0% found this document useful (0 votes)
369 views6 pages

Flipkart GRID Document - Arsh Goyal

This document provides a preparation guide and questions for the Flipkart GRID cybersecurity competition. It includes a link to a YouTube video preparation guide, encourages subscribing to the creator's channel for more competition resources, and lists several multiple choice cybersecurity questions covering topics like ransomware, kernel initialization, botnets, hashing algorithms, and phishing.

Uploaded by

Test
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
369 views6 pages

Flipkart GRID Document - Arsh Goyal

This document provides a preparation guide and questions for the Flipkart GRID cybersecurity competition. It includes a link to a YouTube video preparation guide, encourages subscribing to the creator's channel for more competition resources, and lists several multiple choice cybersecurity questions covering topics like ransomware, kernel initialization, botnets, hashing algorithms, and phishing.

Uploaded by

Test
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Make sure to checkout this video for preparation guide for FLIPKART GRID :

https://youtu.be/ffMt3nSsjJo

Also , do SUBSCRIBE to Arsh Goyal for more such competitions and their
preparation!

Questions asked in Flipkart GRID Round 1 in 2021.

What is the first thing you should do if your company is facing ransomware
demands?

al
Answer:
- Determine if ransomware demand is legitimate and follow
instructions to get your data back.

-
oy
Ignore the demands, but back up all data just in case.

Contact the police and do not pay the ransom.


G
- Shutdown the computers
sh

During boot, Kernel is


Answer:
- To be loaded manually

- To be initialised once
Ar

- self extracted

- initialised on every boot cycle

Which strain of Ransomware hit Colonial Pipeline in the United States of


America?
Answer:
- Satan Ransomware
- Revil Ransomware
- WannaCry Ransomware
- Dark Side Ransomware

The Tor dark web may be referred to as X, a reference to the network's


Answer:
- Carrotland
- Onionland
- Onionport
- Onionworld

al
What is the motive behind forming a botnet by hackers?
Answer:
- Earn money
oy
- Use botnet to hack more systems
- Bring down services of a company or a website
- Carry out phishing attacks
G
What is the attack technique used to exploit websites by altering backend
database queries the gh inputting
Answer:
sh

- LDAP Injection
- XML Injection
- SQL Injection
- OS Commanding
Ar

Which of the following will ensure confidentiality?


Answer:
- Encoding
- Encryption
- Both a & b
- None of the above

An asymmetric-key cypher uses?


Answer:
- 1 Key
- 2 Key
- з Key
- 4 Key

Identify this person


Answer:
John McAfee
Edward Snowden
William John
None of the above

al
Question 13. What is the motive behind forming a botnet by hackers?
Answer:

oy
- Use botnet to hack more systems
- Bring down services of a company or a website
- Carry out phishing attacks
G
Question 22. What would be the format used to query the site Flipkart.com
about Cybersecu
Answer:
sh

site: Flipkart.com Cybersecurity


Flipkart.com - cybersecurity
Flipkart.com "cybersecurity"
Cybersecurity in flipkart.com
Ar

Question 20. Which is a hashing algorithm out of these?


Answer:
SHA1
AES128
RCA
MD5

Question 19. Why is SSL certificate required in HTTP?


Answer:
For making security weak
For making information move faster
For encrypted data sent over HTTP protocol
For sending and receiving emails unencrypted

Question 28. What kind of cybersecurity risks can be minimized by using a


Virtual Private Network (VPN)?
Answer:
Use of insecure Wi-Fi networks
Key-logging
De-anonymization by network operators

al
Phishing attacks
Previous

parties?
Answer:
ORSA
oy
Question 21. Which method provides a one-time session key for two
G
Diffie-Hellman
DES
AFS
sh

Question 29. Which of the following is an example of a phishing attack?


Answer:
Sending someone an email that contains a malicious link that is disguised
to look like an email from someone the person knows
Ar

Creating a fake website that looks nearly identical to a real website in order
to trick users into entering their login information
Sending someone a text message that contains a malicious link that is
disguised to look like a notification that the person has won a
All of the above

What would be the format used to query the site Flipkart.com about
hersecurity Answer:
site: Flipkart.com Cybersecurity
Flipkart.com - cybersecurity
Flipkart.com "cybersecurity"
Cybersecurity in flipkart.com

X is a malicious computer worm which mainly targets SCADA, PLC systems


which were discovered by Sergey Ulasen. Identify
Answer:
Stuxnet
Wormnet
Skynet
Worldnet

al
Which is usually targeted by nature where the emails are exclusively
designed to target any exact user
Answer:
Algo-based phishing
Spear phishing
Domain Phishing
oy
G
Vishing

8. Where would "robots.txt" be located on the domain 'Flipkart.com'?


sh

Answer:

C:\Windows\System32\robots.txt

C:\Windows\Web Pages\robots.txt
Ar

Flipkart.com\robots.txt

Flipkart.com\admin\robots.txt

An attacker can rewrite the transaction history by gaining control of more


than half of a cryptocurrency's network's computing power. That makes it
possible to cryptocurrency more than once, this is known as
Answer:
double spending

Crypto hijacking

Cheating
None of the above

Size of partition table in MBR is


Answer:
32 bytes
8 bits

al
64 bytes
64 bits

Answer:
TLS 1.0
oy
Vulnerability in which service caused Eternal Blue Vulnerability?
G
TLS 1.3
SMB v1
SMTP
sh
Ar

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy