

MCQOPTIONS
Saved Bookmarks
This section includes 12 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
_____________ is an encryption program or add-ons which provides cryptographic privacy & authentication for email communication. |
A. | Powerful Good Privacy |
B. | Pretty Good Privacy |
C. | Pretty Good Encryption |
D. | Pretty Strong Encryption |
Answer» C. Pretty Good Encryption | |
2. |
Which of them is not a disadvantage of active online attack? |
A. | Takes a long time |
B. | Easily and automatically detected |
C. | Need high network bandwidth |
D. | Need the patience to crack |
Answer» C. Need high network bandwidth | |
3. |
Which of the following is a tool to monitor outgoing traffic of target PC’s email and intercept all the emails sent from it? |
A. | Wireshark |
B. | Advanced Stealth Email Redirector |
C. | MS Outlook |
D. | Cisco Jabber |
Answer» C. MS Outlook | |
4. |
In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1 against victim’s system/account. |
A. | passive online |
B. | active online |
C. | offline attack |
D. | non-electronic |
Answer» C. offline attack | |
5. |
PGP is abbreviated as _______________ |
A. | Pretty Good Privacy |
B. | Powerful Good Privacy |
C. | Protocol Giving Privacy |
D. | Pretty Good Protocol |
Answer» B. Powerful Good Privacy | |
6. |
Hackers cannot do which of the following after compromising your phone? |
A. | Shoulder surfing |
B. | Accessing your voice mail |
C. | Steal your information |
D. | Use your app credentials |
Answer» B. Accessing your voice mail | |
7. |
Saving passwords in the browser is a good habit. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» C. May be True or False | |
8. |
Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails. |
A. | trojans, redirected malicious URLs |
B. | antivirus, patches |
C. | cracked software, redirected malicious URLs |
D. | malware, security patches |
Answer» B. antivirus, patches | |
9. |
Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep. |
A. | Biometric |
B. | PIN-based |
C. | Alphanumeric |
D. | Short |
Answer» B. PIN-based | |
10. |
Activate _____________ when you’re required it to use, otherwise turn it off for security purpose. |
A. | Flash Light |
B. | App updates |
C. | Bluetooth |
D. | Rotation |
Answer» D. Rotation | |
11. |
_________________ can be alternatively termed as password guessing attack. |
A. | passive online |
B. | active online |
C. | offline attack |
D. | non-electronic |
Answer» C. offline attack | |
12. |
Which of the following case comes under victims’ list of an active online attack? |
A. | Strong password based accounts |
B. | Unsecured HTTP users |
C. | Open authentication points |
D. | Logged in systems and services |
Answer» D. Logged in systems and services | |