Unit 5 - Practice Quiz

INT250

1 Which part of the internet is not indexed by standard search engines and requires specific software, configurations, or authorization to access?

A. Surface Web
B. Deep Web
C. Dark Web
D. Transparent Web

2 What is the primary routing mechanism used by the Tor network to maintain user anonymity?

A. Garlic Routing
B. Onion Routing
C. Tomato Routing
D. Packet Switching

3 Which Top-Level Domain (TLD) is specifically associated with sites hosted on the Tor network?

A. .com
B. .exe
C. .onion
D. .tor

4 In the context of email basics, what does SMTP stand for?

A. Simple Mail Transfer Protocol
B. Secure Mail Transmission Protocol
C. Standard Mail Text Protocol
D. System Mail Transfer Protocol

5 Which protocol is primarily used by email clients to retrieve messages from a mail server?

A. SMTP
B. FTP
C. IMAP
D. SNMP

6 What is the most critical section of an email for forensic analysis when tracing the origin of a message?

A. The Subject Line
B. The Email Header
C. The Email Body
D. The Signature Block

7 Which specific field in an email header usually reveals the IP address of the sender?

A. Return-Path
B. Received
C. From
D. To

8 What is the term for an email attack where the sender manipulates the address to make it appear as if it came from a trusted source?

A. Email Spoofing
B. Email Sniffing
C. Email Spiking
D. Email Bombing

9 In a phishing investigation, what is 'Typosquatting'?

A. Using all caps in the subject line
B. Registering a domain name extremely similar to a legitimate one
C. Deleting email logs
D. Encrypting the email body

10 Which type of phishing attack specifically targets high-profile executives like CEOs or CFOs?

A. Spear Phishing
B. Whaling
C. Vishing
D. Smishing

11 What is the primary function of an Intrusion Detection System (IDS)?

A. To block all network traffic
B. To encrypt network data
C. To monitor network traffic for suspicious activity
D. To act as a web server

12 How does an Intrusion Prevention System (IPS) differ mainly from an IDS?

A. IPS only logs data
B. IPS takes active action to stop the threat
C. IPS is slower
D. IPS cannot detect viruses

13 Which type of IDS detection method relies on a database of known attack patterns?

A. Anomaly-based detection
B. Signature-based detection
C. Heuristic detection
D. Behavior-based detection

14 What is a 'False Positive' in the context of IDS/IPS?

A. A malicious attack that is missed
B. A legitimate activity flagged as malicious
C. A system crash
D. A successful virus removal

15 What does WAF stand for in web security?

A. Wide Area Firewall
B. Web Application Firewall
C. Wireless Access Firewall
D. Windows Authentication File

16 At which layer of the OSI model does a Web Application Firewall (WAF) primarily operate?

A. Layer 3 (Network)
B. Layer 4 (Transport)
C. Layer 2 (Data Link)
D. Layer 7 (Application)

17 Which attack involves injecting malicious SQL queries into input fields to manipulate a database?

A. Cross-Site Scripting (XSS)
B. SQL Injection
C. CSRF
D. Buffer Overflow

18 What type of web attack involves injecting malicious scripts into trusted websites viewed by other users?

A. SQL Injection
B. Cross-Site Scripting (XSS)
C. Directory Traversal
D. Brute Force

19 Which attack forces an end user to execute unwanted actions on a web application in which they are currently authenticated?

A. Cross-Site Request Forgery (CSRF)
B. SQL Injection
C. Man-in-the-Middle
D. Packet Sniffing

20 What is a 'Directory Traversal' attack?

A. Overloading the server with requests
B. Accessing restricted directories and files by manipulating file paths
C. Stealing cookies
D. Injecting SQL commands

21 In Email Forensics, what is the role of an MTA (Mail Transfer Agent)?

A. To read emails
B. To display emails to the user
C. To route and transfer emails between servers
D. To attach files

22 What is the standard port number for SMTP traffic?

A. 21
B. 25
C. 80
D. 443

23 Which component of an IDS is responsible for collecting data from the network?

A. Sensor
B. Analyzer
C. Database
D. Console

24 What is the main disadvantage of Anomaly-based IDS?

A. It cannot detect new attacks
B. It has a high rate of false positives
C. It requires virus signatures
D. It is only for wireless networks

