MCQOPTIONS
Saved Bookmarks
This section includes 9 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
How many standard flags are used in TCP communication? |
| A. | 4 |
| B. | 5 |
| C. | 6 |
| D. | 7 |
| Answer» D. 7 | |
| 2. |
______________ is important to grab a quick understanding and analyzing about your competitors or target user’s need. |
| A. | Competitive Intelligence gathering |
| B. | Cognitive Intelligence gathering |
| C. | Cyber Intelligence gathering |
| D. | Competitors Info gathering |
| Answer» B. Cognitive Intelligence gathering | |
| 3. |
The three steps of data loss prevention are – Identify, Discover and______________ |
| A. | Classify |
| B. | Clarify |
| C. | Deletion |
| D. | Detection |
| Answer» B. Clarify | |
| 4. |
Competitive information gathering if done in the form of active attack using malware or by other illicit means can put your hired hacker or your company at stake. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 5. |
Information about people is available people search sites. Which of them is an example of people data searching site? |
| A. | people.com |
| B. | indivinfo.org |
| C. | intelius.com |
| D. | peopleinfo.org |
| Answer» D. peopleinfo.org | |
| 6. |
Spywares can be used to steal _______________ from the attacker’s browser. |
| A. | browsing history |
| B. | company details |
| C. | plug-ins used |
| D. | browser details |
| Answer» B. company details | |
| 7. |
_________________ is quite an esoteric process for preventing session creation through a particular port. |
| A. | Port knocking |
| B. | Port cracking |
| C. | Port hacking |
| D. | Port-jacking |
| Answer» B. Port cracking | |
| 8. |
“Unauthorized” data leakage doesn’t essentially mean intended or malicious. |
| A. | True |
| B. | False |
| C. | May be True or False |
| D. | Can't say |
| Answer» B. False | |
| 9. |
When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization. |
| A. | Ill-intentional data leakage |
| B. | Malfunctioned in database |
| C. | A malfunction in online data |
| D. | ill-intension of an outsider |
| Answer» B. Malfunctioned in database | |