Explore topic-wise MCQs in Cyber Security.

This section includes 9 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

How many standard flags are used in TCP communication?

A. 4
B. 5
C. 6
D. 7
Answer» D. 7
2.

______________ is important to grab a quick understanding and analyzing about your competitors or target user’s need.

A. Competitive Intelligence gathering
B. Cognitive Intelligence gathering
C. Cyber Intelligence gathering
D. Competitors Info gathering
Answer» B. Cognitive Intelligence gathering
3.

The three steps of data loss prevention are – Identify, Discover and______________

A. Classify
B. Clarify
C. Deletion
D. Detection
Answer» B. Clarify
4.

Competitive information gathering if done in the form of active attack using malware or by other illicit means can put your hired hacker or your company at stake.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
5.

Information about people is available people search sites. Which of them is an example of people data searching site?

A. people.com
B. indivinfo.org
C. intelius.com
D. peopleinfo.org
Answer» D. peopleinfo.org
6.

Spywares can be used to steal _______________ from the attacker’s browser.

A. browsing history
B. company details
C. plug-ins used
D. browser details
Answer» B. company details
7.

_________________ is quite an esoteric process for preventing session creation through a particular port.

A. Port knocking
B. Port cracking
C. Port hacking
D. Port-jacking
Answer» B. Port cracking
8.

“Unauthorized” data leakage doesn’t essentially mean intended or malicious.

A. True
B. False
C. May be True or False
D. Can't say
Answer» B. False
9.

When leakage of data is done purposely or because of the lack of employee’s concern toward confidential data is called ___________ done by employees of an organization.

A. Ill-intentional data leakage
B. Malfunctioned in database
C. A malfunction in online data
D. ill-intension of an outsider
Answer» B. Malfunctioned in database