Cyber Security Questions and Answers – Ethical Hacking – History

Cyber Security MCQ

Cyber Security Questions and Answers – Ethical Hacking – History

Cyber Security Questions and Answers – Ethical Hacking – History

History of Cybersecurity - YouTube
History of Cyber Security

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Ethical Hacking – History”.

1. In which year the term hacking was coined?
a) 1965-67
b) 1955-60
c) 1970-80
d) 1980-82

Answer: b
Explanation: The term came to origin in the year 1960s when very highly skilled professionals and individuals practice complex programming approaches to solve different problems.

2. From where the term ‘hacker’ first came to existence?
a) MIT
b) Stanford University
c) California
d) Bell’s Lab

Answer: a
Explanation: At MIT (Massachusetts Institute of Technology), the term ‘hacker’ first came into origin because individuals and high skilled professionals solve different problems using programming languages. Some similar terms were also coined in this regard such as – geeks & nerds.

3. What is the one thing that old hackers were fond of or find interests in?
a) Breaking Other’s system
b) Voracious thirst for knowledge
c) Cracking Phone calls
d) Learning new languages

Answer: b
Explanation: Hackers of the old era were considered the most influential individuals of society with intellectual learning inclination and thirst for knowledge.

4. In which year the first popular hacker conference took place?
a) 1994
b) 1995
c) 1993
d) 1992

Answer: c
Explanation: The first ever internationally recognized hacker’s conference took place in the year 1993 at Las Vegas, Nevada.

5. What is the name of the first hacker’s conference?

Answer: a
Explanation: DEFCON is one of the most popular and largest hacker’s as well as a security consultant’s conference that takes place every year in Las Vegas, Nevada, where government agents, security professionals, black and white hat hackers from all over the world attend that conference.

6. _______ is the oldest phone hacking techniques used by hackers to make free calls
a) Phishing
b) Spamming
c) Phreaking
d) Cracking

Answer: c
Explanation: Phreaking which is abbreviated as phone-hacking is a slang term and old hacking technique where skilled professionals study, explore & experiment telephone networks in order to acquire the free calling facility.

7. In which year, first practical technology hacking came into origin?
a) 1878
b) 1890
c) 1895
d) 1876

Answer: a
Explanation: The first hacking (related to telephone technology) was done when the phone company – named Bell Telephone started in the year 1878.

8. In which year, hacking became a practical crime and a matter of concern in the field of technology?
a) 1971
b) 1973
c) 1970
d) 1974

Answer: c
Explanation: For hackers 1970 was that era when hackers and cyber criminals figured out how wired technologies work and how these technologies can be exploited in order to gain additional advantage or misuse the technology.

9. Who was the first individual who performed a major hacking in the year 1971?
a) Steve Wozniak
b) Steve Jobs
c) Kevin Mitnick
d) John Draper

Answer: d
Explanation: In the year 1971, a Vietnam guy name John Draper figured it out as how to make phone calls free of cost. This type of phone hacking is termed Phreaking.

10. Name the hacker who breaks the ARPANET systems?
a) Jon von Neumann
b) Kevin Poulsen
c) Kevin Mitnick
d) John Draper

Answer: b
Explanation: The ARPANET (Advanced Research Project Agency Network) got hacked by Kevin Poulsen as he breaks into the Pentagon network and their associated system but got caught immediately in the year 1983.

11. Who coined the term “cyberspace”?
a) Andrew Tannenbaum
b) Scott Fahlman
c) William Gibson
d) Richard Stallman

Answer: c
Explanation: In the year 1821, an American – Canadian fiction pioneer cum writer, William Gibson explored the different streams of technologies and coined the term “cyberspace”. The term defines interconnected technologies that help in sharing information, interact with digital devices, storage and digital entertainment, computer and network security and stuff related to information technology.

12. In which year computer scientists try to integrate encryption techniques in TCP/IP protocol?
a) 1978
b) 1980
c) 1982
d) 1984

Answer: a
Explanation: TCP/IP suite needs prior security as it is one of the most popularly used protocol suites and hence some computer scientists in the year 1978, attempts to integrate the security algorithms though they face many impediments in this regard.

13. In which year the Computer Fraud & Abuse Act was adopted in the United States?
a) 1983
b) 1984
c) 1987
d) 1988

Answer: b
Explanation: This Cyber security bill got passed in the US in the year 1984 keeping this in concern that any computer related crimes do not go unpunished. This law also restricts users from unauthorized access of computer or data associated with it.

14. Who was the first individual to distribute computer worms through internet?
a) Vladimir Levin
b) Bill Landreth
c) Richard Stallman
d) Robert T. Morris

Answer: d
Explanation: Robert Tappan Morris, a Cornell University graduate student developed Morris Worm in 1988 and was accused of the crime (under US Computer Fraud and Abuse Act.) for spreading computer worms through Internet.

15. _____ is a powerful encryption tool released by Philip Zimmerman in the year 1991.
a) PGP (Protected Good Privacy)
b) AES (Advanced Encryption Standard)
c) PGP (Pretty Good Privacy)
d) DES (Data Encryption Standard)

Answer: c
Explanation: This encryption program package name PGP (Pretty Good Privacy) became popular across the globe because it helps in providing authentication in data communication as well as help in maintaining privacy through cryptographic algorithms by encryption & decryption of plain texts (in emails and files) to cipher texts and vice versa.

Leave your thought here

Your email address will not be published. Required fields are marked *