250+ TOP MCQs on Password Cracking and Security Measures

Cyber Security Multiple Choice Questions on “Password Cracking and Security Measures”.

1. System hacking involves password hacking as one of the major hacking methodologies.
a) True
b) False

Answer: a
Clarification: System hacking, which is of four types involves password hacking as one of the major hacking methodologies. It is used to crack the security of a system and gain access for stealing data.

2. Password cracking in system hacking is of ________ types.
a) 2
b) 3
c) 4
d) 5

Answer: c
Clarification: System hacking involves password hacking as one of the major hacking methodologies. It is of 4 types. These are passive online attack, active online attack, offline attack, and non-electronic attack.

3. There are ________ major types of passwords.
a) 4
b) 5
c) 6
d) 7

Answer: d
Clarification: There are seven major types of passwords. These are a password containing only letters, a password containing only number, a password containing only special characters, a password containing only alpha-numeric characters, a password containing letters, numbers as well as special symbols or password containing any two combinations of the three.

4. In _______________ attacks an attacker do not contact with authorizing party for stealing password.
a) passive online
b) active online
c) offline
d) non-electronic

Answer: a
Clarification: In passive online attacks, the attacker do not contact with an authorized party to steal the password, rather the attacker attempts to grab password hacking without communicating with the victim or his/her victim account.

5. Which of the following is an example of passive online attack?
a) Phishing
b) Social Engineering
c) Spamming
d) Wire sniffing

Answer: d
Clarification: Attacker do not contact with an authorized party to steal the password in the passive online attack, rather the attacker attempts to grab password hacking without communicating with the victim or his/her victim account. Examples of passive online attacks include wire sniffing, Man in the middle attack and reply attack.

6. Which of the following is not an example of a passive online attack?
a) MiTM
b) Reply Attack
c) Phishing
d) Wire sniffing

Answer: c
Clarification: Phishing is not an example of a passive online attack. In passive online attacks, the attacker does not contact with an authorized party to steal the password. Types of passive online attacks include wire sniffing, Man in the middle attack and reply attack.

7. Which of the following do not comes under hurdles of passive online attack for hackers?
a) Hard to perpetrate
b) Computationally complex
c) Time taking, so patience has to be there
d) Tools not available

Answer: d
Clarification: Tools for doing a passive offline attack on passwords is widely available so it doesn’t come under disadvantage or hurdles of passive offline attack. But passive offline attacks are computationally complex, hard to perpetrate and may take time.

8. Which of the following case comes under victims’ list of an active online attack?
a) Strong password based accounts
b) Unsecured HTTP users
c) Open authentication points
d) Logged in systems and services

Answer: c
Clarification: Systems with bad or weak passwords & with open authentication points often becomes the victim of an active online attack where the attacker directly tries different passwords 1-by-1 against victim’s system/account.

9. In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1 against victim’s system/account.
a) passive online
b) active online
c) offline attack
d) non-electronic

Answer: b
Clarification: Users with open authentication points and bad or weak passwords often becomes the victim of an active online attack where the attacker directly tries different passwords 1-by-1 against victim’s system/account.

10. Which of them is not a disadvantage of active online attack?
a) Takes a long time
b) Easily and automatically detected
c) Need high network bandwidth
d) Need the patience to crack

Answer: b
Clarification: In an active online attack, the attacker directly tries different passwords 1-by-1 against victim’s system/account. It has some disadvantages as it takes a long time, hence a lot of patience & high network bandwidth also.

11. _________________ can be alternatively termed as password guessing attack.
a) passive online
b) active online
c) offline attack
d) non-electronic

Answer: b
Clarification: Users with open authentication points and bad or weak passwords often becomes the victim of the active online attack. It is alternatively termed as password guessing attack where the attacker directly tries different passwords 1-by-1 against victim’s system/account.

12. ________________ attacks are carried out from a location other than the real computer where the password reside or was used.
a) passive online
b) active online
c) offline password
d) non-electronic

Answer: c
Clarification: For this cyber-criminal needs to have physical access to the system and so offline password attacks are carried out from a location other than the real computer where the password reside or was used. They are common examples of physical data breaching & hacking.

13. _______________ attacks always need physical access to the system that is having password file or the hacker needs to crack the system by other means.
a) online
b) offline
c) password
d) non-electronic

Answer: b
Clarification: Offline password attacks are carried out from a location other than the real computer where the password resides or was used. They need physical access to the system that is having a password file or the hacker needs to crack the system by other means.

