Home Programming Kids Programming Hardware & Software Hardware & Networking APP security Software Education Kids Study MCQS Download OTHERS Login

Cyber Security Multiple Choice Question MCQ

Categories: MCQS

1. Which of the following is not an appropriate way of targeting a mobile phone for hacking?

a) Target mobile hardware vulnerabilities

b) Target apps’ vulnerabilities

c) Setup Keyloggers and spyware in smart-phones

d) Snatch the phone

Answer: d


2. Which of the following is not an OS for mobile?

a) Palm

b) Windows

c) Mango

d) Android

Answer: c


3. Mobile Phone OS contains open APIs that may be _________ attack.

a) useful for

b) vulnerable to

c) easy to

d) meant for

Answer: b


4. ______ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.

a) Worms

b) Antivirus

c) Malware

d) Multimedia files

Answer: c


5. ________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs.

a) OS Security

b) Database security

c) Cloud security

d) Mobile security

Answer: d


6. Mobile security is also known as _________

a) OS Security

b) Wireless security

c) Cloud security

d) Database security

Answer: b


7. DDoS in mobile systems wait for the owner of the _______ to trigger the attack.

a) worms

b) virus

c) botnets

d) programs

Answer: c


8. Hackers cannot do which of the following after compromising your phone?

a) Steal your information

b) Rob your e-money

c) Shoulder surfing

d) Spying

Answer: c


9. Hackers cannot do which of the following after compromising your phone?

a) Shoulder surfing

b) Accessing your voice mail

c) Steal your information

d) Use your app credentials

Answer: a


10. App permissions can cause trouble as some apps may secretly access your memory card or contact data.

a) True

b) False

Answer: a


11. Activate _______ when you’re required it to use, otherwise turn it off for security purpose.

a) Flash Light

b) App updates

c) Bluetooth

d) Rotation

Answer: c


12. Try not to keep __________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.

a) Biometric

b) PIN-based

c) Alphanumeric

d) Short

Answer: a


13. Which of the following tool is used for Blackjacking?

a) BBAttacker

b) BBProxy

c) Blackburried

d) BBJacking

Answer: b


14. BBProxy tool is used in which mobile OS?

a) Android

b) Symbian

c) Raspberry

d) Blackberry

Answer: d


15. Which of the following is not a security issue for PDAs?

a) Password theft

b) Data theft

c) Reverse engineering

d) Wireless vulnerability

Answer: c


Cyber Security Multiple Choice Question MCQ