 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Which of the following is not a physical security measure to protect against physical hacking? | 
| A. | Add front desk & restrict unknown access to the back room | 
| B. | Create a phishing policy | 
| C. | Analyze how employees maintain their physical data and data storage peripheral devices | 
| D. | Updating the patches in the software you’re working at your office laptop. | 
| Answer» E. | |
| 2. | Which of the following is not considering the adequate measure for physical security? | 
| A. | Lock the drawers | 
| B. | Keep strong passwords for corporate laptops and mobile phones | 
| C. | Keep confidential organization’s document file open in the desk | 
| D. | Hide your hand against camera while inserting the PIN code | 
| Answer» D. Hide your hand against camera while inserting the PIN code | |
| 3. | ________ is the ability of an individual to gain physical access to an authorized area. | 
| A. | Network accessing | 
| B. | Database accessing | 
| C. | Remote accessing | 
| D. | Physical accessing | 
| Answer» E. | |
| 4. | Stealing pen drives and DVDs after tailgating is an example of lack of _______ security. | 
| A. | network security | 
| B. | physical security | 
| C. | database security | 
| D. | wireless security | 
| Answer» C. database security | |
| 5. | Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations. | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 6. | ___________ is a special form of attack using which hackers’ exploit – human psychology. | 
| A. | Cross Site Scripting | 
| B. | Insecure network | 
| C. | Social Engineering | 
| D. | Reverse Engineering | 
| Answer» D. Reverse Engineering | |
| 7. | _________IS_THE_ABILITY_OF_AN_INDIVIDUAL_TO_GAIN_PHYSICAL_ACCESS_TO_AN_AUTHORIZED_AREA.?$ | 
| A. | Network accessing | 
| B. | Database accessing | 
| C. | Remote accessing | 
| D. | Physical accessing | 
| Answer» E. | |
| 8. | STEALING_PEN_DRIVES_AND_DVDS_AFTER_TAILGATING_IS_AN_EXAMPLE_OF_LACK_OF_________SECURITY.?$ | 
| A. | network security | 
| B. | physical security | 
| C. | database security | 
| D. | wireless security | 
| Answer» C. database security | |
| 9. | Which of the following is not a physical security measure to protect against physical hacking?$ | 
| A. | Add front desk & restrict unknown access to the back room | 
| B. | Create a phishing policy | 
| C. | Analyze how employees maintain their physical data and data storage peripheral devices | 
| D. | Updating the patches in the software you’re working at your office laptop. | 
| Answer» E. | |
| 10. | Which of the following is not considering the adequate measure for physical security?$ | 
| A. | Lock the drawers | 
| B. | Keep strong passwords for corporate laptops and mobile phones | 
| C. | Keep confidential organization’s document file open in the desk | 
| D. | Hide your hand against camera while inserting the PIN code | 
| Answer» D. Hide your hand against camera while inserting the PIN code | |
| 11. | Physical _________ is important to check & test for possible physical breaches. | 
| A. | penetration test | 
| B. | security check | 
| C. | hacking | 
| D. | access | 
| Answer» B. security check | |
| 12. | Which of them is not an example of physical hacking? | 
| A. | Walk-in using piggybacking | 
| B. | Sneak-in | 
| C. | Break-in and steal | 
| D. | Phishing | 
| Answer» E. | |
| 13. | IT security department must periodically check for security logs and entries made during office hours. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 14. | Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations? | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 15. | Tailgating is also termed as ___________ | 
| A. | Piggybacking | 
| B. | Pretexting | 
| C. | Phishing | 
| D. | Baiting | 
| Answer» B. Pretexting | |
| 16. | In a phishing, attackers target the ________ technology to so social engineering. | 
| A. | Emails | 
| B. | WI-FI network | 
| C. | Operating systems | 
| D. | Surveillance camera | 
| Answer» B. WI-FI network | |
| 17. | Which of the following is not an example of social engineering? | 
| A. | Dumpster diving | 
| B. | Shoulder surfing | 
| C. | Carding | 
| D. | Spear phishing | 
| Answer» D. Spear phishing | |
| 18. | Which of the following is the technique used to look for information in trash or around dustbin container? | 
| A. | Pretexting | 
| B. | Baiting | 
| C. | Quid Pro Quo | 
| D. | Dumpster diving | 
| Answer» E. | |
| 19. | _________ involves scams where an individual (usually an attacker) lie to a person (the target victim) to acquire privilege data. | 
| A. | Phishing | 
| B. | Pretexting | 
| C. | Spamming | 
| D. | Vishing | 
| Answer» C. Spamming | |
| 20. | Which of the following do not comes under Social Engineering? | 
| A. | Tailgating | 
| B. | Phishing | 
| C. | Pretexting | 
| D. | Spamming | 
| Answer» E. | |
| 21. | ___________ is a special form of attack using which hackers’ exploit – human psychology. | 
| A. | Cross Site Scripting | 
| B. | Insecure network | 
| C. | Social Engineering | 
| D. | Reverse Engineering | 
| Answer» D. Reverse Engineering | |