 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it. | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 2. | Which of the following do not comes under security measures for cloud in firms? | 
| A. | Firewall | 
| B. | Antivirus | 
| C. | Load Balancer | 
| D. | Encryption | 
| Answer» C. Load Balancer | |
| 3. | ___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area. | 
| A. | algorithm-licensing | 
| B. | code-licensing | 
| C. | item licensing | 
| D. | product licensing | 
| Answer» E. | |
| 4. | ________________ important and precious file is a solution to prevent your files from ransomware. | 
| A. | Deleting all | 
| B. | Keeping backup of | 
| C. | Not saving | 
| D. | Keeping in pen drive | 
| Answer» C. Not saving | |
| 5. | ________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization. | 
| A. | Spyware | 
| B. | Ransomware | 
| C. | Adware | 
| D. | Shareware | 
| Answer» C. Adware | |
| 6. | A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference. | 
| A. | MiTM | 
| B. | Browser hacking | 
| C. | Browser Hijacker | 
| D. | Cookie-stealing | 
| Answer» D. Cookie-stealing | |
| 7. | Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen. | 
| A. | information | 
| B. | papers | 
| C. | hardcopy files | 
| D. | media files | 
| Answer» B. papers | |
| 8. | _________________IMPORTANT_AND_PRECIOUS_FILE_IS_A_SOLUTION_TO_PREVENT_YOUR_FILES_FROM_RANSOMWARE.?$ | 
| A. | Deleting all | 
| B. | Keeping backup of | 
| C. | Not saving | 
| D. | Keeping in pen drive | 
| Answer» C. Not saving | |
| 9. | Which of the following do not comes under security measures for cloud in firms?$ | 
| A. | Firewall | 
| B. | Antivirus | 
| C. | Load Balancer | 
| D. | Encryption | 
| Answer» C. Load Balancer | |
| 10. | ___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area.$ | 
| A. | algorithm-licensing | 
| B. | code-licensing | 
| C. | item licensing | 
| D. | product licensing | 
| Answer» E. | |
| 11. | If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it.$ | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 12. | One must isolate payment systems and payment processes from those computers that you think are used by ____________ or may contain ____________ | 
| A. | strangers, keyloggers | 
| B. | strangers, antivirus | 
| C. | unknown, firewalls | 
| D. | unknown, antivirus | 
| Answer» B. strangers, antivirus | |
| 13. | It is important to limit ____________ to all data and information as well as limit the authority for installing software. | 
| A. | work-load | 
| B. | employee access | 
| C. | admin permission | 
| D. | installing unwanted apps | 
| Answer» C. admin permission | |
| 14. | ________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization? | 
| A. | Spyware | 
| B. | Ransomware | 
| C. | Adware | 
| D. | Shareware | 
| Answer» C. Adware | |
| 15. | A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference.$ | 
| A. | MiTM | 
| B. | Browser hacking | 
| C. | Browser Hijacker | 
| D. | Cookie-stealing | 
| Answer» D. Cookie-stealing | |
| 16. | Use of _______________ can bring external files and worms and virus along with it to the internal systems. | 
| A. | smart-watch | 
| B. | pen drive | 
| C. | laptop | 
| D. | iPod | 
| Answer» C. laptop | |
| 17. | Every employee of the firm must need to have some basic knowledge of cyber-security and types of hacking and how they are done. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 18. | It is very important to block unknown, strange and ______________ within the corporate network. | 
| A. | infected sites | 
| B. | programs | 
| C. | unwanted files | 
| D. | important folders | 
| Answer» B. programs | |
| 19. | Which of the following is not a proper aspect of user integration? | 
| A. | Employee’s authentication | 
| B. | Physical authorization | 
| C. | Access control | 
| D. | Representing users in the database | 
| Answer» C. Access control | |
| 20. | Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen.$ | 
| A. | information | 
| B. | papers | 
| C. | hardcopy files | 
| D. | media files | 
| Answer» B. papers | |
| 21. | _____________ is a malicious method used by cyber-criminals to trick a user into clicking on something different from what the user wants. | 
| A. | Click-hacking | 
| B. | Click-fraud | 
| C. | Clickjacking | 
| D. | Using torrent links | 
| Answer» D. Using torrent links | |