

MCQOPTIONS
Saved Bookmarks
This section includes 21 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following is not a physical security measure to protect against physical hacking? |
A. | Add front desk & restrict unknown access to the back room |
B. | Create a phishing policy |
C. | Analyze how employees maintain their physical data and data storage peripheral devices |
D. | Updating the patches in the software you’re working at your office laptop. |
Answer» E. | |
2. |
Which of the following is not considering the adequate measure for physical security? |
A. | Lock the drawers |
B. | Keep strong passwords for corporate laptops and mobile phones |
C. | Keep confidential organization’s document file open in the desk |
D. | Hide your hand against camera while inserting the PIN code |
Answer» D. Hide your hand against camera while inserting the PIN code | |
3. |
________ is the ability of an individual to gain physical access to an authorized area. |
A. | Network accessing |
B. | Database accessing |
C. | Remote accessing |
D. | Physical accessing |
Answer» E. | |
4. |
Stealing pen drives and DVDs after tailgating is an example of lack of _______ security. |
A. | network security |
B. | physical security |
C. | database security |
D. | wireless security |
Answer» C. database security | |
5. |
Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations. |
A. | True |
B. | False |
Answer» C. | |
6. |
___________ is a special form of attack using which hackers’ exploit – human psychology. |
A. | Cross Site Scripting |
B. | Insecure network |
C. | Social Engineering |
D. | Reverse Engineering |
Answer» D. Reverse Engineering | |
7. |
_________IS_THE_ABILITY_OF_AN_INDIVIDUAL_TO_GAIN_PHYSICAL_ACCESS_TO_AN_AUTHORIZED_AREA.?$ |
A. | Network accessing |
B. | Database accessing |
C. | Remote accessing |
D. | Physical accessing |
Answer» E. | |
8. |
STEALING_PEN_DRIVES_AND_DVDS_AFTER_TAILGATING_IS_AN_EXAMPLE_OF_LACK_OF_________SECURITY.?$ |
A. | network security |
B. | physical security |
C. | database security |
D. | wireless security |
Answer» C. database security | |
9. |
Which of the following is not a physical security measure to protect against physical hacking?$ |
A. | Add front desk & restrict unknown access to the back room |
B. | Create a phishing policy |
C. | Analyze how employees maintain their physical data and data storage peripheral devices |
D. | Updating the patches in the software you’re working at your office laptop. |
Answer» E. | |
10. |
Which of the following is not considering the adequate measure for physical security?$ |
A. | Lock the drawers |
B. | Keep strong passwords for corporate laptops and mobile phones |
C. | Keep confidential organization’s document file open in the desk |
D. | Hide your hand against camera while inserting the PIN code |
Answer» D. Hide your hand against camera while inserting the PIN code | |
11. |
Physical _________ is important to check & test for possible physical breaches. |
A. | penetration test |
B. | security check |
C. | hacking |
D. | access |
Answer» B. security check | |
12. |
Which of them is not an example of physical hacking? |
A. | Walk-in using piggybacking |
B. | Sneak-in |
C. | Break-in and steal |
D. | Phishing |
Answer» E. | |
13. |
IT security department must periodically check for security logs and entries made during office hours. |
A. | True |
B. | False |
Answer» B. False | |
14. |
Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations? |
A. | True |
B. | False |
Answer» C. | |
15. |
Tailgating is also termed as ___________ |
A. | Piggybacking |
B. | Pretexting |
C. | Phishing |
D. | Baiting |
Answer» B. Pretexting | |
16. |
In a phishing, attackers target the ________ technology to so social engineering. |
A. | Emails |
B. | WI-FI network |
C. | Operating systems |
D. | Surveillance camera |
Answer» B. WI-FI network | |
17. |
Which of the following is not an example of social engineering? |
A. | Dumpster diving |
B. | Shoulder surfing |
C. | Carding |
D. | Spear phishing |
Answer» D. Spear phishing | |
18. |
Which of the following is the technique used to look for information in trash or around dustbin container? |
A. | Pretexting |
B. | Baiting |
C. | Quid Pro Quo |
D. | Dumpster diving |
Answer» E. | |
19. |
_________ involves scams where an individual (usually an attacker) lie to a person (the target victim) to acquire privilege data. |
A. | Phishing |
B. | Pretexting |
C. | Spamming |
D. | Vishing |
Answer» C. Spamming | |
20. |
Which of the following do not comes under Social Engineering? |
A. | Tailgating |
B. | Phishing |
C. | Pretexting |
D. | Spamming |
Answer» E. | |
21. |
___________ is a special form of attack using which hackers’ exploit – human psychology. |
A. | Cross Site Scripting |
B. | Insecure network |
C. | Social Engineering |
D. | Reverse Engineering |
Answer» D. Reverse Engineering | |