the webpage. The "index.of" part indicates that the search is looking for directories or indexes. And finally, "inbox" specifies that the search is specifically for email inboxes.
6.
What are types of password attack ?
Correct Answer
B. Non electronic attack
7.
What is SQL code among the 4 option ?
Correct Answer
C. ' or '1'='1
Explanation
The correct answer is "' or '1'='1'". This is an example of a SQL code injection attack. It is a technique used by hackers to exploit vulnerabilities in a website's database. In this case, the code is attempting to bypass any authentication checks by making the statement '1'='1' always evaluate to true, allowing unauthorized access to the database.
8.
To understand your ip address which add on do you use ?
Correct Answer
A. Extreme ip
Explanation
Extreme IP is the add-on that can be used to understand your IP address.
9.
Which of the following is an effective way to protect yourself from cybercrime?
Correct Answer
C. Installing and regularly updating antivirus software
Explanation
One effective way to protect yourself from cybercrime is to install and regularly update antivirus software. This software helps detect and prevent malicious attacks, such as viruses, ransomware, or malware, from infecting your device. Using strong, unique passwords and avoiding suspicious links are also important safety measures, but answers A (using the same password), B (clicking on suspicious links), and D (sharing personal information on unsecured websites) increase your risk of becoming a victim of cybercrime.
10.
Which of the following is an example of phishing, a common cybercrime?
Correct Answer
B. Receiving an email that asks you to click a link and provide personal information
Explanation
Phishing is a cybercrime where attackers impersonate legitimate organizations or individuals through email, text messages, or websites to trick people into revealing sensitive information like passwords, credit card details, or personal identification. The example of receiving an email asking for personal information is a typical phishing attempt. The other options describe good cybersecurity practices rather than forms of cybercrime.