14. Which of the following is not an example of offline password attack?
a) Dictionary attack
b) Rainbow attacks
c) Brute force attack
d) Spamming attack

Answer: d
Clarification: The offline attack needs physical access to the system that is having a password file or the hacker needs to crack the system by other means. A dictionary attack, rainbow, and brute force come under offline attack.

15. Passwords need to be kept encrypted to protect from such offline attacks.
a) True
b) False

Answer: a
Clarification: Physical access is needed in offline attack to the system that is having a password file or the hacker needs to crack the system by other means. Hence, even if hackers gain physical access to the system, if the passwords are in the encrypted mode, it will be almost impossible to steal passwords.

250+ TOP MCQs on Attack Vectors – Adwares and Answers

Cyber Security Multiple Choice Questions on “Attack Vectors – Adwares”.

1. _____________ are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser.
a) Shareware
b) Adware
c) Bloatware
d) Ransomware

Answer: b
Clarification: Adwares are unwanted software intended to pitch advertisements upon the user’s screen, most often within a web browser. Sometimes, hackers embed malware along with it to compromise systems. So, security professionals treat it as modern-day PUP (potentially unwanted programs).

2. PUP is abbreviated as ____________
a) Potentially Useless Programs
b) Potentially Unwanted Protocols
c) Potentially Unwanted Programs
d) Partial Unwanted Programs

Answer: c
Clarification: Adwares are designed to pitch advertisements upon user’s screen, most often within a web browser. So, security professionals treat it as modern-day PUP (potentially unwanted programs).

3. Users might invite some bogus virus in his/her system by clicking the ____________
a) Shareware
b) Spyware
c) URL
d) Adware

Answer: d
Clarification: The unwanted software used to pitch ads on the user’s screen is the adware, displayed most often within a web browser. Users might invite some bogus virus in his/her system by clicking the adware.

4. Which among the following is not an abnormal symptom found once you click any malicious adware?
a) Automatic opening of new tabs in the browser
b) Automatic updates of antivirus
c) Changes in home page
d) Popping up of new Search engines on your browser

Answer: b
Clarification: Some abnormal symptom found once you click any malicious adware are the automatic opening of new tabs in the browser, changes in a home page, popping up of new Search engines on your browser etc.

5. Once _____________ hijacks your system, it might perform different sorts of unwanted tasks.
a) Server hacking
b) Banner grabbing
c) Cracking
d) Hijacking

Answer: d
Clarification: Once adware hijacks your system, it might perform different kinds of superfluous tasks. The adware’s functions may be intended to analyze a victim’s location & what different Internet sites he/she is visiting.

6. Creators of _____________ also sell your browsing behaviour & information to 3rd parties.
a) Shareware
b) Spyware
c) URL
d) Adware

Answer: d
Clarification: The adware’s functions may be intended to analyze a victim’s location & what different Internet sites he/she is visiting. Creators of adware also sell your browsing behaviour & information to 3rd parties.

7. Modern ____________ can even use it to target users with additional advertisements that are customized to the browsing habits.
a) smart shareware
b) smart adware
c) smart bloatware
d) smart spyware

Answer: b
Clarification: Creators of adware also sell your browsing behaviour & information to 3rd parties. Modern smart adware can even use it to target users with additional advertisements that are customized to browsing habits.

8. Creators of adware also sell your browsing behaviour & information to 3rd parties.
a) True
b) False

Answer: a
Clarification: The adware’s functions may be intended to analyze the victim’s location & what different Internet sites he/she is visiting. Creators of adware also sell your browsing behaviour & information to 3rd parties.

9. Which among the following is not a symptom of your system compromised with adware?
a) Website links redirect to sites unlike from what user is intended
b) Web browser acts slows to a crawl
c) System takes restarts frequently
d) The browser might crash frequently

Answer: c
Clarification: When adware hijacks your system, various kinds of unessential tasks keep on happening. Website links redirect to sites unlike from what user is intended, web browser acts slows to a crawl, the browser might crash frequently etc are some of the symptoms of adware infected system.

10. Malicious adware may sneak into your system by __________ different ways.
a) five
b) four
c) three
d) two

Answer: d
Clarification: Malicious adware may sneak into your system in 2 different ways. 1st, if you download and install a program that is freeware or shareware, it might install some other programs and ads –popping applications. 2nd, through insidious – websites containing adware.

