Que.Try to keep your passwords without meaning so that _____________ attack becomes almost impossible to perform successfully.
|
a. social engineering |
b. phishing |
c. password guessing |
d. brute force |
Que.Keeping the password by the name of your pet is a good choice.
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.Increase your security for social media account by always ____________ as you step away from the system.
|
a. signing in |
b. logging out |
c. signing up |
d. logging in |
Que.Clicking on enticing Ads can cause trouble.
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.Strangers cannot cause much trouble if we connect to them over social media.
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.Part of the social media sites are the various games & 3rd party applications which helps ______________ to get access to your data.
|
a. ethical hackers |
b. penetration testers |
c. security auditors |
d. cyber-criminals |
Que.Many social media sites and services provide _______________ for legitimate account verification.
|
a. Retina scanning |
b. Fingerprint scanning |
c. CAPTCHA |
d. 2-step verification |
Que.Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media.
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security.
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.______________ is populating the inbox of any target victim with unsolicited or junk emails.
|
a. Phishing |
b. Spamming |
c. Hooking |
d. DoS |
Que._________________ technique is also used in product advertisement.
|
a. Phishing |
b. Cookies |
c. e-Banners |
d. Spamming |
Que.Which of the following is not a technique used by spanners?
|
a. Spoofing the domain |
b. Sending attached virus in spams |
c. Junk tags associated with spam-emails |
d. Making important deals through such emails |
Making important deals through such emails
Que.___________ are used which crawl web pages looking for email Ids and copies them to the database.
|
a. Caches |
b. Cookies |
c. Bots |
d. Spiders |
Que.Which of the following is not a proper way of how spammers get the email Ids?
|
a. When a user registers to online services, blogs, and sites |
b. Databases formed by spiders fetching email Ids from different sources |
c. From offline form fill-up documents |
d. Online ad-tracking tools |
From offline form fill-up documents
Que.There are ___________ major ways of spamming.
|
a. 4 |
b. 2 |
c. 3 |
d. 5 |
Que.There are _______ types of spamming.
|
a. 3 |
b. 4 |
c. 5 |
d. 6 |
Que.Which of the following is not a type of spamming attack?
|
a. Page-jacking |
b. Image spamming |
c. Spear phishing |
d. Blog & wiki spamming |
Que.Which of the following is not a bulk emailing tool ?
|
a. Fairlogic Worldcast |
b. 123 Hidden sender |
c. YL Mail Man |
d. NetCut |