Explore topic-wise MCQs in Cyber Security.

This section includes 24 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.

A. passwords
B. email ID
C. name
D. address
Answer» B. email ID
2.

____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details.

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» C. Spy-trojans
3.

_________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» D. Tracking cookies
4.

_____________ tracks your data and displays those products as ads for promotions.

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» B. System Monitors
5.

_____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes.

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» E.
6.

There are __________ main types of spyware.

A. 2
B. 3
C. 4
D. 5
Answer» D. 5
7.

Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.

A. advertisers
B. dark-market
C. antivirus company
D. share market
Answer» B. dark-market
8.

They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?

A. Shareware
B. Ransomware
C. Spyware
D. Freeware
Answer» D. Freeware
9.

________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.

A. Shareware
B. Spyware
C. Ransomware
D. Freeware
Answer» C. Ransomware
10.

______________TRACK_THE_USER‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚ÀÖ¬•S_ONLINE_ACTIVITIES_LIKE_SEARCH_QUERIES,_HISTORY_PAGES_&_DOWNLOADS,_FOR_SELLING_PURPOSES.?$#

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» E.
11.

_________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.$

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» D. Tracking cookies
12.

______________tracks_your_data_and_displays_those_products_as_ads_for_promotions.$

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» B. System Monitors
13.

If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.$

A. passwords
B. email ID
C. name
D. address
Answer» B. email ID
14.

Which of the following is not an anti-spyware tool?

A. MalwareBytes Anti-Malware tool
B. SpyBot Search and Destroy
C. Emsisoft Emergency Kit
D. MS Firewall Defender
Answer» E.
15.

As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents.

A. True
B. False
Answer» B. False
16.

Which of the following do not lead you to invite spyware into your system?

A. Accepting fishy prompt or pop-ups
B. Downloading apps from an unreliable source
C. Opening unknown attachments
D. Installing antivirus patches
Answer» E.
17.

_____________records_all_your_key-strokes,_chat-room_dialogs,_program_run_in_your_system,_and_system_details.

A. Ad-based spyware
B. System Monitors
C. Spy-trojans
D. Tracking cookies
Answer» C. Spy-trojans
18.

There are __________ main types of spyware?

A. 2
B. 3
C. 4
D. 5
Answer» D. 5
19.

It actually infects your device easily & makes it hard to _____________

A. delete
B. identify
C. modify
D. copy
Answer» C. modify
20.

Spyware is not a powerful & one of the most widespread threats on the internet.

A. True
B. False
Answer» C.
21.

Which of the following activity is not done by spyware?

A. sell internet usage data
B. capture credit card details
C. user’s personal identity
D. steal signature of the different virus
Answer» E.
22.

Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.$

A. advertisers
B. dark-market
C. antivirus company
D. share market
Answer» B. dark-market
23.

They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?$

A. Shareware
B. Ransomware
C. Spyware
D. Freeware
Answer» D. Freeware
24.

________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.

A. Shareware
B. Spyware
C. Ransomware
D. Freeware
Answer» C. Ransomware