11. Which of the following term is not a valid terminology and type of adware?
a) Mobile adware
b) Mac Adware
c) Smart-home adware
d) Windows adware

Answer: c
Clarification: Website links redirect to sites unlike from what the user is intended, web browser acts slows to a crawl, the browser might crash frequently etc are some of the symptoms of adware infected system. These are mobile/android adware, Mac and Windows adware etc.

12. Adware will not come to your system if you are using Chrome.
a) True
b) False

Answer: b
Clarification: As adware hijacks your system, various kinds of unessential tasks keep occurring. Adware may come and junk up your system through any browser, whether it is Firefox, Chrome, Opera or Edge.

250+ TOP MCQs on Ports and Its Types and Answers

Cyber Security Multiple Choice Questions on “Ports and Its Types”.

1. There are ______ major types of ports in computers.
a) 1
b) 2
c) 3
d) 4

Answer: b
Clarification: There are 2 major types of ports in computer systems. These are physical ports and logical ports.

2. PS2 and DVI are examples of Logical ports.
a) True
b) False

Answer: b
Clarification: PS2 and DVI are examples of physical ports. Physical ports can be touched and seen with our naked eyes.

3. Physical ports are usually referred to as ___________
a) jacks
b) cables
c) interfaces
d) hardware plugs

Answer: c
Clarification: Physical ports are connections that connect two systems for their interactions. LAN, PS2 and DVI are examples of physical ports.

4. ____________ are logical numbers assigned for logical connections.
a) Logical ports
b) Physical ports
c) Networking cables
d) IP address

Answer: a
Clarification: Logical ports are end-point to a logical connection. The numbers are pre-assigned by IANA (Internet Assigned Numbers Authority) which ranges from 0 – 65536.

5. Number of logical ports ranges from _____ to _____
a) 0, 255
b) 1, 65535
c) 1, 65536
d) 0, 65536

Answer: d
Clarification: The numbers are pre-assigned by IANA (Internet Assigned Numbers Authority) which ranges from 0 – 65536. All the used protocols are assigned with a unique port number.

6. Logical ports are also known as ________________
a) numbered ports
b) virtual numbering
c) virtual ports
d) network protocol ports

Answer: c
Clarification: Logical ports are also known as virtual ports which are part of TCP/IP networking. The numbers of ports are pre-assigned by IANA (Internet Assigned Numbers Authority) which ranges from 0 – 65536.

7. Virtual ports help software in sharing without interference all hardware resources.
a) True
b) False

Answer: a
Clarification: Virtual ports also known as logical ports helps different applications in sharing without the interference of all hardware resources. The network traffic is automatically managed by routers using these ports.

8. ________ needs some control for data flow on each and every logical port.
a) Antivirus
b) Network firewall
c) Intrusion Detection Systems (IDS)
d) Anti-malware

Answer: b
Clarification: For security reason, there is some additional control provided by the network firewall over data traffic going through each logical ports.

9. The logical port is associated with the type of protocol used along with the IP address of the host.
a) True
b) False

Answer: a
Clarification: During a communication, the logical port is ass associated with the type of protocol used along with the IP address of the host. The numbers logical ports are pre-assigned by IANA (Internet Assigned Numbers Authority) which ranges from 0 – 65536.

10. Which of the following is the port number for FTP data?
a) 20
b) 21
c) 22
d) 23

Answer: a
Clarification: Port number 20 is the logical port number for FTP data service. FTP protocol is a standard protocol used for transmitting and receiving files from client to server through a network.

11. Which of the following is the port number for FTP control?
a) 20
b) 21
c) 22
d) 23

Answer: b
Clarification: Port number 21 is the logical port number for FTP control service. FTP protocol is a standard protocol used for transmitting and receiving files from client to server through a network.

12. Which of the following is the port number for SSH (Secure Shell)?
a) 20
b) 21
c) 22
d) 23

Answer: c
Clarification: Port number 22 is the logical port number for Secure Shell service. SSH gives users (specifically system administrators), a way to securely access computers on unsecured network connectivity.

13. Which of the following is the port number for Telnet?
a) 20
b) 21
c) 22
d) 23

Answer: d
Clarification: Port number 23 is the logical port number for Telnet. Telnet is used for bi-directional communication over the internet in text-oriented format. It also gives virtual terminal connectivity.

250+ TOP MCQs on Bugs and Vulnerabilities and Answers

Cyber Security Multiple Choice Questions on “Bugs and Vulnerabilities”.

