Explore topic-wise MCQs in Cyber Security.

This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is not a physical security measure to protect against physical hacking?

A. Add front desk & restrict unknown access to the back room
B. Create a phishing policy
C. Analyze how employees maintain their physical data and data storage peripheral devices
D. Updating the patches in the software you’re working at your office laptop.
Answer» E.
2.

Which of the following is not considering the adequate measure for physical security?

A. Lock the drawers
B. Keep strong passwords for corporate laptops and mobile phones
C. Keep confidential organization’s document file open in the desk
D. Hide your hand against camera while inserting the PIN code
Answer» D. Hide your hand against camera while inserting the PIN code
3.

________ is the ability of an individual to gain physical access to an authorized area.

A. Network accessing
B. Database accessing
C. Remote accessing
D. Physical accessing
Answer» E.
4.

Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.

A. network security
B. physical security
C. database security
D. wireless security
Answer» C. database security
5.

Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations.

A. True
B. False
Answer» C.
6.

___________ is a special form of attack using which hackers’ exploit – human psychology.

A. Cross Site Scripting
B. Insecure network
C. Social Engineering
D. Reverse Engineering
Answer» D. Reverse Engineering
7.

_________IS_THE_ABILITY_OF_AN_INDIVIDUAL_TO_GAIN_PHYSICAL_ACCESS_TO_AN_AUTHORIZED_AREA.?$

A. Network accessing
B. Database accessing
C. Remote accessing
D. Physical accessing
Answer» E.
8.

STEALING_PEN_DRIVES_AND_DVDS_AFTER_TAILGATING_IS_AN_EXAMPLE_OF_LACK_OF_________SECURITY.?$

A. network security
B. physical security
C. database security
D. wireless security
Answer» C. database security
9.

Which of the following is not a physical security measure to protect against physical hacking?$

A. Add front desk & restrict unknown access to the back room
B. Create a phishing policy
C. Analyze how employees maintain their physical data and data storage peripheral devices
D. Updating the patches in the software you’re working at your office laptop.
Answer» E.
10.

Which of the following is not considering the adequate measure for physical security?$

A. Lock the drawers
B. Keep strong passwords for corporate laptops and mobile phones
C. Keep confidential organization’s document file open in the desk
D. Hide your hand against camera while inserting the PIN code
Answer» D. Hide your hand against camera while inserting the PIN code
11.

Physical _________ is important to check & test for possible physical breaches.

A. penetration test
B. security check
C. hacking
D. access
Answer» B. security check
12.

Which of them is not an example of physical hacking?

A. Walk-in using piggybacking
B. Sneak-in
C. Break-in and steal
D. Phishing
Answer» E.
13.

IT security department must periodically check for security logs and entries made during office hours.

A. True
B. False
Answer» B. False
14.

Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations?

A. True
B. False
Answer» C.
15.

Tailgating is also termed as ___________

A. Piggybacking
B. Pretexting
C. Phishing
D. Baiting
Answer» B. Pretexting
16.

In a phishing, attackers target the ________ technology to so social engineering.

A. Emails
B. WI-FI network
C. Operating systems
D. Surveillance camera
Answer» B. WI-FI network
17.

Which of the following is not an example of social engineering?

A. Dumpster diving
B. Shoulder surfing
C. Carding
D. Spear phishing
Answer» D. Spear phishing
18.

Which of the following is the technique used to look for information in trash or around dustbin container?

A. Pretexting
B. Baiting
C. Quid Pro Quo
D. Dumpster diving
Answer» E.
19.

_________ involves scams where an individual (usually an attacker) lie to a person (the target victim) to acquire privilege data.

A. Phishing
B. Pretexting
C. Spamming
D. Vishing
Answer» C. Spamming
20.

Which of the following do not comes under Social Engineering?

A. Tailgating
B. Phishing
C. Pretexting
D. Spamming
Answer» E.
21.

___________ is a special form of attack using which hackers’ exploit – human psychology.

A. Cross Site Scripting
B. Insecure network
C. Social Engineering
D. Reverse Engineering
Answer» D. Reverse Engineering