All Categories MCQs
Topic Notes: All Categories
General Description
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
2141
An attacker rummages through a company's trash to find discarded documents with sensitive information. This technique is called:
Answer:
Dumpster diving
Dumpster diving is the practice of searching through trash for discarded items that may contain valuable information, such as old bills, memos, or even password lists.
2142
A user receives an email that looks like it's from a file-sharing service, with a link to a shared document. The link leads to a fake login page. This is an example of:
Answer:
Phishing
This is a common phishing technique that uses the guise of a familiar service to trick the user into entering their login credentials on a fraudulent page.
2143
The single most important practice for staying safe online is:
Answer:
Being cautious, skeptical, and thinking before you click.
While technology and tools are helpful, the human factor is the most critical element of cybersecurity. A vigilant and educated user who questions what they see online is the best defense against the vast majority of threats.
2144
You receive an email with a link to reset your password. The link text is "[https://your-email-provider.com/reset](https://www.google.com/search?q=https://your-email-provider.com/reset)", but when you hover over it, the actual URL is "[http://hacker-site.ru](https://www.google.com/search?q=http://hacker-site.ru)". This is a red flag for:
Answer:
A phishing attack.
The discrepancy between the link text and the actual destination URL is a classic sign of a phishing attempt. The attacker is trying to make the link look legitimate while actually sending you to a malicious site.
2145
A social engineering attack that happens slowly over a long period is known as:
Answer:
All of the above
Not all social engineering attacks are quick. Some attackers will take weeks or months to slowly build a relationship and gain a target's trust before they make their move. These are often referred to as slow-burn or long-con attacks.
2146
Before connecting to a public Wi-Fi network, you should:
Answer:
All of the above.
It is important to verify that you are connecting to the legitimate Wi-Fi network and not a fake "honeypot" network set up by an attacker. Turning off file sharing and using a VPN are additional layers of protection.
2147
An email from an unknown sender contains a link with a shortened URL (e.g., bit.ly). What should you do?
Answer:
Assume the link is malicious and do not click it.
Given that the sender is unknown, the safest course of action is to assume the link is malicious and avoid clicking it altogether. While you can use a URL expander, the most secure approach is to not interact with unsolicited links from unknown sources.
2148
What is "formjacking"?
Answer:
A cyberattack where criminals insert malicious code into an online form to steal the information that users enter.
Formjacking is a threat to online shoppers, where attackers compromise the payment page of a website to skim credit card details and other personal information in real-time as the user types it in.
2149
Social engineering is best described as:
Answer:
The art of manipulating people into divulging confidential information.
Social engineering is a non-technical method of intrusion that relies on human interaction and psychological manipulation to trick people into breaking normal security procedures.
2150
You see a link in a social media post that has been shortened using a service like bit.ly. What is a good practice before clicking it?
Answer:
Use a URL expander service to preview the full destination URL.
URL shorteners hide the true destination of a link. Using a URL expander tool (many are available online) will show you the full URL before you click, allowing you to check if it looks suspicious.