

MCQOPTIONS
Saved Bookmarks
This section includes 24 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser. |
A. | passwords |
B. | email ID |
C. | name |
D. | address |
Answer» B. email ID | |
2. |
____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details. |
A. | Ad-based spyware |
B. | System Monitors |
C. | Spy-trojans |
D. | Tracking cookies |
Answer» C. Spy-trojans | |
3. |
_________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator. |
A. | Ad-based spyware |
B. | System Monitors |
C. | Spy-trojans |
D. | Tracking cookies |
Answer» D. Tracking cookies | |
4. |
_____________ tracks your data and displays those products as ads for promotions. |
A. | Ad-based spyware |
B. | System Monitors |
C. | Spy-trojans |
D. | Tracking cookies |
Answer» B. System Monitors | |
5. |
_____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes. |
A. | Ad-based spyware |
B. | System Monitors |
C. | Spy-trojans |
D. | Tracking cookies |
Answer» E. | |
6. |
There are __________ main types of spyware. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 | |
7. |
Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator. |
A. | advertisers |
B. | dark-market |
C. | antivirus company |
D. | share market |
Answer» B. dark-market | |
8. |
They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here? |
A. | Shareware |
B. | Ransomware |
C. | Spyware |
D. | Freeware |
Answer» D. Freeware | |
9. |
________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user. |
A. | Shareware |
B. | Spyware |
C. | Ransomware |
D. | Freeware |
Answer» C. Ransomware | |
10. |
______________TRACK_THE_USER‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚ÀÖ¬•S_ONLINE_ACTIVITIES_LIKE_SEARCH_QUERIES,_HISTORY_PAGES_&_DOWNLOADS,_FOR_SELLING_PURPOSES.?$# |
A. | Ad-based spyware |
B. | System Monitors |
C. | Spy-trojans |
D. | Tracking cookies |
Answer» E. | |
11. |
_________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.$ |
A. | Ad-based spyware |
B. | System Monitors |
C. | Spy-trojans |
D. | Tracking cookies |
Answer» D. Tracking cookies | |
12. |
______________tracks_your_data_and_displays_those_products_as_ads_for_promotions.$ |
A. | Ad-based spyware |
B. | System Monitors |
C. | Spy-trojans |
D. | Tracking cookies |
Answer» B. System Monitors | |
13. |
If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.$ |
A. | passwords |
B. | email ID |
C. | name |
D. | address |
Answer» B. email ID | |
14. |
Which of the following is not an anti-spyware tool? |
A. | MalwareBytes Anti-Malware tool |
B. | SpyBot Search and Destroy |
C. | Emsisoft Emergency Kit |
D. | MS Firewall Defender |
Answer» E. | |
15. |
As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents. |
A. | True |
B. | False |
Answer» B. False | |
16. |
Which of the following do not lead you to invite spyware into your system? |
A. | Accepting fishy prompt or pop-ups |
B. | Downloading apps from an unreliable source |
C. | Opening unknown attachments |
D. | Installing antivirus patches |
Answer» E. | |
17. |
_____________records_all_your_key-strokes,_chat-room_dialogs,_program_run_in_your_system,_and_system_details. |
A. | Ad-based spyware |
B. | System Monitors |
C. | Spy-trojans |
D. | Tracking cookies |
Answer» C. Spy-trojans | |
18. |
There are __________ main types of spyware? |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 | |
19. |
It actually infects your device easily & makes it hard to _____________ |
A. | delete |
B. | identify |
C. | modify |
D. | copy |
Answer» C. modify | |
20. |
Spyware is not a powerful & one of the most widespread threats on the internet. |
A. | True |
B. | False |
Answer» C. | |
21. |
Which of the following activity is not done by spyware? |
A. | sell internet usage data |
B. | capture credit card details |
C. | user’s personal identity |
D. | steal signature of the different virus |
Answer» E. | |
22. |
Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.$ |
A. | advertisers |
B. | dark-market |
C. | antivirus company |
D. | share market |
Answer» B. dark-market | |
23. |
They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?$ |
A. | Shareware |
B. | Ransomware |
C. | Spyware |
D. | Freeware |
Answer» D. Freeware | |
24. |
________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user. |
A. | Shareware |
B. | Spyware |
C. | Ransomware |
D. | Freeware |
Answer» C. Ransomware | |