Explore topic-wise MCQs in Cyber Security.

This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as _____________ details _________ and passwords.

A. credit card, antivirus name
B. credit card, login ID
C. cell phone, antivirus name
D. car model, account ID
Answer» C. cell phone, antivirus name
2.

Fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information.

A. True
B. False
Answer» B. False
3.

Unsolicited Bulk E-mails (UBI) are called __________

A. SMS
B. MMS
C. Spam emails
D. Malicious emails
Answer» D. Malicious emails
4.

Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails.

A. trojans, redirected malicious URLs
B. antivirus, patches
C. cracked software, redirected malicious URLs
D. malware, security patches
Answer» B. antivirus, patches
5.

_____________ is the technique used for tricking users to disclose their username and passwords through fake pages.

A. Social Engineering
B. Phishing
C. Cookie Stealing
D. Banner Grabbing
Answer» C. Cookie Stealing
6.

Which of them is an example of grabbing email information?

A. Cookie stealing
B. Reverse engineering
C. Port scanning
D. Banner grabbing
Answer» B. Reverse engineering
7.

Which of the following is a non-technical type of intrusion or attack technique?

A. Reverse Engineering
B. Malware Analysis
C. Social Engineering
D. Malware Writing
Answer» D. Malware Writing
8.

If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.

A. memory
B. quarantine
C. cookies
D. hard drive
Answer» D. hard drive
9.

The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans.

A. attackers, malware
B. hackers, antivirus
C. penetration testers, malware
D. penetration testers, virus
Answer» B. hackers, antivirus
10.

If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.

A. True
B. False
Answer» B. False
11.

Which of them is not a proper method for email security?

A. Use Strong password
B. Use email Encryption
C. Spam filters and malware scanners
D. Click on unknown links to explore
Answer» E.
12.

_____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.

A. Cloud
B. Pen drive
C. Website
D. Email
Answer» E.
13.

____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.

A. Email security
B. Email hacking
C. Email protection
D. Email safeguarding
Answer» B. Email hacking
14.

Which of them is not a major way of stealing email information?

A. Stealing cookies
B. Reverse Engineering
C. Password Phishing
D. Social Engineering
Answer» C. Password Phishing
15.

There are _______ major ways of stealing email information.

A. 2
B. 3
C. 4
D. 5
Answer» C. 4