All Categories MCQs
Topic Notes: All Categories
General Description
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2101
"Smishing" is a type of phishing that is carried out through which communication channel?
Answer:
SMS (text messages)
Smishing is a portmanteau of "SMS" and "phishing." It is a type of phishing attack where scammers use fraudulent text messages to trick people into giving away sensitive information.
2102
An attacker calls an employee pretending to be from the IT department and asks for their password to perform a system update. This is an example of:
Answer:
Pretexting
Pretexting is when an attacker creates a fabricated scenario (the pretext) to gain the victim's trust and convince them to provide information or perform an action they wouldn't normally do.
2103
"Vishing" is a phishing attack conducted through:
Answer:
Voice calls
Vishing, or voice phishing, is the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information.
2104
Why are social engineering attacks so successful?
Answer:
They exploit natural human tendencies like trust, fear, and curiosity.
The success of social engineering lies in its ability to exploit fundamental human emotions and cognitive biases. It's often easier to trick a person than to hack a computer system.
2105
How can you protect your personal information online?
Answer:
All of the above.
Protecting your identity online requires a combination of good habits, including limiting the amount of personal data you share publicly and using strong security practices for your online accounts.
2106
A phishing email might try to create a sense of panic by claiming your account has been compromised. Why is this effective?
Answer:
It causes the recipient to act impulsively without thinking.
By creating a sense of panic or urgency, phishing attacks exploit human psychology to make people act rashly and bypass their usual security checks, leading them to click on malicious links or provide information without proper scrutiny.
2107
What is a "credit freeze"?
Answer:
A tool that restricts access to your credit report, making it harder for identity thieves to open new accounts in your name.
A credit freeze is a powerful tool to prevent identity theft. When your credit is frozen, lenders cannot access your credit report, which means they are unlikely to approve any new applications for credit in your name.
2108
What is the primary goal of a phishing attack?
Answer:
To steal personal information, such as login credentials and credit card numbers
Phishing attacks are designed to trick individuals into divulging sensitive personal and financial information by masquerading as a trustworthy entity in an electronic communication.
2109
A website that does not have a privacy policy should be considered:
Answer:
Suspicious, as legitimate sites are usually transparent about how they handle your data.
A privacy policy is a legal document that explains how an organization handles customer data. The absence of a privacy policy is a red flag and suggests the site may not be trustworthy.
2110
Which of these is a potential sign of a spear phishing attempt?
Answer:
All of the above.
Spear phishing emails are often highly convincing because they are personalized. An unusual request from a known person, specific details about you, and a sense of urgency are all indicators of a potential spear phishing attack.