Cybersecurity Prologue Interview Questions and Answers Explained

Following are Cybersecurity Prologue Questions frequently asked in interviews for freshers as well as experienced. CyberSecurity is one of the high demanding and only domain in IT which has not faced a recession yet. With inceasing demand, there is also competition, and to get a job in Cybersecurity, you need to be one of the best.

Cybersecurity Prologue Questions

Q.1 The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer’s security is called _.

1)Potentially Unwanted Program

2)Malware

3)Malicious Program

4)Spam

Correct answer : Potentially Unwanted Program

Q.2 __ is designed to extract data from its host computer for marketing purposes.

1)Spyware

2)Ransomware

3)Trojans

4)Adware

Correct answer : Spyware

Q.3 _ is a standalone software that does not need human help/host program to spread.

1)Trojan

2)Worm

3)Ransomware

4)Virus

Correct answer : Worm

Q.4 The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __.

1)Spyware

2)Ransomware

3)Scareware

4)Rootkits

Correct answer : Scareware

Q.5 Programs that are specifically designed to disrupt the performance of computers/networks are commonly known as __.

1)Malware

2)Virus

3)Ransomware

4)Trojans

Correct answer : Malware

Q.6 The type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom is called __.

1)Spyware

2)Trojans

3)Scareware

4)Ransomware

Correct answer : Ransomware

Q.7 Which of the following is a new method of spreading malware by injecting malicious or malware-laden advertisements into genuine online advertising networks and webpages?

1)Malvertising

2)Adware

3)Scareware

4)Malnet

Correct answer : Malvertising

Q.8 Which of the following is used to draw in users and infect them and deploy fast changing infrastructures?

1)Honeynet

2)Trojans

3)Malnet

4)Botnet

Correct answer : Malnet

Q.9 The security attribute that aims to achieve data privacy and protection against unauthorized disclosure is called __.

1)Confidentiality

2)Availability

3)Authentication

4)Integrity

Correct answer : Confidentiality

Q.10 The type of attack in which the attacker intercepts the information in transit without altering it.

1)Invasive Attack

2)Passive Attack

3)Active Attack

Correct answer : Passive Attack

Q.11 Which of the following is an attack against availability?

1)DoS Attack

2)Zero Day Attack

3)Man in the Middle Attack

4)Birthday Attack

Correct answer : DoS Attack

Q.12 As an application of cryptography, digital Signatures and MACs can be used for _.

1)Availability

2)Confidentiality

3)Authentication

4)Integrity

Correct answer : Authentication

Q.13 A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is known as _.

1)Penetration Testing

2)Black Box Testing

3)Dynamic Analysis

4)Static Analysis

Correct answer : Dynamic Analysis

Q.14 Deployment in APTs is fully automated.

1)True

2)False

Correct answer : False

Q.15 Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?

1)Assymmetric Key Encryption

2)Symmetric Key Encryption

Correct answer : Assymmetric Key Encryption

Q.16 A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _.

1)Invisible Threats

2)Malicious threats

3)Advanced Persistent Threats

4)Hidden Threats

Correct answer : Advanced Persistent Threats

Q.17 A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker’s pov is called _.

1)Threat Landscaping

2)Threat Modeling

3)Threat Hunting

4)Threat Analysis

Correct answer : Threat Modeling

Q.18 SABSA Framework is commonly represented as _ SABSA matrix.

1)8×8

2)4×4

3)5×5

4)6×6

Correct answer : 6×6

Q.19 Which of these are Threats related to Email Security?

1)Pharming

2)Spoofing

3)Spam

4)Phishing

5)All the options

Correct answer : All the options

Q.20 Which of these is true with respect to passwords?

1)Passwords can be kept openly

2)Passwords need to be easy

3)Passwords need to be atleast 8 chars of length

4)None of the options

Correct answer : Passwords need to be atleast 8 chars of length

Q.21 Which of these are examples biometrics?

1)Signature

2)Gait

3)Iris

4)All the options

Correct answer : All the options

Q.22 __ is a proactive process to predict potential risks efficiently.

