Explore topic-wise MCQs in Cyber Security.

This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.

A. Biometric
B. PIN-based
C. Alphanumeric
D. Short
Answer» B. PIN-based
2.

Activate _____________ when you’re required it to use, otherwise turn it off for security purpose.

A. Flash Light
B. App updates
C. Bluetooth
D. Rotation
Answer» D. Rotation
3.

App permissions can cause trouble as some apps may secretly access your memory card or contact data.

A. True
B. False
Answer» B. False
4.

HACKERS_CANNOT_DO_WHICH_OF_THE_FOLLOWING_AFTER_COMPROMISING_YOUR_PHONE??$

A. Shoulder surfing
B. Accessing your voice mail
C. Steal your information
D. Use your app credentials
Answer» B. Accessing your voice mail
5.

Activate _____________ when you’re required it to use, otherwise turn it off for security purpose.$#

A. Flash Light
B. App updates
C. Bluetooth
D. Rotation
Answer» D. Rotation
6.

App permissions can cause trouble as some apps may secretly access your memory card or contact data.$

A. True
B. False
Answer» B. False
7.

Which of the following is not a security issue for PDAs?

A. Password theft
B. Data theft
C. Reverse engineering
D. Wireless vulnerability
Answer» D. Wireless vulnerability
8.

BBProxy tool is used in which mobile OS?

A. Android
B. Symbian
C. Raspberry
D. Blackberry
Answer» E.
9.

Which of the following tool is used for Blackjacking?

A. BBAttacker
B. BBProxy
C. Blackburried
D. BBJacking
Answer» C. Blackburried
10.

Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.$

A. Biometric
B. PIN-based
C. Alphanumeric
D. Short
Answer» B. PIN-based
11.

Hackers cannot do which of the following after compromising your phone?

A. Steal your information
B. Rob your e-money
C. Shoulder surfing
D. Spying
Answer» D. Spying
12.

DDoS in mobile systems wait for the owner of the _____________ to trigger the attack.

A. worms
B. virus
C. botnets
D. programs
Answer» D. programs
13.

Mobile security is also known as ____________

A. OS Security
B. Wireless security
C. Cloud security
D. Database security
Answer» C. Cloud security
14.

____________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs.

A. OS Security
B. Database security
C. Cloud security
D. Mobile security
Answer» E.
15.

____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.

A. Worms
B. Antivirus
C. Malware
D. Multimedia files
Answer» D. Multimedia files
16.

Mobile Phone OS contains open APIs that may be _____________ attack.

A. useful for
B. vulnerable to
C. easy to
D. meant for
Answer» C. easy to
17.

Which of the following is not an OS for mobile?

A. Palm
B. Windows
C. Mango
D. Android
Answer» D. Android
18.

Which of the following is not an appropriate way of targeting a mobile phone for hacking?

A. Target mobile hardware vulnerabilities
B. Target apps’ vulnerabilities
C. Setup Keyloggers and spyware in smart-phones
D. Snatch the phone
Answer» E.