All Categories – Sharpen Your Knowledge!
NEW

All Categories MCQs

Topic Notes: All Categories

General Description

Plato

  • Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
  • Important Ideas:
    • Theory of Forms
    • Philosopher-King
    • Ideal State
2141
An attacker rummages through a company's trash to find discarded documents with sensitive information. This technique is called:
Discuss in Board
2142
A user receives an email that looks like it's from a file-sharing service, with a link to a shared document. The link leads to a fake login page. This is an example of:
Discuss in Board
2143
The single most important practice for staying safe online is:
Discuss in Board
2144
You receive an email with a link to reset your password. The link text is "[https://your-email-provider.com/reset](https://www.google.com/search?q=https://your-email-provider.com/reset)", but when you hover over it, the actual URL is "[http://hacker-site.ru](https://www.google.com/search?q=http://hacker-site.ru)". This is a red flag for:
Discuss in Board
2145
A social engineering attack that happens slowly over a long period is known as:
Discuss in Board
2146
Before connecting to a public Wi-Fi network, you should:
Discuss in Board
2147
An email from an unknown sender contains a link with a shortened URL (e.g., bit.ly). What should you do?
Discuss in Board
2148
What is "formjacking"?
Discuss in Board
2149
Social engineering is best described as:
Discuss in Board
2150
You see a link in a social media post that has been shortened using a service like bit.ly. What is a good practice before clicking it?
Discuss in Board