MCQOPTIONS
Saved Bookmarks
This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Part of the social media sites are the various games & 3rd party applications which helps ______________ to get access to your data. |
| A. | ethical hackers |
| B. | penetration testers |
| C. | security auditors |
| D. | cyber-criminals |
| Answer» E. | |
| 2. |
Strangers cannot cause much trouble if we connect to them over social media. |
| A. | True |
| B. | False |
| Answer» C. | |
| 3. |
Clicking on enticing Ads can cause trouble. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 4. |
INCREASE_YOUR_SECURITY_FOR_SOCIAL_MEDIA_ACCOUNT_BY_ALWAYS______________AS_YOU_STEP_AWAY_FROM_THE_SYSTEM.?$ |
| A. | signing in |
| B. | logging out |
| C. | signing up |
| D. | logging in |
| Answer» C. signing up | |
| 5. |
Strangers cannot cause much trouble if we connect to them over social media.$ |
| A. | True |
| B. | False |
| Answer» C. | |
| 6. |
Clicking_on_enticing_Ads_can_cause_trouble.$ |
| A. | True |
| B. | False |
| Answer» B. False | |
| 7. |
Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 8. |
Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 9. |
Many social media sites and services provide _______________ for legitimate account verification. |
| A. | Retina scanning |
| B. | Fingerprint scanning |
| C. | CAPTCHA |
| D. | 2-step verification |
| Answer» E. | |
| 10. |
Part_of_the_social_media_sites_are_the_various_games_&_3rd_party_applications_which_helps________________to_get_access_to_your_data. |
| A. | ethical hackers |
| B. | penetration testers |
| C. | security auditors |
| D. | cyber-criminals |
| Answer» E. | |
| 11. |
Keeping the password by the name of your pet is a good choice? |
| A. | True |
| B. | False |
| Answer» C. | |
| 12. |
Try to keep your passwords without meaning so that _____________ attack becomes almost impossible to perform successfully. |
| A. | social engineering |
| B. | phishing |
| C. | password guessing |
| D. | brute force |
| Answer» D. brute force | |
| 13. |
________________ is a popular tool to block social-media websites to track your browsing activities. |
| A. | Fader |
| B. | Blur |
| C. | Social-Media Blocker |
| D. | Ad-blocker |
| Answer» C. Social-Media Blocker | |
| 14. |
If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 15. |
Which of them is a proper measure of securing social networking account? |
| A. | Never keep your password with any relevant names |
| B. | Keep written records of your passwords |
| C. | Keep records of your password in audio format in your personal cell-phone |
| D. | Passwords are kept smaller in size to remember |
| Answer» B. Keep written records of your passwords | |
| 16. |
Which of the following is not an appropriate measure for securing social networking accounts? |
| A. | Strong passwords |
| B. | Link your account with a phone number |
| C. | Never write your password anywhere |
| D. | Always maintain a soft copy of all your passwords in your PC |
| Answer» E. | |
| 17. |
____________ type of sites are known as friend-of-a-friend site. |
| A. | Chat Messenger |
| B. | Social networking sites |
| C. | Tutorial sites |
| D. | Chat-rooms |
| Answer» C. Tutorial sites | |
| 18. |
Which of the following is the most viral section of the internet? |
| A. | Chat Messenger |
| B. | Social networking sites |
| C. | Tutorial sites |
| D. | Chat-rooms |
| Answer» C. Tutorial sites | |