

MCQOPTIONS
Saved Bookmarks
This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Part of the social media sites are the various games & 3rd party applications which helps ______________ to get access to your data. |
A. | ethical hackers |
B. | penetration testers |
C. | security auditors |
D. | cyber-criminals |
Answer» E. | |
2. |
Strangers cannot cause much trouble if we connect to them over social media. |
A. | True |
B. | False |
Answer» C. | |
3. |
Clicking on enticing Ads can cause trouble. |
A. | True |
B. | False |
Answer» B. False | |
4. |
INCREASE_YOUR_SECURITY_FOR_SOCIAL_MEDIA_ACCOUNT_BY_ALWAYS______________AS_YOU_STEP_AWAY_FROM_THE_SYSTEM.?$ |
A. | signing in |
B. | logging out |
C. | signing up |
D. | logging in |
Answer» C. signing up | |
5. |
Strangers cannot cause much trouble if we connect to them over social media.$ |
A. | True |
B. | False |
Answer» C. | |
6. |
Clicking_on_enticing_Ads_can_cause_trouble.$ |
A. | True |
B. | False |
Answer» B. False | |
7. |
Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security. |
A. | True |
B. | False |
Answer» B. False | |
8. |
Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media. |
A. | True |
B. | False |
Answer» B. False | |
9. |
Many social media sites and services provide _______________ for legitimate account verification. |
A. | Retina scanning |
B. | Fingerprint scanning |
C. | CAPTCHA |
D. | 2-step verification |
Answer» E. | |
10. |
Part_of_the_social_media_sites_are_the_various_games_&_3rd_party_applications_which_helps________________to_get_access_to_your_data. |
A. | ethical hackers |
B. | penetration testers |
C. | security auditors |
D. | cyber-criminals |
Answer» E. | |
11. |
Keeping the password by the name of your pet is a good choice? |
A. | True |
B. | False |
Answer» C. | |
12. |
Try to keep your passwords without meaning so that _____________ attack becomes almost impossible to perform successfully. |
A. | social engineering |
B. | phishing |
C. | password guessing |
D. | brute force |
Answer» D. brute force | |
13. |
________________ is a popular tool to block social-media websites to track your browsing activities. |
A. | Fader |
B. | Blur |
C. | Social-Media Blocker |
D. | Ad-blocker |
Answer» C. Social-Media Blocker | |
14. |
If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation. |
A. | True |
B. | False |
Answer» B. False | |
15. |
Which of them is a proper measure of securing social networking account? |
A. | Never keep your password with any relevant names |
B. | Keep written records of your passwords |
C. | Keep records of your password in audio format in your personal cell-phone |
D. | Passwords are kept smaller in size to remember |
Answer» B. Keep written records of your passwords | |
16. |
Which of the following is not an appropriate measure for securing social networking accounts? |
A. | Strong passwords |
B. | Link your account with a phone number |
C. | Never write your password anywhere |
D. | Always maintain a soft copy of all your passwords in your PC |
Answer» E. | |
17. |
____________ type of sites are known as friend-of-a-friend site. |
A. | Chat Messenger |
B. | Social networking sites |
C. | Tutorial sites |
D. | Chat-rooms |
Answer» C. Tutorial sites | |
18. |
Which of the following is the most viral section of the internet? |
A. | Chat Messenger |
B. | Social networking sites |
C. | Tutorial sites |
D. | Chat-rooms |
Answer» C. Tutorial sites | |