Cyber Security Social Engineering Physical Hacking Online Exam Quiz
Cyber Security Social Engineering Physical Hacking GK Quiz. Question and Answers related to Cyber Security Social Engineering Physical Hacking. MCQ (Multiple Choice Questions with answers about Cyber Security Social Engineering Physical Hacking
Which of the following is not a physical security measure to protect against physical hacking?
Options
A : Add front desk & restrict unknown access to the back room
B : Create a phishing policy
C : Analyze how employees maintain their physical data and data storage peripheral devices
D : Updating the patches in the software you’re working at your office laptop.
___________ is a special form of attack using which hackers’ exploit – human psychology.
Options
A : Cross Site Scripting
B : Insecure network
C : Social Engineering
D : Reverse Engineering
Which of the following is not an example of social engineering?
Options
A : Dumpster diving
B : Shoulder surfing
C : Carding
D : Spear phishing
In a phishing, attackers target the ________ technology to so social engineering.
Options
A : Emails
B : WI-FI network
C : Operating systems
D : Surveillance camera
Which of the following is not considering the adequate measure for physical security?
Options
A : Lock the drawers
B : Keep strong passwords for corporate laptops and mobile phones
C : Keep confidential organization’s document file open in the desk
D : Hide your hand against camera while inserting the PIN code
________ is the ability of an individual to gain physical access to an authorized area.
Options
A : Network accessing
B : Database accessing
C : Remote accessing
D : Physical accessing
Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.
Options
A : network security
B : physical security
C : database security
D : wireless security
Physical _________ is important to check & test for possible physical breaches.
Options
A : penetration test
B : security check
C : hacking
D : access
_________ involves scams where an individual (usually an attacker) lie to a person (the target victim) to acquire privilege data.
Options
A : Phishing
B : Pretexting
C : Spamming
D : Vishing
Tailgating is also termed as ___________
Options
A : Piggybacking
B : Pretexting
C : Phishing
D : Baiting
Chemical Engineering Basics - Part 1 more Online Exam Quiz
Cyber Security Reverse Engineering 1
Cyber Security Scanning Phase Security 1
Cyber Security Security Protocols 1
Cyber Security Session Hijacking
Cyber Security Social Networking Security