25 Which web attack aims to make a machine or network resource unavailable to its intended users?

A. DoS (Denial of Service)
B. Phishing
C. SQL Injection
D. Privilege Escalation

26 What does a 'Logic Bomb' generally refer to in cyber crime?

A. A physical explosive
B. Malicious code set to execute when specific conditions are met
C. A failed hacking attempt
D. A type of firewall

27 Which of the following is a tool often used for network intrusion detection?

A. Photoshop
B. Snort
C. Excel
D. Word

28 In the context of the Dark Web, what is an 'Exit Node'?

A. The first server you connect to
B. The server where traffic leaves the Tor network to reach the open internet
C. A firewall rule
D. An offline server

29 What is the first step in an email crime investigation?

A. Arresting the suspect
B. Seizing the suspect's computer
C. Acquiring and preserving the email evidence
D. Deleting the spam

30 Which email protocol leaves the original email on the server by default?

A. POP3
B. IMAP
C. HTTP
D. FTP

31 What is 'Session Hijacking'?

A. Stealing a laptop
B. Taking over a user's active web session by stealing the session ID
C. Breaking a password
D. Phishing for credit cards

32 Which of the following is a passive security device?

A. Firewall
B. IPS
C. IDS
D. Proxy Server

33 In a SQL injection attack, what does the input ' OR '1'='1 typically achieve?

A. It deletes the database
B. It evaluates to True, bypassing authentication
C. It encrypts the data
D. It shuts down the server

34 Which type of XSS attack stores the malicious script permanently on the target server (e.g., in a forum post)?

A. Reflected XSS
B. Stored (Persistent) XSS
C. DOM-based XSS
D. Local XSS

35 What is the purpose of 'DKIM' in email security?

A. To encrypt the email body
B. To verify that an email message was not forged or altered
C. To block spam
D. To archive emails

36 A 'Zero-day' attack refers to:

A. An attack that happens at midnight
B. An attack exploiting a vulnerability unknown to the software vendor
C. An attack that takes zero seconds
D. An attack on a closed network

37 Which part of the email header is easiest to spoof?

A. Received-By IP
B. Message-ID
C. From address
D. DKIM Signature

38 What does a Host-based IDS (HIDS) monitor?

A. Traffic on the entire subnet
B. Activity and logs on a specific individual device
C. Traffic at the ISP level
D. Wireless signals only

39 What is 'Bitcoin's' primary role in the Dark Web?

A. It is the software used to browse
B. It is the hosting provider
C. It is a common method for anonymous payment
D. It acts as a firewall

40 Which attack involves an attacker intercepting communication between two parties?

A. Man-in-the-Middle (MITM)
B. DDoS
C. Phishing
D. Logic Bomb

41 What is 'Business Email Compromise' (BEC)?

A. A virus that deletes emails
B. A scam compromising legitimate business email accounts to conduct unauthorized transfers
C. Spam advertising
D. Email server maintenance

42 The 'Deep Web' includes:

A. Only illegal content
B. Anything not indexed by search engines (e.g., medical records, academic databases)
C. Only social media
D. Google search results

43 Which mechanism in a WAF allows only pre-approved traffic and blocks everything else?

A. Blacklisting
B. Whitelisting
C. Greylisting
D. Redlisting

44 In web attacks, what is a 'Brute Force' attack?

A. Guessing passwords by trying every possible combination
B. Physically breaking the server
C. Sending a virus via email
D. Injecting SQL code

45 What distinguishes a Distributed Denial of Service (DDoS) from a standard DoS?

A. DDoS is slower
B. DDoS uses a single attacker machine
C. DDoS uses multiple compromised systems (botnet) to attack
D. DDoS targets emails only

46 Which file on a web server determines which parts of the site crawlers are permitted to access?

A. index.html
B. robots.txt
C. config.php
D. style.css

47 What is the primary utility of 'Packet Sniffing' in forensics?

A. To edit files remotely
B. To capture and analyze data traffic moving across a network
C. To encrypt hard drives
D. To clean viruses

48 In email forensics, 'MUA' stands for:

A. Mail User Agent
B. Mail Unified Access
C. Master User Authorization
D. Mail Upload Agent

49 Which vulnerability allows an attacker to include a file, usually exploiting a 'dynamic file inclusion' mechanism implemented in the target application?

A. Local File Inclusion (LFI)
B. Brute Force
C. Dictionary Attack
D. Syn Flood

50 The 'Silk Road' was a famous marketplace located on:

A. The Surface Web
B. The Dark Web
C. A private LAN
D. Facebook