 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | WHICH_OF_THEM_IS_AN_EXAMPLE_OF_GRABBING_EMAIL_INFORMATION??$ | 
| A. | Cookie stealing | 
| B. | Reverse engineering | 
| C. | Port scanning | 
| D. | Banner grabbing | 
| Answer» B. Reverse engineering | |
| 2. | WHICH_OF_THE_FOLLOWING_IS_A_NON-TECHNICAL_TYPE_OF_INTRUSION_OR_ATTACK_TECHNIQUE??$ | 
| A. | Reverse Engineering | 
| B. | Malware Analysis | 
| C. | Social Engineering | 
| D. | Malware Writing | 
| Answer» D. Malware Writing | |
| 3. | Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails.$ | 
| A. | trojans, redirected malicious URLs | 
| B. | antivirus, patches | 
| C. | cracked software, redirected malicious URLs | 
| D. | malware, security patches | 
| Answer» B. antivirus, patches | |
| 4. | _____________ is the technique used for tricking users to disclose their username and passwords through fake pages.$ | 
| A. | Social Engineering | 
| B. | Phishing | 
| C. | Cookie Stealing | 
| D. | Banner Grabbing | 
| Answer» C. Cookie Stealing | |
| 5. | Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as _____________ details _________ and passwords. | 
| A. | credit card, antivirus name | 
| B. | credit card, login ID | 
| C. | cell phone, antivirus name | 
| D. | car model, account ID | 
| Answer» C. cell phone, antivirus name | |
| 6. | Fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 7. | Unsolicited Bulk E-mails (UBI) are called __________ | 
| A. | SMS | 
| B. | MMS | 
| C. | Spam emails | 
| D. | Malicious emails | 
| Answer» D. Malicious emails | |
| 8. | If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie? | 
| A. | memory | 
| B. | quarantine | 
| C. | cookies | 
| D. | hard drive | 
| Answer» D. hard drive | |
| 9. | The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans. | 
| A. | attackers, malware | 
| B. | hackers, antivirus | 
| C. | penetration testers, malware | 
| D. | penetration testers, virus | 
| Answer» B. hackers, antivirus | |
| 10. | If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 11. | Which of them is not a proper method for email security? | 
| A. | Use Strong password | 
| B. | Use email Encryption | 
| C. | Spam filters and malware scanners | 
| D. | Click on unknown links to explore | 
| Answer» E. | |
| 12. | _____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks. | 
| A. | Cloud | 
| B. | Pen drive | 
| C. | Website | 
| D. | |
| Answer» E. | |
| 13. | ____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise. | 
| A. | Email security | 
| B. | Email hacking | 
| C. | Email protection | 
| D. | Email safeguarding | 
| Answer» B. Email hacking | |
| 14. | Which of them is not a major way of stealing email information? | 
| A. | Stealing cookies | 
| B. | Reverse Engineering | 
| C. | Password Phishing | 
| D. | Social Engineering | 
| Answer» C. Password Phishing | |
| 15. | There are _______ major ways of stealing email information. | 
| A. | 2 | 
| B. | 3 | 
| C. | 4 | 
| D. | 5 | 
| Answer» D. 5 | |