1)Threat Analysing

2)Threat Hunting

3)Threat Modeling

4)Threat Landscaping

Correct answer : Threat Hunting

Q.23 As an email client, we should not use caution when opening emails and can download any attachments.

1)True

2)False

Correct answer : False

Q.24 An error message displayed on the system, symbolizes virus infection.

1)True

2)False

Correct answer : False

Q.25 What is PUP?

1)Practially Unwanted Program

2)Practically Unrelated Program

3)Potentially Unwanted Program

4)Potentially Unwanted Process

Correct answer : Potentially Unwanted Program

Q.26 An extension of RADIUS that provides access control for routers, network access servers, and other networked computing devices is called __.

1)Endpoint Access Controller Access Control System

2)Terminal-Access Controller Access Control System

3)Network Access Controller Access Control System

Correct answer : Terminal-Access Controller Access Control System

Q.27 The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _.

1)Cryptology

2)Encryption

3)Cryptography

4)Cryptanalysis

Correct answer : Encryption

Q.28 What is the security attribute that ensures data and services are available to authorized users whenever required?

1)Confidentiality

2)Availability

3)Integrity

Correct answer : Confidentiality

Q.29 Which of the following attack method aims to gather confidential information by deceiving the victim?

1)Spoofing

2)Drive-by Download

3)Phishing

4)Spamming

Correct answer : Phishing

Q.30 An email security threat that occurs when a malicious user sends an email pretending to be someone you know is called _.

1)Phishing

2)Pharming

3)SPAM

4)Spoofing

Correct answer : Spoofing

Q.31 As an application of cryptography, digital Signatures and MACs can be used for _.

1)Availability

2)Integrity

3)Confidentiality

4)Authentication

Correct answer : Authentication

Q.32 How do we define RADIUS?

1)Remote Authentication Digital Users Services

2)Remote Authorization Dial-In Universal Service

3)Remote Authentication Dial-In User Service

4)Remote Authorization Dial-In User Service

Correct answer : Remote Authentication Dial-In User Service

Q.33 A system set up to lure an attacker, to learn about attack methodologies, and to gather evidence of intruders.

1)Camouflage

2)Honeytrap

3)Honeypot

4)HoneyCloak

Correct answer : Honeypot

Q.34 A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is known as __.

1)Invisible Threats

2)Hidden Threats

3)Advanced Persistent Threats

4)Malicious threats

Correct answer : Advanced Persistent Threats

Q.35 Threats can exploit assets if assets are not vulnerable.

1)True

2)False

Correct answer : False

Q.36 Which of the following is a physiological biometric that could be used for authentication?

1)Gait

2)Signature

3)Voice Recognition

4)Facial Recognition

5)All the options

Correct answer : All the options

Q.37 If a student gains unauthorized access to the student database and modifies his/her marks, what type of violation would it be?

1)Integrity

2)Confidentiality

3)Both

Correct answer : Both

Q.38 Passive attacks are considered a threat to _.

1)Integrity

2)Availability

3)Confidentiality

4)Authenticity

Correct answer : Confidentiality

CybeSecurty Interview Questions -Part -2

Q.1 Which of the following refers to stealing one’s idea or invention of others and use it for their own benefits?

1)Piracy

2)Plagiarism

3)Intellectual property rights

4)All of the above

Correct answer : All of the above

Q.2 Read the following statement carefully and find out whether it is correct about the hacking or not?
It can be possible that in some cases, hacking a computer or network can be legal.

1)No, in any situation, hacking cannot be legal

2)It may be possible that in some cases, it can be referred to as a legal task

Correct answer : It may be possible that in some cases, it can be referred to as a legal task

Q.3 Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?

1)Cyber low

2)Cyberethics

3)Cybersecurity

4)Cybersafety

Correct answer : Cyberethics

Q.4 What is Cyber Security?

1)Cyber Security provides security against malware

2)Cyber Security provides security against cyber-terrorists

3)Cyber Security protects a system from cyber attacks

4)All of the mentioned

Correct answer : All of the mentioned

Q.5 What does cyber security protect?

