

MCQOPTIONS
Saved Bookmarks
This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it. |
A. | True |
B. | False |
Answer» C. | |
2. |
Which of the following do not comes under security measures for cloud in firms? |
A. | Firewall |
B. | Antivirus |
C. | Load Balancer |
D. | Encryption |
Answer» C. Load Balancer | |
3. |
___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area. |
A. | algorithm-licensing |
B. | code-licensing |
C. | item licensing |
D. | product licensing |
Answer» E. | |
4. |
________________ important and precious file is a solution to prevent your files from ransomware. |
A. | Deleting all |
B. | Keeping backup of |
C. | Not saving |
D. | Keeping in pen drive |
Answer» C. Not saving | |
5. |
________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization. |
A. | Spyware |
B. | Ransomware |
C. | Adware |
D. | Shareware |
Answer» C. Adware | |
6. |
A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference. |
A. | MiTM |
B. | Browser hacking |
C. | Browser Hijacker |
D. | Cookie-stealing |
Answer» D. Cookie-stealing | |
7. |
Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen. |
A. | information |
B. | papers |
C. | hardcopy files |
D. | media files |
Answer» B. papers | |
8. |
_________________IMPORTANT_AND_PRECIOUS_FILE_IS_A_SOLUTION_TO_PREVENT_YOUR_FILES_FROM_RANSOMWARE.?$ |
A. | Deleting all |
B. | Keeping backup of |
C. | Not saving |
D. | Keeping in pen drive |
Answer» C. Not saving | |
9. |
Which of the following do not comes under security measures for cloud in firms?$ |
A. | Firewall |
B. | Antivirus |
C. | Load Balancer |
D. | Encryption |
Answer» C. Load Balancer | |
10. |
___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products within a definite market area.$ |
A. | algorithm-licensing |
B. | code-licensing |
C. | item licensing |
D. | product licensing |
Answer» E. | |
11. |
If you’re working in your company’s system/laptop and suddenly a pop-up window arise asking you to update your security application, you must ignore it.$ |
A. | True |
B. | False |
Answer» C. | |
12. |
One must isolate payment systems and payment processes from those computers that you think are used by ____________ or may contain ____________ |
A. | strangers, keyloggers |
B. | strangers, antivirus |
C. | unknown, firewalls |
D. | unknown, antivirus |
Answer» B. strangers, antivirus | |
13. |
It is important to limit ____________ to all data and information as well as limit the authority for installing software. |
A. | work-load |
B. | employee access |
C. | admin permission |
D. | installing unwanted apps |
Answer» C. admin permission | |
14. |
________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization? |
A. | Spyware |
B. | Ransomware |
C. | Adware |
D. | Shareware |
Answer» C. Adware | |
15. |
A ____________ takes over your system’s browser settings and the attack will redirect the websites you visit some other websites of its preference.$ |
A. | MiTM |
B. | Browser hacking |
C. | Browser Hijacker |
D. | Cookie-stealing |
Answer» D. Cookie-stealing | |
16. |
Use of _______________ can bring external files and worms and virus along with it to the internal systems. |
A. | smart-watch |
B. | pen drive |
C. | laptop |
D. | iPod |
Answer» C. laptop | |
17. |
Every employee of the firm must need to have some basic knowledge of cyber-security and types of hacking and how they are done. |
A. | True |
B. | False |
Answer» B. False | |
18. |
It is very important to block unknown, strange and ______________ within the corporate network. |
A. | infected sites |
B. | programs |
C. | unwanted files |
D. | important folders |
Answer» B. programs | |
19. |
Which of the following is not a proper aspect of user integration? |
A. | Employee’s authentication |
B. | Physical authorization |
C. | Access control |
D. | Representing users in the database |
Answer» C. Access control | |
20. |
Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen.$ |
A. | information |
B. | papers |
C. | hardcopy files |
D. | media files |
Answer» B. papers | |
21. |
_____________ is a malicious method used by cyber-criminals to trick a user into clicking on something different from what the user wants. |
A. | Click-hacking |
B. | Click-fraud |
C. | Clickjacking |
D. | Using torrent links |
Answer» D. Using torrent links | |