1. ___________ is a weakness that can be exploited by attackers.
a) System with Virus
b) System without firewall
c) System with vulnerabilities
d) System with a strong password

Answer: c
Clarification: In cyber-security, a system having vulnerabilities is defined as the weakness in a system that can be exploited by cyber-criminals and attackers for their own benefit. For this, they use special tools and techniques in order to crack into the system through the vulnerabilities.

2. _________ is the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system.
a) Attack vector
b) Attack surface
c) Attack point
d) Attack arena

Answer: b
Clarification: Attack surface can be defined as the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system. More the security, lesser is the attack surface.

3. ____________ is the cyclic practice for identifying & classifying and then solving the vulnerabilities in a system.
a) Bug protection
b) Bug bounty
c) Vulnerability measurement
d) Vulnerability management

Answer: d
Clarification: Vulnerability management is a cyclic process for identifying & classifying and then solving the vulnerabilities in a system. This term is generally used in software vulnerability detection and resolving process.

4. Risk and vulnerabilities are the same things.
a) True
b) False

Answer: b
Clarification: Risk and vulnerability cannot be used interchangeably. Risk can be defined as the potential of an impact that can grow from exploiting the vulnerability. There is some vulnerability that doesn’t possess risk, known as “Vulnerabilities without risk”.

5. _____________ is a special type of vulnerability that doesn’t possess risk.
a) Vulnerabilities without risk
b) Vulnerabilities without attacker
c) Vulnerabilities without action
d) Vulnerabilities no one knows

Answer: a
Clarification: Vulnerabilities is defined as the weakness in a system that can be exploited by cyber-criminals and attackers. Risk can be defined as the potential of an impact that can grow from exploiting the vulnerability. There is some vulnerability that doesn’t possess risk, known as “Vulnerabilities without risk”.

6. A/An __________ is a piece of software or a segment of command that usually take advantage of a bug to cause unintended actions and behaviors.
a) malware
b) trojan
c) worms
d) exploit

Answer: d
Clarification: An exploit is a piece of software or a segment of command that usually take advantage of a bug to cause unintended actions and behaviors. Using exploits, attackers can gain access in a system or allow privilege escalation also.

7. There are ________ types of exploit.
a) 3
b) 2
c) 5
d) 4

Answer: b
Clarification: Exploits can be categorized based on various criteria. But the most prominent categorization is done by how exploits communicate with vulnerable software. These are categorized as local exploits and remote exploits.

8. Remote exploits is that type of exploits acts over any network to exploit on security vulnerability.
a) True
b) False

Answer: a
Clarification: Remote exploits is that type of exploits which uses internet for exploiting on security vulnerability without gaining any prior access to the target system.

9. ________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit.
a) Local exploits
b) Remote exploits
c) System exploits
d) Network exploits

Answer: a
Clarification: Local exploits are those type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit. They’ve to pass through granted system administration in order to harm the system.

10. ___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.
a) Exploiting
b) Cracking
c) Hacking
d) Pivoting

Answer: d
Clarification: Pivoting is a technique used by penetration testers to compromise any system within a network for targeting other systems. They test systems within the same network for vulnerabilities using this technique.

11. A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system.
a) System error
b) Bugged system
c) Security bug
d) System virus

Answer: c
Clarification: A security bug is a software bug that attackers can take advantage to gain unauthorized access in a system. They can harm all legitimate users, compromise data confidentiality and integrity.

12. Security bugs are also known as _______
a) security defect
b) security problems
c) system defect
d) software error

Answer: a
Clarification: A security bug also known as security defect is a software bug that attackers can take advantage to gain unauthorized access in a system. They can harm legitimate users, compromise data confidentiality and integrity.

13. __________ is the timeframe from when the loophole in security was introduced till the time when the bug was fixed.
a) Time-frame of vulnerability
b) Window of vulnerability
c) Time-lap of vulnerability
d) Entry-door of vulnerability

Answer: b
Clarification: Window of vulnerability is the timeframe from when the loophole in security was introduced or released till the time when the bug was fixed, or the illicit access was removed or the attacker was disabled.

14. ISMS is abbreviated as __________
a) Information Server Management System
b) Information Security Management Software
c) Internet Server Management System
d) Information Security Management System

Answer: d
Clarification: ISMS (Information Security Management System) is a set of policies concerning various information security management. ISMS (Information Security Management System) was developed for managing risk management principles and countermeasures for ensuring security through rules and regulations.

