 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Part of the social media sites are the various games & 3rd party applications which helps ______________ to get access to your data. | 
| A. | ethical hackers | 
| B. | penetration testers | 
| C. | security auditors | 
| D. | cyber-criminals | 
| Answer» E. | |
| 2. | Strangers cannot cause much trouble if we connect to them over social media. | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 3. | Clicking on enticing Ads can cause trouble. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 4. | INCREASE_YOUR_SECURITY_FOR_SOCIAL_MEDIA_ACCOUNT_BY_ALWAYS______________AS_YOU_STEP_AWAY_FROM_THE_SYSTEM.?$ | 
| A. | signing in | 
| B. | logging out | 
| C. | signing up | 
| D. | logging in | 
| Answer» C. signing up | |
| 5. | Strangers cannot cause much trouble if we connect to them over social media.$ | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 6. | Clicking_on_enticing_Ads_can_cause_trouble.$ | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 7. | Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 8. | Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 9. | Many social media sites and services provide _______________ for legitimate account verification. | 
| A. | Retina scanning | 
| B. | Fingerprint scanning | 
| C. | CAPTCHA | 
| D. | 2-step verification | 
| Answer» E. | |
| 10. | Part_of_the_social_media_sites_are_the_various_games_&_3rd_party_applications_which_helps________________to_get_access_to_your_data. | 
| A. | ethical hackers | 
| B. | penetration testers | 
| C. | security auditors | 
| D. | cyber-criminals | 
| Answer» E. | |
| 11. | Keeping the password by the name of your pet is a good choice? | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 12. | Try to keep your passwords without meaning so that _____________ attack becomes almost impossible to perform successfully. | 
| A. | social engineering | 
| B. | phishing | 
| C. | password guessing | 
| D. | brute force | 
| Answer» D. brute force | |
| 13. | ________________ is a popular tool to block social-media websites to track your browsing activities. | 
| A. | Fader | 
| B. | Blur | 
| C. | Social-Media Blocker | 
| D. | Ad-blocker | 
| Answer» C. Social-Media Blocker | |
| 14. | If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 15. | Which of them is a proper measure of securing social networking account? | 
| A. | Never keep your password with any relevant names | 
| B. | Keep written records of your passwords | 
| C. | Keep records of your password in audio format in your personal cell-phone | 
| D. | Passwords are kept smaller in size to remember | 
| Answer» B. Keep written records of your passwords | |
| 16. | Which of the following is not an appropriate measure for securing social networking accounts? | 
| A. | Strong passwords | 
| B. | Link your account with a phone number | 
| C. | Never write your password anywhere | 
| D. | Always maintain a soft copy of all your passwords in your PC | 
| Answer» E. | |
| 17. | ____________ type of sites are known as friend-of-a-friend site. | 
| A. | Chat Messenger | 
| B. | Social networking sites | 
| C. | Tutorial sites | 
| D. | Chat-rooms | 
| Answer» C. Tutorial sites | |
| 18. | Which of the following is the most viral section of the internet? | 
| A. | Chat Messenger | 
| B. | Social networking sites | 
| C. | Tutorial sites | 
| D. | Chat-rooms | 
| Answer» C. Tutorial sites | |