MCQOPTIONS
Saved Bookmarks
This section includes 24 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser. |
| A. | passwords |
| B. | email ID |
| C. | name |
| D. | address |
| Answer» B. email ID | |
| 2. |
____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details. |
| A. | Ad-based spyware |
| B. | System Monitors |
| C. | Spy-trojans |
| D. | Tracking cookies |
| Answer» C. Spy-trojans | |
| 3. |
_________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator. |
| A. | Ad-based spyware |
| B. | System Monitors |
| C. | Spy-trojans |
| D. | Tracking cookies |
| Answer» D. Tracking cookies | |
| 4. |
_____________ tracks your data and displays those products as ads for promotions. |
| A. | Ad-based spyware |
| B. | System Monitors |
| C. | Spy-trojans |
| D. | Tracking cookies |
| Answer» B. System Monitors | |
| 5. |
_____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes. |
| A. | Ad-based spyware |
| B. | System Monitors |
| C. | Spy-trojans |
| D. | Tracking cookies |
| Answer» E. | |
| 6. |
There are __________ main types of spyware. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» D. 5 | |
| 7. |
Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator. |
| A. | advertisers |
| B. | dark-market |
| C. | antivirus company |
| D. | share market |
| Answer» B. dark-market | |
| 8. |
They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here? |
| A. | Shareware |
| B. | Ransomware |
| C. | Spyware |
| D. | Freeware |
| Answer» D. Freeware | |
| 9. |
________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user. |
| A. | Shareware |
| B. | Spyware |
| C. | Ransomware |
| D. | Freeware |
| Answer» C. Ransomware | |
| 10. |
______________TRACK_THE_USER‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚ÀÖ¬•S_ONLINE_ACTIVITIES_LIKE_SEARCH_QUERIES,_HISTORY_PAGES_&_DOWNLOADS,_FOR_SELLING_PURPOSES.?$# |
| A. | Ad-based spyware |
| B. | System Monitors |
| C. | Spy-trojans |
| D. | Tracking cookies |
| Answer» E. | |
| 11. |
_________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.$ |
| A. | Ad-based spyware |
| B. | System Monitors |
| C. | Spy-trojans |
| D. | Tracking cookies |
| Answer» D. Tracking cookies | |
| 12. |
______________tracks_your_data_and_displays_those_products_as_ads_for_promotions.$ |
| A. | Ad-based spyware |
| B. | System Monitors |
| C. | Spy-trojans |
| D. | Tracking cookies |
| Answer» B. System Monitors | |
| 13. |
If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.$ |
| A. | passwords |
| B. | email ID |
| C. | name |
| D. | address |
| Answer» B. email ID | |
| 14. |
Which of the following is not an anti-spyware tool? |
| A. | MalwareBytes Anti-Malware tool |
| B. | SpyBot Search and Destroy |
| C. | Emsisoft Emergency Kit |
| D. | MS Firewall Defender |
| Answer» E. | |
| 15. |
As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 16. |
Which of the following do not lead you to invite spyware into your system? |
| A. | Accepting fishy prompt or pop-ups |
| B. | Downloading apps from an unreliable source |
| C. | Opening unknown attachments |
| D. | Installing antivirus patches |
| Answer» E. | |
| 17. |
_____________records_all_your_key-strokes,_chat-room_dialogs,_program_run_in_your_system,_and_system_details. |
| A. | Ad-based spyware |
| B. | System Monitors |
| C. | Spy-trojans |
| D. | Tracking cookies |
| Answer» C. Spy-trojans | |
| 18. |
There are __________ main types of spyware? |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» D. 5 | |
| 19. |
It actually infects your device easily & makes it hard to _____________ |
| A. | delete |
| B. | identify |
| C. | modify |
| D. | copy |
| Answer» C. modify | |
| 20. |
Spyware is not a powerful & one of the most widespread threats on the internet. |
| A. | True |
| B. | False |
| Answer» C. | |
| 21. |
Which of the following activity is not done by spyware? |
| A. | sell internet usage data |
| B. | capture credit card details |
| C. | user’s personal identity |
| D. | steal signature of the different virus |
| Answer» E. | |
| 22. |
Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.$ |
| A. | advertisers |
| B. | dark-market |
| C. | antivirus company |
| D. | share market |
| Answer» B. dark-market | |
| 23. |
They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?$ |
| A. | Shareware |
| B. | Ransomware |
| C. | Spyware |
| D. | Freeware |
| Answer» D. Freeware | |
| 24. |
________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user. |
| A. | Shareware |
| B. | Spyware |
| C. | Ransomware |
| D. | Freeware |
| Answer» C. Ransomware | |