250+ TOP MCQs on Information Gathering Phase & Techniques

Cyber Security online quiz on “Information Gathering Phase & Techniques”.

1. ____________ is the term used for gathering information about your competitors from online resources, researches, and newsgroups.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering

Answer: a
Clarification: Competitive Intelligence gathering is the term used for gathering information about your competitors from online resources, researches, and newsgroups. The competitive intelligence gathering is non-interfering & subtle in nature.

2. The ______________ intelligence gathering is non-interfering & subtle in nature.
a) cognitive
b) competitive
c) cyber
d) concrete

Answer: b
Clarification: Competitive Intelligence gathering is the term used for gathering information about your competitors from online resources, researches, and newsgroups. The competitive intelligence gathering is non-interfering & subtle in nature.

3. In the world of data, where data is considered the oil and fuel of modern technology _____________ is both a product and a process.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering

Answer: a
Clarification: In the world of data, where data is considered the oil and fuel of modern technology, Competitive Intelligence gathering is both a product and a process.

4. Which of them is not a proper step in competitive intelligence data processing?
a) Data gathering
b) Data analysis
c) Information security
d) Network analysis

Answer: d
Clarification: In the world of data, where data is considered the oil and fuel of modern technology, Competitive Intelligence gathering is both a product and a process which comprises of some predefined steps to handle data. These are data gathering, analysis, verification, and security.

5. Which one of the following is a proper step in competitive intelligence data processing?
a) Competitors’ data compromising
b) Data hacking
c) Data analysis
d) Competitors’ data stealing

Answer: c
Clarification: In the world of data, where data is considered the oil and fuel of modern technology, Competitive Intelligence gathering is both a product and a process which comprises of some specific steps to handle data. These are data gathering, analysis, verification, and security.

6. There are __________ types of cognitive hacking and information gathering which is based on the source type, from where data is fetched.
a) 6
b) 5
c) 4
d) 3

Answer: d
Clarification: There are two types of cognitive hacking and information gathering which are based on the source type, from where data is fetched. These are single source & multiple sources.

7. ______________ is important to grab a quick understanding and analyzing about your competitors or target user’s need.
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering

Answer: a
Clarification: In the world of data, where data is considered the oil and fuel of modern technology, Competitive Intelligence gathering is both a product and a process. Hackers are hired with skills for gathering competitive knowledge so that data analysts can analyze those for further understanding of products.

8. Which of them is not a reason for competitive information gathering?
a) Compare your product with competitors
b) Analyze the market position of yours with competitors
c) Fetching confidential plans about your competitors
d) Pull out a list of your competitive firms in the market

Answer: c
Clarification: Fetching confidential plans about your competitors’ is not the work of ethical hackers hired for competitive information gathering. Also fetching such type of confidential information is a crime.

9. Competitive information gathering if done in the form of active attack using malware or by other illicit means can put your hired hacker or your company at stake.
a) True
b) False

Answer: a
Clarification: By the name of competitive information gathering if done in the form of active attack using malware or by other illicit means can put your hired hacker or your company at stake. It’s a cyber-crime also.

10. Predict and analyze the tactics of competitors from data taken out from online data sources is a crime.
a) True
b) False

Answer: b
Clarification: Predict and analyze the tactics of competitors from data taken out from online data sources is a crime. In the world of data, where data is considered the oil and fuel of modern technology. It can be done using competitive intelligence gathering techniques.

11. https://www.bidigital.com/ci/ is a website which is used for _________________
a) Competitive Intelligence gathering
b) Cognitive Intelligence gathering
c) Cyber Intelligence gathering
d) Competitors Info gathering

Answer: a
Clarification: In the world of data, where data is considered the oil and fuel of modern technology, Competitive Intelligence gathering is both a product and a process. https://www.bidigital.com/ci/ is a website which is used for such purpose.

12. Which of the following is a site used for Competitive Intelligence gathering?
a) https://www.bidigital.gov/
b) https://www.cig.com/ci/
c) https://www.coginfo.com/ci/
d) https://www.bidigital.com/ci/

Answer: d
Clarification: In the world of data, where data is considered the oil and fuel of modern technology, Competitive Intelligence gathering is both a product and a process. https://www.bidigital.com/ci/ is a website which is used for such purpose.

13. Which of the following is not an example of a firm that provides info regarding competitive intelligence gathering?
a) Carratu International
b) CI Center
c) Microsoft CI
d) Marven Consulting Group

Answer: c
Clarification: Carratu International, CI Center, Marven Consulting Group, Lubrinco Pvt Ltd. are some of the names of firms and companies that provide info regarding competitive intelligence gathering.

14. Using _____________ for doing competitive information gathering is a crime.
a) Spyware
b) Antivirus
c) Anti-malware
d) Adware

Answer: a
Clarification: By the name of competitive information gathering if done in the form of active attack using malware or by other illicit means can put your hired hacker or your company at stake. It’s a cyber-crime.

15. Competitive Intelligence gathering is both a ___________ and a ____________
a) process, product
b) process, item
c) product & data to sell to 3rd party
d) data to sell to a 3rd party and a product

Answer: a
Clarification: In the world of data, where data is considered the oil and fuel of modern technology, Competitive Intelligence gathering is both a product and a process which comprises of some predefined steps to handle data.

Leave a Reply

Your email address will not be published. Required fields are marked *