1)Cyber security protects criminals

2)Cyber security protects internet-connected systems

3)Cyber security protects hackers

4)None of the mentioned

Correct answer : Cyber security protects criminals

Q.6 Who is the father of computer security?

1)August Kerckhoffs

2)Bob Thomas

3)Robert

4)Charles

Correct answer : August Kerckhoffs

Q.7 Which of the following refers to the violation of the principle if a computer is no more accessible?

1)Access control

2)Confidentiality

3)Availability

4)All of the above

Correct answer : Availability

Q.8 Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?

1)Cyber attack

2)Computer security

3)Cryptography

4)Digital hacking

Correct answer : Cyber attack

Q.9 Which one of the following refers to the technique used for verifying the integrity of the message?

1)Digital signature

2)Decryption algorithm

3)Protocol

4)Message Digest

Correct answer : Message Digest

Q.10 Which of the following is a type of cyber security?

1)Cloud Security

2)Network Security

3)Application Security

4)All of the above

Correct answer : All of the above

Q.11 Which one of the following usually used in the process of Wi-Fi-hacking?

1)Aircrack-ng

2)Wireshark

3)Norton

4)All of the above

Correct answer : Aircrack-ng

Q.12 What are the features of cyber security?

1)Compliance

2)Defense against internal threats

3)Threat Prevention

4)All of the above

Correct answer : All of the above

Q.13 Which of the following port and IP address scanner famous among the users?

1)Cain and Abel

2)Angry IP Scanner

3)Snort

4)Ettercap

Correct answer : Angry IP Scanner

Q.14 Which of the following is an objective of network security?

1)Confidentiality

2)Integrity

3)Availability

4)All of the above

Correct answer : All of the above

Q.15 In ethical hacking and cyber security, there are _ types of scanning:

1)1

2)2

3)3

4)4

Correct answer : 3

Q.16 Which of the following is not a cybercrime?

1)Denial of Service

2)Man in the Middle

3)Malware

4)AES

Correct answer : AES

Q.17 Which of the following is not a type of scanning?

1)Xmas Tree Scan

2)Cloud scan

3)Null Scan

4)SYN Stealth

Correct answer : Cloud scan

Q.18 Which of the following is a component of cyber security?

1)Internet Of Things

2)AI

3)Database

4)Attacks

Correct answer : Internet Of Things

Q.19 Which of the following is a type of cyber attack?

1)Phishing

2)SQL Injections

3)Password Attack

4)All of the above

Correct answer : All of the above

Q.20 In system hacking, which of the following is the most crucial activity?

1)Information gathering

2)Covering tracks

3)Cracking passwords

4)None of the above

Correct answer : Cracking passwords

Q.21 Which of the following is not an advantage of cyber security?

1)Makes the system slower

2)Minimizes computer freezing and crashes

3)Gives privacy to users

4)Protects system against viruses

Correct answer : Makes the system slower

Q.22 Which of the following are the types of scanning?

1)Network, vulnerability, and port scanning

2)Port, network, and services

3)Client, Server, and network

4)None of the above

Correct answer : Network, vulnerability, and port scanning

Q.23 “Cyberspace” was coined by _.

1)Richard Stallman

2)William Gibson

3)Andrew Tannenbaum

4)Scott Fahlman

Correct answer : William Gibson

Q.24 In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?

1)1991

2)1983

3)1970

4)1964

Correct answer : 1970

Q.25 Which one of the following is actually considered as the first computer virus?

1)Sasser

2)Blaster

3)Creeper

4)Both A and C

Correct answer : Creeper

Q.26 Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _.

1)Nation / State sponsored hackers

2)CIA triad

3)Special Hackers

4)Government Hackers

Correct answer : Nation / State sponsored hackers

Q.27 To protect the computer system against the hacker and different kind of viruses, one must always keep _ on in the computer system.

1)Antivirus

2)Firewall

3)Vlc player

4)Script

Correct answer : Firewall

Q.28 Which of the following act violates cyber security?

