MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Whaling is the technique used to take deep and _________ information about any individual. |
| A. | sensitive |
| B. | powerful |
| C. | useless |
| D. | casual |
| Answer» B. powerful | |
| 2. |
In IP address, IP is abbreviated as __________ |
| A. | Internet Program |
| B. | Internet Protocol |
| C. | Intuition Programs |
| D. | Internet Pathway |
| Answer» C. Intuition Programs | |
| 3. |
Finding & publishing any user’s identity with the help of different personal details is called ________ |
| A. | Doxing |
| B. | Data breaching |
| C. | Personal data copying |
| D. | Secure File Transferring Protocol |
| Answer» B. Data breaching | |
| 4. |
________ is an attack technique occurs when excess data gets written to a memory block. |
| A. | Over buffering |
| B. | Buffering |
| C. | Buffer overflow |
| D. | Memory full |
| Answer» D. Memory full | |
| 5. |
Adware are pre-chosen _______ developed to display ads. |
| A. | banner |
| B. | software |
| C. | malware |
| D. | shareware |
| Answer» C. malware | |
| 6. |
Backdoors are also known as ____________ |
| A. | Trap doors |
| B. | Front doors |
| C. | Cover doors |
| D. | Back entry |
| Answer» B. Front doors | |
| 7. |
________ automates an action or attack so that repetitive tasks are done at a faster rate. |
| A. | Auto-bots |
| B. | Cookie-bots |
| C. | Robots |
| D. | Bots |
| Answer» E. | |
| 8. |
Data masking is also known as _________ |
| A. | Data obfuscation |
| B. | Data copying |
| C. | Data breaching |
| D. | Data duplicating |
| Answer» B. Data copying | |
| 9. |
_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company. |
| A. | Data copying |
| B. | Data masking |
| C. | Data breaching |
| D. | Data duplicating |
| Answer» C. Data breaching | |
| 10. |
_________ is an act of hacking by the means of which a political or social message is conveyed. |
| A. | Hacktivism |
| B. | Whistle-blowing |
| C. | Surveillance |
| D. | Pseudonymization |
| Answer» B. Whistle-blowing | |
| 11. |
________ is a way to breach the security by using the vulnerability of that system. |
| A. | Threat |
| B. | Vulnerability |
| C. | Exploit |
| D. | Attack |
| Answer» D. Attack | |
| 12. |
An/A ________ is an act that violates cyber-security. |
| A. | Threat |
| B. | Vulnerability |
| C. | Exploit |
| D. | Attack |
| Answer» E. | |
| 13. |
When any IT product, system or network is in need for testing for security reasons, then the term used is called _________ |
| A. | Threat |
| B. | Vulnerability |
| C. | Target of Evaluation |
| D. | Attack |
| Answer» D. Attack | |
| 14. |
Existence of weakness in a system or network is called _______ |
| A. | Threat |
| B. | Vulnerability |
| C. | Exploit |
| D. | Attack |
| Answer» C. Exploit | |
| 15. |
________ is any action that might compromise cyber-security. |
| A. | Threat |
| B. | Vulnerability |
| C. | Exploit |
| D. | Attack |
| Answer» B. Vulnerability | |