 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | BACKDOORS_ARE_ALSO_KNOWN_AS_____________?$ | 
| A. | Trap doors | 
| B. | Front doors | 
| C. | Cover doors | 
| D. | Back entry | 
| Answer» B. Front doors | |
| 2. | ________ is an attack technique occurs when excess data gets written to a memory block.$ | 
| A. | Over buffering | 
| B. | Buffering | 
| C. | Buffer overflow | 
| D. | Memory full | 
| Answer» D. Memory full | |
| 3. | Adware are pre-chosen _______ developed to display ads.$ | 
| A. | banner | 
| B. | software | 
| C. | malware | 
| D. | shareware | 
| Answer» C. malware | |
| 4. | Whaling is the technique used to take deep and _________ information about any individual. | 
| A. | sensitive | 
| B. | powerful | 
| C. | useless | 
| D. | casual | 
| Answer» B. powerful | |
| 5. | In IP address, IP is abbreviated as __________ | 
| A. | Internet Program | 
| B. | Internet Protocol | 
| C. | Intuition Programs | 
| D. | Internet Pathway | 
| Answer» C. Intuition Programs | |
| 6. | Finding & publishing any user’s identity with the help of different personal details is called ________$ | 
| A. | Doxing | 
| B. | Data breaching | 
| C. | Personal data copying | 
| D. | Secure File Transferring Protocol | 
| Answer» B. Data breaching | |
| 7. | ________ automates an action or attack so that repetitive tasks are done at a faster rate? | 
| A. | Auto-bots | 
| B. | Cookie-bots | 
| C. | Robots | 
| D. | Bots | 
| Answer» E. | |
| 8. | Data masking is also known as _________ | 
| A. | Data obfuscation | 
| B. | Data copying | 
| C. | Data breaching | 
| D. | Data duplicating | 
| Answer» B. Data copying | |
| 9. | _______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company. | 
| A. | Data copying | 
| B. | Data masking | 
| C. | Data breaching | 
| D. | Data duplicating | 
| Answer» C. Data breaching | |
| 10. | _________ is an act of hacking by the means of which a political or social message is conveyed. | 
| A. | Hacktivism | 
| B. | Whistle-blowing | 
| C. | Surveillance | 
| D. | Pseudonymization | 
| Answer» B. Whistle-blowing | |
| 11. | ________ is a way to breach the security by using the vulnerability of that system. | 
| A. | Threat | 
| B. | Vulnerability | 
| C. | Exploit | 
| D. | Attack | 
| Answer» D. Attack | |
| 12. | An/A ________ is an act that violates cyber-security. | 
| A. | Threat | 
| B. | Vulnerability | 
| C. | Exploit | 
| D. | Attack | 
| Answer» E. | |
| 13. | When any IT product, system or network is in need for testing for security reasons, then the term used is called _________ | 
| A. | Threat | 
| B. | Vulnerability | 
| C. | Target of Evaluation | 
| D. | Attack | 
| Answer» D. Attack | |
| 14. | Existence of weakness in a system or network is called _______ | 
| A. | Threat | 
| B. | Vulnerability | 
| C. | Exploit | 
| D. | Attack | 
| Answer» C. Exploit | |
| 15. | ________ is any action that might compromise cyber-security. | 
| A. | Threat | 
| B. | Vulnerability | 
| C. | Exploit | 
| D. | Attack | 
| Answer» B. Vulnerability | |