All Categories MCQs
Topic Notes: All Categories
General Description
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2081
The ultimate defense against social engineering is:
Answer:
A well-trained and aware workforce.
While technology plays a role, the human element is the primary target of social engineering. Therefore, continuous training, awareness, and fostering a culture of security are the most effective defenses.
2082
Which of the following is NOT a type of phishing?
Answer:
Rootkit
A rootkit is a type of malicious software that is designed to gain unauthorized access to a computer system and remain hidden. Phishing, smishing, and vishing are all forms of social engineering attacks designed to steal information.
2083
What is a "man-in-the-middle" (MitM) attack?
Answer:
An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
A MitM attack is a form of eavesdropping where an attacker intercepts a connection between two systems. This is a major risk on unsecured public Wi-Fi networks.
2084
A spear phishing attack that targets high-level executives is also known as:
Answer:
All of the above
Whaling, CEO fraud, and executive phishing are all terms used to describe spear phishing attacks that specifically target senior executives and other high-value individuals within an organization.
2085
Why is it a bad idea to use public Wi-Fi for sensitive transactions like online banking?
Answer:
Your data can be easily intercepted by others on the same network.
Public Wi-Fi networks are often unencrypted and not secure. This makes it easy for attackers on the same network to "eavesdrop" on your connection and steal any information you send, including usernames, passwords, and credit card numbers.
2086
Social engineering attacks can be used to:
Answer:
All of the above.
Social engineering is a versatile attack vector that can be used to achieve a wide range of malicious goals, from data theft to facilitating other types of cyberattacks.
2087
You are on a website and a pop-up appears, claiming your computer is infected with viruses and you need to call a phone number for tech support. This is a sign of:
Answer:
A tech support scam.
This is a common tech support scam that uses fake virus alerts to frighten users into calling a fraudulent support number, where they will be pressured into paying for unnecessary and often harmful services.
2088
What is phishing in cybersecurity?
Answer:
Fraudulent data theft
Phishing tricks users into revealing sensitive data via fake messages or sites.
2089
If your web browser warns you that a website is "not secure" or that the "connection is not private," you should:
Answer:
Close the tab and avoid entering any personal information on the site.
These warnings from your browser are important security indicators. They often mean the website has an invalid or expired security certificate, and you should not trust it with any sensitive information.
2090
Why do scammers often ask for payment in the form of gift cards, wire transfers, or cryptocurrency?
Answer:
They are like cash; once the money is sent, it is very difficult or impossible to trace and recover.
Scammers prefer irreversible and anonymous payment methods because it makes it much harder for law enforcement to track them and for victims to get their money back.