All Categories MCQs
Topic Notes: All Categories
General Description
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2131
What is a "drive-by download"?
Answer:
The unintentional download of software onto a computer, which can happen just by visiting a compromised website.
A drive-by download is a serious threat where a user can get malware on their system simply by loading a malicious webpage, without having to click on anything or approve a download.
2132
An email link looks like this: "[http://www.mybank.com@192.168.1.1](https://www.google.com/search?q=http://www.mybank.com%40192.168.1.1)". Where does this link actually go?
Answer:
The IP address 192.168.1.1
The "@" symbol in a URL can be used to pass authentication credentials, but in this context, it's a trick. The browser will ignore everything before the "@" symbol and will attempt to connect to the IP address that follows it.
2133
An attacker who creates a fake social media profile of a company executive to trick employees into revealing sensitive information is conducting what type of attack?
Answer:
Whaling
Whaling is a specific type of spear phishing attack that targets high-profile employees, such as senior executives or C-level managers, to steal sensitive information.
2134
Before donating to a charity, you should:
Answer:
Research the charity using a reputable watchdog organization (like Charity Navigator).
It is important to do your own research to ensure that a charity is legitimate and that your donation will be used effectively. Independent charity evaluators are a good resource for this.
2135
A fake website often has a sense of "wrongness" about it, with slightly off colors, logos, or fonts. This is because:
Answer:
It is difficult to perfectly replicate a professional website.
While scammers try to make their fake sites look convincing, it is very hard to perfectly copy every detail of a professionally designed website. Small inconsistencies in branding, design, and layout are often giveaways.
2136
"Honeytrap" is a social engineering tactic where an attacker:
Answer:
Uses a fake online persona to start a romantic relationship with a target to extract information.
A honeytrap involves using a romantic or sexual relationship, often initiated online, as a means to manipulate a target into revealing confidential information or performing certain actions.
2137
What is "domain spoofing"?
Answer:
All of the above.
Domain spoofing encompasses several techniques used to deceive users about the origin of a communication or the identity of a website, including using similar-looking domain names and forging email sender addresses.
2138
What is the "Internet of Things" (IoT)?
Answer:
A network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, and sensors that allows them to connect and exchange data.
The IoT refers to the vast network of everyday objects that are connected to the internet. While offering convenience, these devices can also pose security and privacy risks if they are not properly secured.
2139
What is a good way to verify if a website is the official site for a company?
Answer:
Search for the company on a search engine and use the link from the search results.
One of the safest ways to find a legitimate website is to use a trusted search engine and click on the official link from the search results, rather than relying on links from unsolicited emails or messages.
2140
What is a potential danger of "geotagging" your photos on social media?
Answer:
It can reveal your exact location, including your home address, to the public.
Geotagging embeds location data into a photo's metadata. Sharing these photos publicly can inadvertently reveal sensitive information about your whereabouts and daily routines, which could be exploited by criminals.