All Categories MCQs
Topic Notes: All Categories
General Description
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2111
If you receive a friend request on social media from someone you don't know, what is the safest course of action?
Answer:
Ignore or delete the request.
Accepting friend requests from strangers can expose your personal information to scammers and social engineers who may be using fake profiles to gather data on potential targets.
2112
What is "doxing"?
Answer:
The act of researching and broadcasting private or identifiable information about an individual or organization.
Doxing is a form of online harassment where an individual's personal information (like their real name, address, or phone number) is shared publicly without their consent, often with malicious intent.
2113
If a website has a valid HTTPS certificate and a padlock icon, does that mean it's safe to use?
Answer:
Not necessarily. It only means the connection is encrypted. The site itself could still be malicious.
It has become easy and cheap for anyone, including scammers, to obtain an HTTPS certificate. While HTTPS is important for security, it is no longer a reliable indicator of a website's trustworthiness.
2114
What is a "digital footprint"?
Answer:
The trail of data you leave behind when you are active online.
Your digital footprint includes everything from your social media posts and browsing history to online shopping data. It is important to be mindful of your digital footprint, as this data can be collected and used by various parties.
2115
What is the main difference between social engineering and traditional hacking?
Answer:
Social engineering targets people, while hacking targets technology.
The core difference is the target of the attack. Hacking focuses on exploiting vulnerabilities in software and hardware, while social engineering focuses on exploiting vulnerabilities in human psychology.
2116
What are "cookies" in the context of web browsing?
Answer:
Small files that websites store on your computer to remember information about you.
Cookies are used by websites for many purposes, such as keeping you logged in, remembering your site preferences, and tracking your browsing activity for advertising purposes.
2117
Stealing personal information and pretending to be another person is called:
Answer:
Identity theft
Identity theft involves using another person's personal information without their permission to commit fraud or other crimes.
2118
Why should you be cautious about the permissions you grant to mobile apps?
Answer:
Apps may request access to more data than they need to function, such as your contacts, location, or microphone.
It is important to review the permissions an app requests and consider whether they are necessary for the app's functionality. Overly permissive apps can pose a significant privacy risk.
2119
A person holds a door open for someone they don't know, allowing them to enter a secure building without a key card. This is an example of:
Answer:
Tailgating
Tailgating, also known as piggybacking, is a physical security breach where an unauthorized person follows an authorized individual into a restricted area.
2120
What does clearing your browser's cache and cookies do?
Answer:
It removes temporary files and tracking data stored by websites.
Clearing your cache and cookies can improve your privacy by removing tracking data and can also resolve some website loading issues by deleting outdated temporary files.