Cyber Security Multiple Choice Questions on “Attack Vectors – Spywares”.
1. ________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.
a) Shareware
b) Spyware
c) Ransomware
d) Freeware
Answer: b
Clarification: Spyware is preventable software that spy on user’s activities, stealing internet usage data & sensitive information of that user. Spyware is categorized as a sub-type of malware intended to spy & gain access to or damage the system data, without your acquaintance.
2. They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?
a) Shareware
b) Ransomware
c) Spyware
d) Freeware
Answer: c
Clarification: Here ‘they’ refer to spyware which is an unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.
3. Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
a) advertisers
b) dark-market
c) antivirus company
d) share market
Answer: a
Clarification: Spyware is unnecessary software which infiltrates user’s system, spy on the user’s activities, stealing internet usage data & sensitive information of that user. Spyware collects user’s personal data & spreads it to advertisers, data-firms, or its creator.
4. Which of the following activity is not done by spyware?
a) sell internet usage data
b) capture credit card details
c) user’s personal identity
d) steal signature of the different virus
Answer: d
Clarification: Spyware are harmful programs intended to spy & gain access to or damage the system data, without your acquaintance. It captures credit card details, user’s personal identity, sells internet usage data etc.
5. Which of the following activity is not done by spyware?
a) Monitors your internet activity
b) Track user’s login details and passwords
c) Uninstalls your mobile browser
d) Spy on sensitive information
Answer: c
Clarification: Spyware is harmful software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user. It monitors your internet activity, track login credentials and spy on user’s sensitive information.
6. Spyware is not a powerful & one of the most widespread threats on the internet.
a) True
b) False
Answer: b
Clarification: Spyware is one of the most powerful & widespread threats on the internet. Spyware is categorized as a sub-type of malware intended to spy & gain access to or damage the system data, without your acquaintance.
7. It actually infects your device easily & makes it hard to _____________
a) delete
b) identify
c) modify
d) copy
Answer: b
Clarification: The most powerful & widespread threats for users are the spyware. It actually infects your device easily & makes it hard to detect. Once detected, we need specific tools and antivirus programs to delete them.
8. There are __________ main types of spyware.
a) 2
b) 3
c) 4
d) 5
Answer: c
Clarification: Spyware actually infects your device easily & makes it hard to detect. There are 4 major types of spyware. These are adware, tracking cookies, spy-trojans & system monitoring spyware.
9. _____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
Answer: d
Clarification: There are 4 major types of spyware. One of them is the tracking cookies which track the user’s online activities like search queries, history pages & downloads, for selling purposes.
10. _____________ tracks your data and displays those products as ads for promotions.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
Answer: a
Clarification: Spyware are of four major types. One of them is adware. Adware or ad-based spyware tracks your data and displays those products as ads for promotions.
11. _________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
Answer: c
Clarification: There are four major types of spyware. One of them is the spy-trojans which disguise them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.
12. ____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
Answer: b
Clarification: One of the types of spyware is the system monitoring spyware which records all your key-strokes, chat-room dialogs, a program run in your system, and system details.
13. Which of the following do not lead you to invite spyware into your system?
a) Accepting fishy prompt or pop-ups
b) Downloading apps from an unreliable source
c) Opening unknown attachments
d) Installing antivirus patches
Answer: d
Clarification: Some of the largest possible ways your system can become contaminated with spyware is when you accept fishy prompts and pop-ups, download apps from unreliable sources or opening unknown attachments from mailing services.
14. As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents.
a) True
b) False
Answer: a
Clarification: As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents. In this manner, you can protect your system before the spyware takes away all your sensitive data.
15. Which of the following is not an anti-spyware tool?
a) MalwareBytes Anti-Malware tool
b) SpyBot Search and Destroy
c) Emsisoft Emergency Kit
d) MS Firewall Defender
Answer: d
Clarification: MS Firewall Defender is not used for detecting & removing spyware. MalwareBytes Anti-Malware tool, SpyBot Search and Destroy & Emsisoft Emergency Kit are some of the anti-spyware tools.
16. If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.
a) passwords
b) email ID
c) name
d) address
Answer: a
Clarification: If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your passwords, and delete browsing activities from a web browser.