MCQOPTIONS
Saved Bookmarks
This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following is not a physical security measure to protect against physical hacking? |
| A. | Add front desk & restrict unknown access to the back room |
| B. | Create a phishing policy |
| C. | Analyze how employees maintain their physical data and data storage peripheral devices |
| D. | Updating the patches in the software you’re working at your office laptop. |
| Answer» E. | |
| 2. |
Which of the following is not considering the adequate measure for physical security? |
| A. | Lock the drawers |
| B. | Keep strong passwords for corporate laptops and mobile phones |
| C. | Keep confidential organization’s document file open in the desk |
| D. | Hide your hand against camera while inserting the PIN code |
| Answer» D. Hide your hand against camera while inserting the PIN code | |
| 3. |
________ is the ability of an individual to gain physical access to an authorized area. |
| A. | Network accessing |
| B. | Database accessing |
| C. | Remote accessing |
| D. | Physical accessing |
| Answer» E. | |
| 4. |
Stealing pen drives and DVDs after tailgating is an example of lack of _______ security. |
| A. | network security |
| B. | physical security |
| C. | database security |
| D. | wireless security |
| Answer» C. database security | |
| 5. |
Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations. |
| A. | True |
| B. | False |
| Answer» C. | |
| 6. |
___________ is a special form of attack using which hackers’ exploit – human psychology. |
| A. | Cross Site Scripting |
| B. | Insecure network |
| C. | Social Engineering |
| D. | Reverse Engineering |
| Answer» D. Reverse Engineering | |
| 7. |
_________IS_THE_ABILITY_OF_AN_INDIVIDUAL_TO_GAIN_PHYSICAL_ACCESS_TO_AN_AUTHORIZED_AREA.?$ |
| A. | Network accessing |
| B. | Database accessing |
| C. | Remote accessing |
| D. | Physical accessing |
| Answer» E. | |
| 8. |
STEALING_PEN_DRIVES_AND_DVDS_AFTER_TAILGATING_IS_AN_EXAMPLE_OF_LACK_OF_________SECURITY.?$ |
| A. | network security |
| B. | physical security |
| C. | database security |
| D. | wireless security |
| Answer» C. database security | |
| 9. |
Which of the following is not a physical security measure to protect against physical hacking?$ |
| A. | Add front desk & restrict unknown access to the back room |
| B. | Create a phishing policy |
| C. | Analyze how employees maintain their physical data and data storage peripheral devices |
| D. | Updating the patches in the software you’re working at your office laptop. |
| Answer» E. | |
| 10. |
Which of the following is not considering the adequate measure for physical security?$ |
| A. | Lock the drawers |
| B. | Keep strong passwords for corporate laptops and mobile phones |
| C. | Keep confidential organization’s document file open in the desk |
| D. | Hide your hand against camera while inserting the PIN code |
| Answer» D. Hide your hand against camera while inserting the PIN code | |
| 11. |
Physical _________ is important to check & test for possible physical breaches. |
| A. | penetration test |
| B. | security check |
| C. | hacking |
| D. | access |
| Answer» B. security check | |
| 12. |
Which of them is not an example of physical hacking? |
| A. | Walk-in using piggybacking |
| B. | Sneak-in |
| C. | Break-in and steal |
| D. | Phishing |
| Answer» E. | |
| 13. |
IT security department must periodically check for security logs and entries made during office hours. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 14. |
Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations? |
| A. | True |
| B. | False |
| Answer» C. | |
| 15. |
Tailgating is also termed as ___________ |
| A. | Piggybacking |
| B. | Pretexting |
| C. | Phishing |
| D. | Baiting |
| Answer» B. Pretexting | |
| 16. |
In a phishing, attackers target the ________ technology to so social engineering. |
| A. | Emails |
| B. | WI-FI network |
| C. | Operating systems |
| D. | Surveillance camera |
| Answer» B. WI-FI network | |
| 17. |
Which of the following is not an example of social engineering? |
| A. | Dumpster diving |
| B. | Shoulder surfing |
| C. | Carding |
| D. | Spear phishing |
| Answer» D. Spear phishing | |
| 18. |
Which of the following is the technique used to look for information in trash or around dustbin container? |
| A. | Pretexting |
| B. | Baiting |
| C. | Quid Pro Quo |
| D. | Dumpster diving |
| Answer» E. | |
| 19. |
_________ involves scams where an individual (usually an attacker) lie to a person (the target victim) to acquire privilege data. |
| A. | Phishing |
| B. | Pretexting |
| C. | Spamming |
| D. | Vishing |
| Answer» C. Spamming | |
| 20. |
Which of the following do not comes under Social Engineering? |
| A. | Tailgating |
| B. | Phishing |
| C. | Pretexting |
| D. | Spamming |
| Answer» E. | |
| 21. |
___________ is a special form of attack using which hackers’ exploit – human psychology. |
| A. | Cross Site Scripting |
| B. | Insecure network |
| C. | Social Engineering |
| D. | Reverse Engineering |
| Answer» D. Reverse Engineering | |