

MCQOPTIONS
Saved Bookmarks
This section includes 22 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
App permissions can cause trouble as some apps may secretly access your memory card or contact data. |
A. | True |
B. | False |
Answer» B. False | |
2. |
____________ is an application which now comes built-in Windows OS & it allows Windows users to encrypt all drive for security purpose. |
A. | MS Windows Defender |
B. | MSE |
C. | BitLocker |
D. | MS Office |
Answer» D. MS Office | |
3. |
________________ is an anti-malware tool found in newer OS which is designed for protecting computers from viruses, spyware & other malware. |
A. | Norton Antivirus |
B. | Windows Defender |
C. | Anti-malware |
D. | Microsoft Security Essentials |
Answer» C. Anti-malware | |
4. |
The ______________ account and the __________ account have the same file privileges, but their working and functionalities have difference. |
A. | system, administrator |
B. | system, user |
C. | group, user |
D. | user, administrator |
Answer» B. system, user | |
5. |
A __________ is a dedicatedly designed chip on an endpoint device which stores RSA encryption keys particular to the host system for the purpose of hardware authentication. |
A. | Trusted Platform Mode |
B. | Trusted Protocol Module |
C. | Trusted Privacy Module |
D. | Trusted Platform Module |
Answer» E. | |
6. |
_______________ are based on dictionary attack techniques. |
A. | Hybrid attacks |
B. | Network attacks |
C. | TCP attacks |
D. | Database attacks |
Answer» B. Network attacks | |
7. |
_____________ are based on dictionary attack techniques where the dictionary attack is mixed with some numerals and special symbols. |
A. | Syllable attack |
B. | Rule-based attack |
C. | Offline attack |
D. | Hybrid attack |
Answer» E. | |
8. |
Attackers can use the _______________ when he/she gets some information or hint regarding password he/she wants to crack. |
A. | Syllable attack |
B. | Rule-based attack |
C. | Offline attack |
D. | Hybrid attack |
Answer» C. Offline attack | |
9. |
____________ attack is a combination of Dictionary attack & brute force attack. |
A. | Syllable |
B. | Syllabi |
C. | Database |
D. | Phishing |
Answer» B. Syllabi | |
10. |
________________ attacks are carried out from a location other than the real computer where the password reside or was used. |
A. | passive online |
B. | active online |
C. | offline password |
D. | non-electronic |
Answer» D. non-electronic | |
11. |
Which of the following is not an example of a passive online attack? |
A. | MiTM |
B. | Reply Attack |
C. | Phishing |
D. | Wire sniffing |
Answer» D. Wire sniffing | |
12. |
Which of them is not an example of business email security tool? |
A. | Microsoft Office Trust Center |
B. | Sendinc |
C. | Hushmail Business |
D. | Cisco Jabber |
Answer» E. | |
13. |
_____________ is the technique used for tricking users to disclose their username and passwords through fake pages. |
A. | Social Engineering |
B. | Phishing |
C. | Cookie Stealing |
D. | Banner Grabbing |
Answer» C. Cookie Stealing | |
14. |
Which of them is an example of grabbing email information? |
A. | Cookie stealing |
B. | Reverse engineering |
C. | Port scanning |
D. | Banner grabbing |
Answer» B. Reverse engineering | |
15. |
Which of the following is a non-technical type of intrusion or attack technique? |
A. | Reverse Engineering |
B. | Malware Analysis |
C. | Social Engineering |
D. | Malware Writing |
Answer» D. Malware Writing | |
16. |
Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails. |
A. | trojans, redirected malicious URLs |
B. | antivirus, patches |
C. | cracked software, redirected malicious URLs |
D. | malware, security patches |
Answer» B. antivirus, patches | |
17. |
Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)? |
A. | Zeus |
B. | Stuxnet |
C. | Reaper Exploit |
D. | Friday the 13 |
Answer» D. Friday the 13 | |
18. |
If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie. |
A. | memory |
B. | quarantine |
C. | cookies |
D. | hard drive |
Answer» D. hard drive | |
19. |
BTS stands for ___________________ |
A. | Basement Transceiver Server |
B. | Base Transmitter Station |
C. | Base Transceiver Server |
D. | Base Transceiver Station |
Answer» E. | |
20. |
When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called _____________ |
A. | AP-handshaking |
B. | 4-way handshake |
C. | 4-way connection |
D. | wireless handshaking |
Answer» C. 4-way connection | |
21. |
There are __________ types of wireless authentication modes. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
22. |
WPS stands for __________________ |
A. | WiFi Protected System |
B. | WiFi Protected Setup |
C. | WiFi Protocol Setup |
D. | Wireless Protected Setup |
Answer» C. WiFi Protocol Setup | |