

MCQOPTIONS
Saved Bookmarks
This section includes 9 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
How many standard flags are used in TCP communication? |
A. | 4 |
B. | 5 |
C. | 6 |
D. | 7 |
Answer» D. 7 | |
2. |
______________ is important to grab a quick understanding and analyzing about your competitors or target user’s need. |
A. | Competitive Intelligence gathering |
B. | Cognitive Intelligence gathering |
C. | Cyber Intelligence gathering |
D. | Competitors Info gathering |
Answer» B. Cognitive Intelligence gathering | |
3. |
The three steps of data loss prevention are – Identify, Discover and______________ |
A. | Classify |
B. | Clarify |
C. | Deletion |
D. | Detection |
Answer» B. Clarify | |
4. |
Competitive information gathering if done in the form of active attack using malware or by other illicit means can put your hired hacker or your company at stake. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
5. |
Information about people is available people search sites. Which of them is an example of people data searching site? |
A. | people.com |
B. | indivinfo.org |
C. | intelius.com |
D. | peopleinfo.org |
Answer» D. peopleinfo.org | |
6. |
Spywares can be used to steal _______________ from the attacker’s browser. |
A. | browsing history |
B. | company details |
C. | plug-ins used |
D. | browser details |
Answer» B. company details | |
7. |
_________________ is quite an esoteric process for preventing session creation through a particular port. |
A. | Port knocking |
B. | Port cracking |
C. | Port hacking |
D. | Port-jacking |
Answer» B. Port cracking | |
8. |
“Unauthorized” data leakage doesn’t essentially mean intended or malicious. |
A. | True |
B. | False |
C. | May be True or False |
D. | Can't say |
Answer» B. False | |
9. |
When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization. |
A. | Ill-intentional data leakage |
B. | Malfunctioned in database |
C. | A malfunction in online data |
D. | ill-intension of an outsider |
Answer» B. Malfunctioned in database | |