1)Exploit

2)Attack

3)Threat

4)Vulnerability

Correct answer : Attack

Q.29 Code Red is a type of __.

1)An Antivirus Program

2)A photo editing software

3)A computer virus

4)A video editing software

Correct answer : A computer virus

Q.30 Which of the following actions compromise cyber security?

1)Vulnerability

2)Attack

3)Threat

4)Exploit

Correct answer : Threat

CyberSecurity Interview Questions Part-3

Q.1 Which of the following can be considered as the elements of cyber security?

1)Application Security

2)Operational Security

3)Network Security

4)All of the above

Correct answer : All of the above

Q.2 Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?

1)Pharming

2)Website-Duplication

3)Mimicking

4)Spamming

Correct answer : Pharming

Q.3 Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user’s system?

1)DDos and Derive-by Downloads

2)Malware & Malvertising

3)Phishing and Password attacks

4)All of the above

Correct answer : All of the above

Q.4 Which of the following is not a type of peer-to-peer cyber-crime?

1)MiTM

2)Injecting Trojans to a target victim

3)Credit card details leak in the deep web

4)Phishing

Correct answer : Credit card details leak in the deep web

Q.5 Which one of the following is also referred to as malicious software?

1)Maliciousware

2)Badware

3)Ilegalware

4)Malware

Correct answer : Malware

Q.6 A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?

1)Clickjacking

2)Buffer-overflow

3)Phishing

4)MiTM

Correct answer : Buffer-overflow

Q.7 Hackers usually used the computer virus for __ purpose.

1)To log, monitor each and every user’s stroke

2)To gain access the sensitive information like user’s Id and Passwords

3)To corrupt the user’s data stored in the computer system

4)All of the above

Correct answer : All of the above

Q.8 Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?

1)ip tracker

2)emails

3)websites

4)web pages

Correct answer : websites

Q.9 In Wi-Fi Security, which of the following protocol is more used?

1)ABCD

2)WPA2

3)WPS

4)Both A and C

Correct answer : WPA2

Q.10 Which of the following is defined as an attempt to harm, damage or cause threat to a system or network?

1)Digital crime

2)Threats

3)System hijacking

4)Cyber Attack

Correct answer : Cyber Attack

Q.11 The term “TCP/IP” stands for_____.

1)Transmission Contribution protocol/ internet protocol

2)Transmission Control Protocol/ internet protocol

3)Transaction Control protocol/ internet protocol

4)Transmission Control Protocol/ internet protocol

Correct answer : Transmission Control Protocol/ internet protocol

Q.12 The response time and transit time is used to measure the __ of a network.

1)Longevity

2)Performance

3)Security

4)Reliability

Correct answer : Performance

Q.13 They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?

1)White Hat Hackers

2)Black Hat Hackers

3)Hactivists

4)Gray Hat Hackers

Correct answer : Black Hat Hackers

Q.14 IT security in any firm or organization is maintained and handled by _.

1)IT Security Engineer

2)Software Security Specialist

3)Security Auditor

4)CEO of the organization

Correct answer : IT Security Engineer

Q.15 Which of the following factor of the network gets hugely impacted when the number of users exceeds the network’s limit?

1)Performance

2)Longevity

3)Security

4)Reliability

Correct answer : Longevity

Q.16 Where did the term “hacker” originate?

1)MIT

2)New York University

3)Bell’s Lab

4)Harvard University

Correct answer : MIT

Q.17 In the computer networks, the encryption techniques are primarily used for improving the __.

1)Security

2)Reliability

3)Longevity

4)Performance

Correct answer : Security

Q.18 What is the existence of weakness in a system or network is known as?

1)Vulnerability

2)Exploit

3)Attack

4)Threat

Correct answer : Vulnerability

Q.19 Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.

1)MiTM attack

2)Phishing attack

3)Website attack

4)DoS attack

Correct answer : Phishing attack

Q.20 Which of the following statements is correct about the firewall?

1)It is a device installed at the boundary of a company to prevent unauthorized physical access.

2)It is a device installed at the boundary of an incorporate to protect it against the unauthorized access

3)It is a kind of wall built to prevent files form damaging the corporate.