15. A zero-day vulnerability is a type of vulnerability unknown to the creator or vendor of the system or software.
a) True
b) False

Answer: a
Clarification: Zero-day vulnerability is a type of vulnerability unknown to the creator or vendor of the system or software. Until such bugs get fixed, hackers take advantage of these vulnerabilities to exploit the system.

250+ TOP MCQs on Password Cracking and Security Measures

Cyber Security Questions and Answers for Campus interviews on “Password Cracking and Security Measures”.

1. Saving passwords in the browser is a good habit.
a) True
b) False

Answer: b
Clarification: Saving passwords in the browser for your different user accounts and web services is not a good habit. All browsers do not keep these passwords as an encrypted format. Chrome allows you to see those passwords if you know the system’s password which can lead to a security breach.

2. Which of the following is not an advantage of dictionary attack?
a) Very fast
b) Time-saving
c) Easy to perform
d) Very tough and inefficient

Answer: d
Clarification: A dictionary attack is a process of breaking a password protected system or server by simply & automatically entering every word in a dictionary as a password. It is very fast, time-saving and easy to perform.

3. A _______________ is a process of breaking a password protected system or server by simply & automatically entering every word in a dictionary as a password.
a) Dictionary attack
b) Phishing attack
c) Social engineering attack
d) MiTM attack

Answer: a
Clarification: A dictionary attack is a process of breaking a password protected system or server by simply & automatically entering every word in a dictionary as a password. It is very fast, time-saving and easy to perform.

4. Which of the following comes under the advantage of dictionary attack?
a) Time-consuming
b) Moderate efficient
c) Very fast
d) Complex to carry-out

Answer: c
Clarification: A dictionary attack is a process of breaking a password protected system or server by simply & automatically entering every word in a dictionary as a password. It is very fast, time-saving and easy to perform.

5. The hybrid attack is a combination of dictionary attack followed by inserting entropy & performs brute force.
a) True
b) False

Answer: a
Clarification: A hybrid attack is a combination of both brute force attack & dictionary attack. So, while a dictionary attack would comprise a wordlist of passwords, the brute force attack would be functional for each possible password in the given list.

6. Brute force attack is ______________
a) fast
b) inefficient
c) slow
d) complex to understand

Answer: c
Clarification: A brute force is the simplest process of gaining access to any password-protected system. It tries a variety of combinations of usernames & passwords again and again until it cracks it or password matches. But it is comparatively slow.

7. A _____________ attack one of the simplest processes of gaining access to any password-protected system.
a) Clickjacking
b) Brute force
c) Eavesdropping
d) Waterhole

Answer: b
Clarification: A brute force is the simplest process of gaining access to any password-protected system. It tries a variety of combinations of usernames & passwords again and again until it cracks it or password matches.

8. ____________ attack is a combination of Dictionary attack & brute force attack.
a) Syllable
b) Syllabi
c) Database
d) Phishing

Answer: a
Clarification: Syllable attack is a combination of Dictionary attack & brute force attack. This technique may be implemented when the password is a non-existing word and attacker tries some techniques to crack it.

9. Attackers can use the _______________ when he/she gets some information or hint regarding password he/she wants to crack.
a) Syllable attack
b) Rule-based attack
c) Offline attack
d) Hybrid attack

Answer: b
Clarification: Attackers can use the rule-based attack when he/she gets some information or hint regarding password he/she wants to crack. Examples of such scenarios are like: hacker knows about the type of password, or size or what type of data it might contain.

10. _______________ are based on dictionary attack techniques.
a) Hybrid attacks
b) Network attacks
c) TCP attacks
d) Database attacks

Answer: a
Clarification: Hybrid attacks are based on dictionary attack techniques. In such types of attacks, the dictionary attack is mixed with some numerals and special symbols.

11. _____________ are based on dictionary attack techniques where the dictionary attack is mixed with some numerals and special symbols.
a) Syllable attack
b) Rule-based attack
c) Offline attack
d) Hybrid attack

Answer: d
Clarification: Hybrid attack is a type of offline attack which is based on dictionary attack methods. In such types of attacks, the dictionary attack is mixed with some numerals and special symbols.

12. Which of the following is not an example of non-technical attack techniques?
a) Shoulder surfing
b) Keyboard sniffing
c) Phishing
d) Social engineering

Answer: c
Clarification: In the non-technical type of attacks, it is not required to have any technical knowledge to attack your target victim. Examples of such types of attacks are shoulder surfing, keyboard sniffing, and social engineering.

