Internal Security·Prelims Questions

Types of Cyber Attacks — Prelims Questions

Constitution VerifiedUPSC Verified
Version 1Updated 5 Mar 2026
Q1medium

Consider the following statements about cyber attacks: 1. Zero-day exploits target known vulnerabilities for which patches are available 2. Advanced Persistent Threats (APTs) are characterized by short-term, high-impact attacks 3. Social engineering attacks primarily exploit human psychology rather than technical vulnerabilities 4. DDoS attacks can be mitigated through network traffic filtering and load balancing Which of the statements given above are correct?

Q2hard

Which of the following cyber attack types would most likely be used in a state-sponsored campaign targeting critical infrastructure? 1. SQL Injection attacks on government databases 2. Phishing campaigns against key personnel 3. Zero-day exploits in industrial control systems 4. DDoS attacks during national events 5. Insider recruitment for long-term access

Q3easy

Under the Information Technology Act 2000, which section specifically addresses unauthorized access to protected computer systems?

Q4medium

Consider the following cyber attack scenarios: 1. An employee receives an email appearing to be from the CEO requesting urgent wire transfer 2. Attackers flood a government website with traffic during election results 3. Malicious code is injected into a web application's database query 4. A USB device found in a parking lot installs malware when connected Which of these represent social engineering attacks?

Q5medium

Which of the following best describes the primary difference between Advanced Persistent Threats (APTs) and conventional cyber attacks?

Featured
🎯PREP MANAGER
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single. Day.
Ad Space
🎯PREP MANAGER
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single. Day.