

MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
BACKDOORS_ARE_ALSO_KNOWN_AS_____________?$ |
A. | Trap doors |
B. | Front doors |
C. | Cover doors |
D. | Back entry |
Answer» B. Front doors | |
2. |
________ is an attack technique occurs when excess data gets written to a memory block.$ |
A. | Over buffering |
B. | Buffering |
C. | Buffer overflow |
D. | Memory full |
Answer» D. Memory full | |
3. |
Adware are pre-chosen _______ developed to display ads.$ |
A. | banner |
B. | software |
C. | malware |
D. | shareware |
Answer» C. malware | |
4. |
Whaling is the technique used to take deep and _________ information about any individual. |
A. | sensitive |
B. | powerful |
C. | useless |
D. | casual |
Answer» B. powerful | |
5. |
In IP address, IP is abbreviated as __________ |
A. | Internet Program |
B. | Internet Protocol |
C. | Intuition Programs |
D. | Internet Pathway |
Answer» C. Intuition Programs | |
6. |
Finding & publishing any user’s identity with the help of different personal details is called ________$ |
A. | Doxing |
B. | Data breaching |
C. | Personal data copying |
D. | Secure File Transferring Protocol |
Answer» B. Data breaching | |
7. |
________ automates an action or attack so that repetitive tasks are done at a faster rate? |
A. | Auto-bots |
B. | Cookie-bots |
C. | Robots |
D. | Bots |
Answer» E. | |
8. |
Data masking is also known as _________ |
A. | Data obfuscation |
B. | Data copying |
C. | Data breaching |
D. | Data duplicating |
Answer» B. Data copying | |
9. |
_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company. |
A. | Data copying |
B. | Data masking |
C. | Data breaching |
D. | Data duplicating |
Answer» C. Data breaching | |
10. |
_________ is an act of hacking by the means of which a political or social message is conveyed. |
A. | Hacktivism |
B. | Whistle-blowing |
C. | Surveillance |
D. | Pseudonymization |
Answer» B. Whistle-blowing | |
11. |
________ is a way to breach the security by using the vulnerability of that system. |
A. | Threat |
B. | Vulnerability |
C. | Exploit |
D. | Attack |
Answer» D. Attack | |
12. |
An/A ________ is an act that violates cyber-security. |
A. | Threat |
B. | Vulnerability |
C. | Exploit |
D. | Attack |
Answer» E. | |
13. |
When any IT product, system or network is in need for testing for security reasons, then the term used is called _________ |
A. | Threat |
B. | Vulnerability |
C. | Target of Evaluation |
D. | Attack |
Answer» D. Attack | |
14. |
Existence of weakness in a system or network is called _______ |
A. | Threat |
B. | Vulnerability |
C. | Exploit |
D. | Attack |
Answer» C. Exploit | |
15. |
________ is any action that might compromise cyber-security. |
A. | Threat |
B. | Vulnerability |
C. | Exploit |
D. | Attack |
Answer» B. Vulnerability | |