MCQOPTIONS
Saved Bookmarks
This section includes 22 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
App permissions can cause trouble as some apps may secretly access your memory card or contact data. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 2. |
____________ is an application which now comes built-in Windows OS & it allows Windows users to encrypt all drive for security purpose. |
| A. | MS Windows Defender |
| B. | MSE |
| C. | BitLocker |
| D. | MS Office |
| Answer» D. MS Office | |
| 3. |
________________ is an anti-malware tool found in newer OS which is designed for protecting computers from viruses, spyware & other malware. |
| A. | Norton Antivirus |
| B. | Windows Defender |
| C. | Anti-malware |
| D. | Microsoft Security Essentials |
| Answer» C. Anti-malware | |
| 4. |
The ______________ account and the __________ account have the same file privileges, but their working and functionalities have difference. |
| A. | system, administrator |
| B. | system, user |
| C. | group, user |
| D. | user, administrator |
| Answer» B. system, user | |
| 5. |
A __________ is a dedicatedly designed chip on an endpoint device which stores RSA encryption keys particular to the host system for the purpose of hardware authentication. |
| A. | Trusted Platform Mode |
| B. | Trusted Protocol Module |
| C. | Trusted Privacy Module |
| D. | Trusted Platform Module |
| Answer» E. | |
| 6. |
_______________ are based on dictionary attack techniques. |
| A. | Hybrid attacks |
| B. | Network attacks |
| C. | TCP attacks |
| D. | Database attacks |
| Answer» B. Network attacks | |
| 7. |
_____________ are based on dictionary attack techniques where the dictionary attack is mixed with some numerals and special symbols. |
| A. | Syllable attack |
| B. | Rule-based attack |
| C. | Offline attack |
| D. | Hybrid attack |
| Answer» E. | |
| 8. |
Attackers can use the _______________ when he/she gets some information or hint regarding password he/she wants to crack. |
| A. | Syllable attack |
| B. | Rule-based attack |
| C. | Offline attack |
| D. | Hybrid attack |
| Answer» C. Offline attack | |
| 9. |
____________ attack is a combination of Dictionary attack & brute force attack. |
| A. | Syllable |
| B. | Syllabi |
| C. | Database |
| D. | Phishing |
| Answer» B. Syllabi | |
| 10. |
________________ attacks are carried out from a location other than the real computer where the password reside or was used. |
| A. | passive online |
| B. | active online |
| C. | offline password |
| D. | non-electronic |
| Answer» D. non-electronic | |
| 11. |
Which of the following is not an example of a passive online attack? |
| A. | MiTM |
| B. | Reply Attack |
| C. | Phishing |
| D. | Wire sniffing |
| Answer» D. Wire sniffing | |
| 12. |
Which of them is not an example of business email security tool? |
| A. | Microsoft Office Trust Center |
| B. | Sendinc |
| C. | Hushmail Business |
| D. | Cisco Jabber |
| Answer» E. | |
| 13. |
_____________ is the technique used for tricking users to disclose their username and passwords through fake pages. |
| A. | Social Engineering |
| B. | Phishing |
| C. | Cookie Stealing |
| D. | Banner Grabbing |
| Answer» C. Cookie Stealing | |
| 14. |
Which of them is an example of grabbing email information? |
| A. | Cookie stealing |
| B. | Reverse engineering |
| C. | Port scanning |
| D. | Banner grabbing |
| Answer» B. Reverse engineering | |
| 15. |
Which of the following is a non-technical type of intrusion or attack technique? |
| A. | Reverse Engineering |
| B. | Malware Analysis |
| C. | Social Engineering |
| D. | Malware Writing |
| Answer» D. Malware Writing | |
| 16. |
Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails. |
| A. | trojans, redirected malicious URLs |
| B. | antivirus, patches |
| C. | cracked software, redirected malicious URLs |
| D. | malware, security patches |
| Answer» B. antivirus, patches | |
| 17. |
Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)? |
| A. | Zeus |
| B. | Stuxnet |
| C. | Reaper Exploit |
| D. | Friday the 13 |
| Answer» D. Friday the 13 | |
| 18. |
If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie. |
| A. | memory |
| B. | quarantine |
| C. | cookies |
| D. | hard drive |
| Answer» D. hard drive | |
| 19. |
BTS stands for ___________________ |
| A. | Basement Transceiver Server |
| B. | Base Transmitter Station |
| C. | Base Transceiver Server |
| D. | Base Transceiver Station |
| Answer» E. | |
| 20. |
When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called _____________ |
| A. | AP-handshaking |
| B. | 4-way handshake |
| C. | 4-way connection |
| D. | wireless handshaking |
| Answer» C. 4-way connection | |
| 21. |
There are __________ types of wireless authentication modes. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» B. 3 | |
| 22. |
WPS stands for __________________ |
| A. | WiFi Protected System |
| B. | WiFi Protected Setup |
| C. | WiFi Protocol Setup |
| D. | Wireless Protected Setup |
| Answer» C. WiFi Protocol Setup | |