4)None of the above

Correct answer : It is a device installed at the boundary of an incorporate to protect it against the unauthorized access

Q.21 When was the first computer virus created?

1)1970

2)1971

3)1972

4)1969

Correct answer : 1971

Q.22 Which of the following is not a step followed by cyber-criminals in data breaching?

1)Exfiltration

2)Research and info-gathering

3)Fixing the bugs

4)Attack the system

Correct answer : Fixing the bugs

Q.23 Which of the following is considered as the world’s first antivirus program?

1)Creeper

2)Reaper

3)Tinkered

4)Ray Tomlinson

Correct answer : Reaper

Q.24 Which of the following online service’s privacy cannot be protected using Tor?

1)Browsing data

2)Instant messaging

3)Login using ID

4)Relay chats

Correct answer : Login using ID

Q.25 Which one of the following principles of cyber security refers that the security mechanism must be as small and simple as possible?

1)Open-Design

2)Economy of the Mechanism

3)Least privilege

4)Fail-safe Defaults

Correct answer : Economy of the Mechanism

Q.26 Which of the following term refers to a group of hackers who are both white and black hat?

1)Yellow Hat hackers

2)Grey Hat hackers

3)Red Hat Hackers

4)White-Black Hat Hackers

Correct answer : Grey Hat hackers

Q.27 Which of the following principle of cyber security restricts how privileges are initiated whenever any object or subject is created?

1)Fail-safe Defaults

2)Open-Design

3)None of the above

4)Least privilege

Correct answer : Fail-safe Defaults

Q.28 Which of the following is not an email-related hacking tool?

1)Mail Password

2)Email Finder Pro

3)Mail PassView

4)Sendinc

Correct answer : Sendinc

Q.29 Suppose an employee demands the root access to a UNIX system, where you are the administrator; that right or access should not be given to the employee unless that employee has work that requires certain rights, privileges. It can be considered as a perfect example of which principle of cyber security?

1)Least privileges

2)Open Design

3)Separation of Privileges

4)Both A & C

Correct answer : Least privileges

Q.30 Which of the following DDoS in mobile systems wait for the owner to trigger the cyber

1)programs

2)virus

3)botnets

4)worms

Correct answer : botnets

Q.1 Which of the following can also consider as the instances of Open Design?

a) CSS

b) DVD Player

c) Only A

d) Both A and B

Ans : Both A and B

Q.2 Which of the following is the least strong security encryption standard?

a) WPA3

b) WPA2

c) WPA

d) WEP

Ans : WEP

Q.3 Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it?

a) Least common mechanism

b) Compromise recording

c) Psychological acceptability

d) Work factor

Ans : Compromise recording

Q.4 Which of the following is a Stuxnet?

a) Trojan

b) Antivirus

c) Worm

d) Virus

Ans : Worm

Q.5 The web application like banking websites should ask its users to log-in again after some specific period of time, let say 30 min. It can be considered as an example of which cybersecurity principle?

a) Compromise recording

b) Psychological acceptability

c) Complete mediation

d) None of the above

Ans : Complete mediation

Q.6 Which of the following ethical hacking technique is used for determining which operating system (OS) is running on a remote computer?

a) Operating System fingerprinting

b) Operating System penetration testing

c) Digital-printing

d) Machine printing

Ans : Operating System fingerprinting

Q.7 Which one of the following statements is correct about Email security in the network security methods?

a) One has to deploy hardware, software, and security procedures to lock those apps down

b) One should know about what the normal behavior of a network look likes so that he/she can spot any changes, breaches in the behavior of the network

c) Phishing is one of the most commonly used methods that are used by hackers to gain access to the network

d) All of the above

Ans : Phishing is one of the most commonly used methods that are used by hackers to gain access to the network

Q.8 Which of the following can diminish the chance of data leakage?

a) Steganography

b) Chorography

c) Cryptography

d) Authentication

Ans : Steganography

Q.9 Which of the following statements is true about the VPN in Network security?

