Cyber Security Types: Different types of Cyber Security

This is a computer science engineering quiz on cyber security, which includes questions on different types of cyber security.

images.jpg
Start Quiz

There are _______ major ways of stealing email information.

2 3 4 5

Which of them is not a major way of stealing email information?

Stealing cookies Reverse Engineering Password Phishing Social Engineering

____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.

Email security Email hacking Email protection Email safeguarding

Which of them is not a proper method for email security?

Use Strong password Use email Encryption Spam filters and malware scanners Click on unknown links to explore

If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.

True False

Which of the following is a non-technical type of intrusion or attack technique?

Reverse Engineering Malware Analysis Social Engineering Malware Writing

Which of them is an example of grabbing email information?

Cookie stealing Reverse engineering Port scanning Banner grabbing

_____________ is the technique used for tricking users to disclose their username and passwords through fake pages.

Social Engineering Phishing Cookie Stealing Banner Grabbing

Unsolicited Bulk E-mails (UBI) are called __________

SMS MMS Spam emails Malicious emails

Fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information.

True False

_____________ is a famous technological medium for the spread of malware, facing problems of spam, and phishing attacks.

Cloud

Pen drive

Website

Email

The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans.

Attackers, malware

Hackers, antivirus

Penetration testers, malware

Penetration testers, virus

If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.

Memory

Quarantine

Cookies

Hard drive

Using email hacking illicit hackers can send and spread ___________ virus _____________ and spam emails.

Trojans, redirected malicious URLs

Antivirus, patches

Cracked software, redirected malicious URLs

Malware, security patches

Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as _____________ details _________ and passwords.

Credit card, antivirus name

Credit card, login ID

Cell phone, antivirus name

Car model, account ID

Quiz/Test Summary
Title: Cyber Security Types: Different types of Cyber Security
Questions: 15
Contributed by:
james