

MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as _____________ details _________ and passwords. |
A. | credit card, antivirus name |
B. | credit card, login ID |
C. | cell phone, antivirus name |
D. | car model, account ID |
Answer» C. cell phone, antivirus name | |
2. |
Fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information. |
A. | True |
B. | False |
Answer» B. False | |
3. |
Unsolicited Bulk E-mails (UBI) are called __________ |
A. | SMS |
B. | MMS |
C. | Spam emails |
D. | Malicious emails |
Answer» D. Malicious emails | |
4. |
Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails. |
A. | trojans, redirected malicious URLs |
B. | antivirus, patches |
C. | cracked software, redirected malicious URLs |
D. | malware, security patches |
Answer» B. antivirus, patches | |
5. |
_____________ is the technique used for tricking users to disclose their username and passwords through fake pages. |
A. | Social Engineering |
B. | Phishing |
C. | Cookie Stealing |
D. | Banner Grabbing |
Answer» C. Cookie Stealing | |
6. |
Which of them is an example of grabbing email information? |
A. | Cookie stealing |
B. | Reverse engineering |
C. | Port scanning |
D. | Banner grabbing |
Answer» B. Reverse engineering | |
7. |
Which of the following is a non-technical type of intrusion or attack technique? |
A. | Reverse Engineering |
B. | Malware Analysis |
C. | Social Engineering |
D. | Malware Writing |
Answer» D. Malware Writing | |
8. |
If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie. |
A. | memory |
B. | quarantine |
C. | cookies |
D. | hard drive |
Answer» D. hard drive | |
9. |
The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans. |
A. | attackers, malware |
B. | hackers, antivirus |
C. | penetration testers, malware |
D. | penetration testers, virus |
Answer» B. hackers, antivirus | |
10. |
If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. |
A. | True |
B. | False |
Answer» B. False | |
11. |
Which of them is not a proper method for email security? |
A. | Use Strong password |
B. | Use email Encryption |
C. | Spam filters and malware scanners |
D. | Click on unknown links to explore |
Answer» E. | |
12. |
_____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks. |
A. | Cloud |
B. | Pen drive |
C. | Website |
D. | |
Answer» E. | |
13. |
____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise. |
A. | Email security |
B. | Email hacking |
C. | Email protection |
D. | Email safeguarding |
Answer» B. Email hacking | |
14. |
Which of them is not a major way of stealing email information? |
A. | Stealing cookies |
B. | Reverse Engineering |
C. | Password Phishing |
D. | Social Engineering |
Answer» C. Password Phishing | |
15. |
There are _______ major ways of stealing email information. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» C. 4 | |