250+ TOP MCQs on Attack Vectors – Spywares and Answers

Cyber Security Multiple Choice Questions on “Attack Vectors – Spywares”.

1. ________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.
a) Shareware
b) Spyware
c) Ransomware
d) Freeware

Answer: b
Clarification: Spyware is preventable software that spy on user’s activities, stealing internet usage data & sensitive information of that user. Spyware is categorized as a sub-type of malware intended to spy & gain access to or damage the system data, without your acquaintance.

2. They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?
a) Shareware
b) Ransomware
c) Spyware
d) Freeware

Answer: c
Clarification: Here ‘they’ refer to spyware which is an unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.

3. Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
a) advertisers
b) dark-market
c) antivirus company
d) share market

Answer: a
Clarification: Spyware is unnecessary software which infiltrates user’s system, spy on the user’s activities, stealing internet usage data & sensitive information of that user. Spyware collects user’s personal data & spreads it to advertisers, data-firms, or its creator.

4. Which of the following activity is not done by spyware?
a) sell internet usage data
b) capture credit card details
c) user’s personal identity
d) steal signature of the different virus

Answer: d
Clarification: Spyware are harmful programs intended to spy & gain access to or damage the system data, without your acquaintance. It captures credit card details, user’s personal identity, sells internet usage data etc.

5. Which of the following activity is not done by spyware?
a) Monitors your internet activity
b) Track user’s login details and passwords
c) Uninstalls your mobile browser
d) Spy on sensitive information

Answer: c
Clarification: Spyware is harmful software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user. It monitors your internet activity, track login credentials and spy on user’s sensitive information.

6. Spyware is not a powerful & one of the most widespread threats on the internet.
a) True
b) False

Answer: b
Clarification: Spyware is one of the most powerful & widespread threats on the internet. Spyware is categorized as a sub-type of malware intended to spy & gain access to or damage the system data, without your acquaintance.

7. It actually infects your device easily & makes it hard to _____________
a) delete
b) identify
c) modify
d) copy

Answer: b
Clarification: The most powerful & widespread threats for users are the spyware. It actually infects your device easily & makes it hard to detect. Once detected, we need specific tools and antivirus programs to delete them.

8. There are __________ main types of spyware.
a) 2
b) 3
c) 4
d) 5

Answer: c
Clarification: Spyware actually infects your device easily & makes it hard to detect. There are 4 major types of spyware. These are adware, tracking cookies, spy-trojans & system monitoring spyware.

9. _____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies

Answer: d
Clarification: There are 4 major types of spyware. One of them is the tracking cookies which track the user’s online activities like search queries, history pages & downloads, for selling purposes.

10. _____________ tracks your data and displays those products as ads for promotions.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies

Answer: a
Clarification: Spyware are of four major types. One of them is adware. Adware or ad-based spyware tracks your data and displays those products as ads for promotions.

11. _________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies

Answer: c
Clarification: There are four major types of spyware. One of them is the spy-trojans which disguise them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.

12. ____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies

Answer: b
Clarification: One of the types of spyware is the system monitoring spyware which records all your key-strokes, chat-room dialogs, a program run in your system, and system details.

13. Which of the following do not lead you to invite spyware into your system?
a) Accepting fishy prompt or pop-ups
b) Downloading apps from an unreliable source
c) Opening unknown attachments
d) Installing antivirus patches

Answer: d
Clarification: Some of the largest possible ways your system can become contaminated with spyware is when you accept fishy prompts and pop-ups, download apps from unreliable sources or opening unknown attachments from mailing services.

14. As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents.
a) True
b) False

Answer: a
Clarification: As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents. In this manner, you can protect your system before the spyware takes away all your sensitive data.

15. Which of the following is not an anti-spyware tool?
a) MalwareBytes Anti-Malware tool
b) SpyBot Search and Destroy
c) Emsisoft Emergency Kit
d) MS Firewall Defender

Answer: d
Clarification: MS Firewall Defender is not used for detecting & removing spyware. MalwareBytes Anti-Malware tool, SpyBot Search and Destroy & Emsisoft Emergency Kit are some of the anti-spyware tools.

16. If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.
a) passwords
b) email ID
c) name
d) address

Answer: a
Clarification: If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your passwords, and delete browsing activities from a web browser.