 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 22 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | App permissions can cause trouble as some apps may secretly access your memory card or contact data. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 2. | ____________ is an application which now comes built-in Windows OS & it allows Windows users to encrypt all drive for security purpose. | 
| A. | MS Windows Defender | 
| B. | MSE | 
| C. | BitLocker | 
| D. | MS Office | 
| Answer» D. MS Office | |
| 3. | ________________ is an anti-malware tool found in newer OS which is designed for protecting computers from viruses, spyware & other malware. | 
| A. | Norton Antivirus | 
| B. | Windows Defender | 
| C. | Anti-malware | 
| D. | Microsoft Security Essentials | 
| Answer» C. Anti-malware | |
| 4. | The ______________ account and the __________ account have the same file privileges, but their working and functionalities have difference. | 
| A. | system, administrator | 
| B. | system, user | 
| C. | group, user | 
| D. | user, administrator | 
| Answer» B. system, user | |
| 5. | A __________ is a dedicatedly designed chip on an endpoint device which stores RSA encryption keys particular to the host system for the purpose of hardware authentication. | 
| A. | Trusted Platform Mode | 
| B. | Trusted Protocol Module | 
| C. | Trusted Privacy Module | 
| D. | Trusted Platform Module | 
| Answer» E. | |
| 6. | _______________ are based on dictionary attack techniques. | 
| A. | Hybrid attacks | 
| B. | Network attacks | 
| C. | TCP attacks | 
| D. | Database attacks | 
| Answer» B. Network attacks | |
| 7. | _____________ are based on dictionary attack techniques where the dictionary attack is mixed with some numerals and special symbols. | 
| A. | Syllable attack | 
| B. | Rule-based attack | 
| C. | Offline attack | 
| D. | Hybrid attack | 
| Answer» E. | |
| 8. | Attackers can use the _______________ when he/she gets some information or hint regarding password he/she wants to crack. | 
| A. | Syllable attack | 
| B. | Rule-based attack | 
| C. | Offline attack | 
| D. | Hybrid attack | 
| Answer» C. Offline attack | |
| 9. | ____________ attack is a combination of Dictionary attack & brute force attack. | 
| A. | Syllable | 
| B. | Syllabi | 
| C. | Database | 
| D. | Phishing | 
| Answer» B. Syllabi | |
| 10. | ________________ attacks are carried out from a location other than the real computer where the password reside or was used. | 
| A. | passive online | 
| B. | active online | 
| C. | offline password | 
| D. | non-electronic | 
| Answer» D. non-electronic | |
| 11. | Which of the following is not an example of a passive online attack? | 
| A. | MiTM | 
| B. | Reply Attack | 
| C. | Phishing | 
| D. | Wire sniffing | 
| Answer» D. Wire sniffing | |
| 12. | Which of them is not an example of business email security tool? | 
| A. | Microsoft Office Trust Center | 
| B. | Sendinc | 
| C. | Hushmail Business | 
| D. | Cisco Jabber | 
| Answer» E. | |
| 13. | _____________ is the technique used for tricking users to disclose their username and passwords through fake pages. | 
| A. | Social Engineering | 
| B. | Phishing | 
| C. | Cookie Stealing | 
| D. | Banner Grabbing | 
| Answer» C. Cookie Stealing | |
| 14. | Which of them is an example of grabbing email information? | 
| A. | Cookie stealing | 
| B. | Reverse engineering | 
| C. | Port scanning | 
| D. | Banner grabbing | 
| Answer» B. Reverse engineering | |
| 15. | Which of the following is a non-technical type of intrusion or attack technique? | 
| A. | Reverse Engineering | 
| B. | Malware Analysis | 
| C. | Social Engineering | 
| D. | Malware Writing | 
| Answer» D. Malware Writing | |
| 16. | Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails. | 
| A. | trojans, redirected malicious URLs | 
| B. | antivirus, patches | 
| C. | cracked software, redirected malicious URLs | 
| D. | malware, security patches | 
| Answer» B. antivirus, patches | |
| 17. | Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)? | 
| A. | Zeus | 
| B. | Stuxnet | 
| C. | Reaper Exploit | 
| D. | Friday the 13 | 
| Answer» D. Friday the 13 | |
| 18. | If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie. | 
| A. | memory | 
| B. | quarantine | 
| C. | cookies | 
| D. | hard drive | 
| Answer» D. hard drive | |
| 19. | BTS stands for ___________________ | 
| A. | Basement Transceiver Server | 
| B. | Base Transmitter Station | 
| C. | Base Transceiver Server | 
| D. | Base Transceiver Station | 
| Answer» E. | |
| 20. | When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called _____________ | 
| A. | AP-handshaking | 
| B. | 4-way handshake | 
| C. | 4-way connection | 
| D. | wireless handshaking | 
| Answer» C. 4-way connection | |
| 21. | There are __________ types of wireless authentication modes. | 
| A. | 2 | 
| B. | 3 | 
| C. | 4 | 
| D. | 5 | 
| Answer» B. 3 | |
| 22. | WPS stands for __________________ | 
| A. | WiFi Protected System | 
| B. | WiFi Protected Setup | 
| C. | WiFi Protocol Setup | 
| D. | Wireless Protected Setup | 
| Answer» C. WiFi Protocol Setup | |