250+ TOP MCQs on Attack Vectors – Spywares and Answers

Cyber Security Multiple Choice Questions on “Attack Vectors – Spywares”.

1. ________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.
a) Shareware
b) Spyware
c) Ransomware
d) Freeware

Answer: b
Clarification: Spyware is preventable software that spy on user’s activities, stealing internet usage data & sensitive information of that user. Spyware is categorized as a sub-type of malware intended to spy & gain access to or damage the system data, without your acquaintance.

2. They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?
a) Shareware
b) Ransomware
c) Spyware
d) Freeware

Answer: c
Clarification: Here ‘they’ refer to spyware which is an unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.

3. Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
a) advertisers
b) dark-market
c) antivirus company
d) share market

Answer: a
Clarification: Spyware is unnecessary software which infiltrates user’s system, spy on the user’s activities, stealing internet usage data & sensitive information of that user. Spyware collects user’s personal data & spreads it to advertisers, data-firms, or its creator.

4. Which of the following activity is not done by spyware?
a) sell internet usage data
b) capture credit card details
c) user’s personal identity
d) steal signature of the different virus

Answer: d
Clarification: Spyware are harmful programs intended to spy & gain access to or damage the system data, without your acquaintance. It captures credit card details, user’s personal identity, sells internet usage data etc.

5. Which of the following activity is not done by spyware?
a) Monitors your internet activity
b) Track user’s login details and passwords
c) Uninstalls your mobile browser
d) Spy on sensitive information

Answer: c
Clarification: Spyware is harmful software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user. It monitors your internet activity, track login credentials and spy on user’s sensitive information.

6. Spyware is not a powerful & one of the most widespread threats on the internet.
a) True
b) False

Answer: b
Clarification: Spyware is one of the most powerful & widespread threats on the internet. Spyware is categorized as a sub-type of malware intended to spy & gain access to or damage the system data, without your acquaintance.

7. It actually infects your device easily & makes it hard to _____________
a) delete
b) identify
c) modify
d) copy

Answer: b
Clarification: The most powerful & widespread threats for users are the spyware. It actually infects your device easily & makes it hard to detect. Once detected, we need specific tools and antivirus programs to delete them.

8. There are __________ main types of spyware.
a) 2
b) 3
c) 4
d) 5

Answer: c
Clarification: Spyware actually infects your device easily & makes it hard to detect. There are 4 major types of spyware. These are adware, tracking cookies, spy-trojans & system monitoring spyware.

9. _____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies

Answer: d
Clarification: There are 4 major types of spyware. One of them is the tracking cookies which track the user’s online activities like search queries, history pages & downloads, for selling purposes.

10. _____________ tracks your data and displays those products as ads for promotions.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies

Answer: a
Clarification: Spyware are of four major types. One of them is adware. Adware or ad-based spyware tracks your data and displays those products as ads for promotions.

11. _________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies

Answer: c
Clarification: There are four major types of spyware. One of them is the spy-trojans which disguise them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.

12. ____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies

Answer: b
Clarification: One of the types of spyware is the system monitoring spyware which records all your key-strokes, chat-room dialogs, a program run in your system, and system details.

13. Which of the following do not lead you to invite spyware into your system?
a) Accepting fishy prompt or pop-ups
b) Downloading apps from an unreliable source
c) Opening unknown attachments
d) Installing antivirus patches

Answer: d
Clarification: Some of the largest possible ways your system can become contaminated with spyware is when you accept fishy prompts and pop-ups, download apps from unreliable sources or opening unknown attachments from mailing services.

14. As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents.
a) True
b) False

Answer: a
Clarification: As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents. In this manner, you can protect your system before the spyware takes away all your sensitive data.

15. Which of the following is not an anti-spyware tool?
a) MalwareBytes Anti-Malware tool
b) SpyBot Search and Destroy
c) Emsisoft Emergency Kit
d) MS Firewall Defender

Answer: d
Clarification: MS Firewall Defender is not used for detecting & removing spyware. MalwareBytes Anti-Malware tool, SpyBot Search and Destroy & Emsisoft Emergency Kit are some of the anti-spyware tools.

16. If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.
a) passwords
b) email ID
c) name
d) address

Answer: a
Clarification: If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your passwords, and delete browsing activities from a web browser.

Leave a Reply

Your email address will not be published. Required fields are marked *