All Categories MCQs
Topic Notes: All Categories
General Description
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2091
If you are unsure about a link, what is a safe way to investigate it?
Answer:
All of the above.
All of these are safe methods for investigating a suspicious link without exposing your own computer to potential threats. Using a sandbox or a link scanner are particularly effective technical solutions.
2092
A "tech support scam" typically involves:
Answer:
A pop-up message or phone call claiming your computer has a virus.
Tech support scams use fear tactics, like fake virus warnings, to trick people into believing there is a problem with their computer. The scammers then charge for unnecessary or fraudulent "repairs."
2093
A social engineer might use jargon and technical terms to:
Answer:
Both A and B.
Using technical language can make a social engineer sound like a legitimate expert (e.g., an IT support person) and can also overwhelm a target, making them more likely to comply with requests without understanding them.
2094
An attacker sends an email claiming to be from a courier company, stating that a package could not be delivered. The email includes an attachment that is supposedly a shipping label but is actually malware. This is an example of using what as a lure?
Answer:
Curiosity
This type of attack preys on the victim's curiosity about the "undelivered package," enticing them to open the malicious attachment without thinking.
2095
What is the best way to respond to a suspected social engineering attempt?
Answer:
Politely refuse the request and report the incident through proper channels.
The safest and most professional response is to deny the request and then report it to your IT or security department. Trying to engage with the attacker can be risky and is not recommended.
2096
A phishing email that appears to come from a government agency, such as the tax office, is a common tactic because:
Answer:
These emails can evoke fear and a sense of authority, making people more likely to comply.
Impersonating a government body is an effective phishing tactic because it plays on people's respect for authority and their fear of legal or financial repercussions, making them more likely to follow the instructions in the fraudulent email.
2097
To protect against SIM swap scams, you should:
Answer:
All of the above.
Securing your mobile account with a PIN, using more secure 2FA methods like authenticator apps, and being alert to signs of a SIM swap are all important preventative measures.
2098
What is the top-level domain (TLD) in the URL "[https://www.example.co.uk](https://www.google.com/search?q=https://www.example.co.uk)"?
Answer:
.co.uk
The top-level domain (TLD) is the last part of a domain name. In this case, ".co.uk" is the TLD. It's important to pay attention to the TLD, as scammers may use unusual TLDs to create deceptive URLs.
2099
Which of the following is a less common form of phishing?
Answer:
QR code phishing (Quishing)
While less common than email or SMS phishing, "quishing" involves tricking users into scanning a malicious QR code that can lead to a fake website or download malware. Fax phishing is extremely rare now, and carrier pigeon phishing is not a real threat.
2100
How can you identify a secure website?
Answer:
Look for "https" at the beginning of the URL and a padlock icon in the address bar.
The "https" and the padlock icon indicate that the website is using a secure, encrypted connection. While not a guarantee of the site's trustworthiness, it is a crucial first step for any site where you might enter personal information.