MCQOPTIONS
Saved Bookmarks
This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it. |
| A. | True |
| B. | False |
| Answer» C. | |
| 2. |
Which of the following do not comes under security measures for cloud in firms? |
| A. | Firewall |
| B. | Antivirus |
| C. | Load Balancer |
| D. | Encryption |
| Answer» C. Load Balancer | |
| 3. |
___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area. |
| A. | algorithm-licensing |
| B. | code-licensing |
| C. | item licensing |
| D. | product licensing |
| Answer» E. | |
| 4. |
________________ important and precious file is a solution to prevent your files from ransomware. |
| A. | Deleting all |
| B. | Keeping backup of |
| C. | Not saving |
| D. | Keeping in pen drive |
| Answer» C. Not saving | |
| 5. |
________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization. |
| A. | Spyware |
| B. | Ransomware |
| C. | Adware |
| D. | Shareware |
| Answer» C. Adware | |
| 6. |
A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference. |
| A. | MiTM |
| B. | Browser hacking |
| C. | Browser Hijacker |
| D. | Cookie-stealing |
| Answer» D. Cookie-stealing | |
| 7. |
Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen. |
| A. | information |
| B. | papers |
| C. | hardcopy files |
| D. | media files |
| Answer» B. papers | |
| 8. |
_________________IMPORTANT_AND_PRECIOUS_FILE_IS_A_SOLUTION_TO_PREVENT_YOUR_FILES_FROM_RANSOMWARE.?$ |
| A. | Deleting all |
| B. | Keeping backup of |
| C. | Not saving |
| D. | Keeping in pen drive |
| Answer» C. Not saving | |
| 9. |
Which of the following do not comes under security measures for cloud in firms?$ |
| A. | Firewall |
| B. | Antivirus |
| C. | Load Balancer |
| D. | Encryption |
| Answer» C. Load Balancer | |
| 10. |
___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area.$ |
| A. | algorithm-licensing |
| B. | code-licensing |
| C. | item licensing |
| D. | product licensing |
| Answer» E. | |
| 11. |
If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it.$ |
| A. | True |
| B. | False |
| Answer» C. | |
| 12. |
One must isolate payment systems and payment processes from those computers that you think are used by ____________ or may contain ____________ |
| A. | strangers, keyloggers |
| B. | strangers, antivirus |
| C. | unknown, firewalls |
| D. | unknown, antivirus |
| Answer» B. strangers, antivirus | |
| 13. |
It is important to limit ____________ to all data and information as well as limit the authority for installing software. |
| A. | work-load |
| B. | employee access |
| C. | admin permission |
| D. | installing unwanted apps |
| Answer» C. admin permission | |
| 14. |
________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization? |
| A. | Spyware |
| B. | Ransomware |
| C. | Adware |
| D. | Shareware |
| Answer» C. Adware | |
| 15. |
A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference.$ |
| A. | MiTM |
| B. | Browser hacking |
| C. | Browser Hijacker |
| D. | Cookie-stealing |
| Answer» D. Cookie-stealing | |
| 16. |
Use of _______________ can bring external files and worms and virus along with it to the internal systems. |
| A. | smart-watch |
| B. | pen drive |
| C. | laptop |
| D. | iPod |
| Answer» C. laptop | |
| 17. |
Every employee of the firm must need to have some basic knowledge of cyber-security and types of hacking and how they are done. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 18. |
It is very important to block unknown, strange and ______________ within the corporate network. |
| A. | infected sites |
| B. | programs |
| C. | unwanted files |
| D. | important folders |
| Answer» B. programs | |
| 19. |
Which of the following is not a proper aspect of user integration? |
| A. | Employee’s authentication |
| B. | Physical authorization |
| C. | Access control |
| D. | Representing users in the database |
| Answer» C. Access control | |
| 20. |
Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen.$ |
| A. | information |
| B. | papers |
| C. | hardcopy files |
| D. | media files |
| Answer» B. papers | |
| 21. |
_____________ is a malicious method used by cyber-criminals to trick a user into clicking on something different from what the user wants. |
| A. | Click-hacking |
| B. | Click-fraud |
| C. | Clickjacking |
| D. | Using torrent links |
| Answer» D. Using torrent links | |