a) It is usually based on the IPsec( IP Security) or SSL (Secure Sockets Layer)

b) It is a type of device that helps to ensure that communication between a device and a network is secure

c) It typically creates a secure, encrypted virtual “tunnel” over the open internet

d) All of the above

Ans : All of the above

Q.10 Which of the following type of text is transformed with the help of a cipher algorithm?

a) Plain text

b) Scalar text

c) Transformed text

d) Complex text

Ans : Plain text

done untill here

Q.11 Which type of the following malware does not replicate or clone them self’s through infection?

a) Worms

b) Viruses

c) Rootkits

d) Trojans

Ans : Trojans

Q.12 “CHAP” stands for __.

a) Circuit Hardware Authentication Protocols

b) Challenge Hardware Authentication Protocols

c) Challenge Handshake Authentication Protocols

d) Circuit Handshake Authentication Protocols

Ans : Challenge Handshake Authentication Protocols

Q.13 Which of the following malware’s type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.

a) Worms

b) RATs

c) Rootkits

d) Botnets

Ans : RATs

Q.14 Which of the following statements is true about the Trojans?

a) Trojans perform tasks for which they are designed or programmed

b) Trojans replicates them self’s or clone them self’s through an infections

c) Trojans do nothing harmful to the user’s computer systems

d) None of the above

Ans : Trojans perform tasks for which they are designed or programmed

Q.15 Which of the following is just opposite to the Open Design principle?

a) Security through obscurity

b) Least common mechanism

c) Least privileges

d) Work factor

Ans : Security through obscurity

Q.16 Which of the following is a type of independent malicious program that never required any host program?

a) Trap Door

b) Trojan Horse

c) Worm

d) Virus

Ans : Worm

Q.17 Which of the following usually considered as the default port number of apache and several other web servers?

a) 20

b) 87

c) 80

d) 40

Ans : 80

Q.18 DNS translates a Domain name into _.

a) Binary

b) IP

c) URL

d) Hex

Ans : URL

Q.19 In the CIA Triad, which one of the following is not involved?

a) Availability

b) Confidentiality

c) Integrity

d) Authenticity

Ans : Authenticity

Q.20 Which one of the following systems cannot be considered as an example of the operating systems?

a) Microsoft Office

b) Windows 8

c) Red Hat Linux

d) BSD Linux

Ans : Microsoft Office

Q.21 In an any organization, company or firm the policies of information security come under__________.

a) Confidentiality

b) Authenticity

c) CIA Triad

d) None of the above

Ans : CIA Triad

Q.22 In order to ensure the security of the data/ information, we need to __ the data:

a) Decrypt

b) Delete

c) Encrypt

d) None of the above

Ans : Encrypt

Q.23 Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the fundamentals?

a) They help in understanding the hacking process

b) These are the main elements for any security breach

c) They help to understand the security and its components in a better manner

d) All of the above

Ans : They help to understand the security and its components in a better manner

Q.24 Which one of the following is considered as the most secure Linux operating system that also provides anonymity and the incognito option for securing the user’s information?

a) Ubuntu

b) Fedora

c) Tails

d) All of the above

Ans : Tails

Q.25 Which type following UNIX account provides all types of privileges and rights which one can perform administrative functions?

a) Client

b) Root

c) Administrative

d) Guest

Ans : Administrative

Q.26 Which of the following is considered as the first hacker’s conference?

a) DEVON

b) OSCON

c) SECTION

d) DEFCON

Ans : DEFCON

Q.27 Which of the following known as the oldest phone hacking techniques used by hackers to make free calls?

a) Phishing

b) Cracking

c) Phreaking

d) Spraining

Ans : Phreaking

Q.28 Name of the Hacker who breaks the SIPRNET system?

a) Kevin Mitnick

b) John von Neumann

c) Kevin Poulsen

d) John Draper

Ans : Kevin Poulsen

About Author


After years of Technical Work, I feel like an expert when it comes to Develop wordpress website. Check out How to Create a Wordpress Website in 5 Mins, and Earn Money Online Follow me on Facebook for all the latest updates.