MCQ Mojo
access_time
menu
Quiz
Web Stories
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
Quiz
Quiz
/
Social Engineering Gate & PSU MCQ Questions With Answers
1.
Phishing takes place using.... (Select 2 answers)
Website
E-mail
Piggybacking
Both A & B
2.
Training and education of end users can be used to prevent ...
Phishing
Tailgating
Session hijacking
Both A & B
3.
Social engineering can use all the following except ....
Mobile phone
Instant message
Viruses
Trojan horse
4.
Phishing can be mitigated through the use of ...
Spam filtering
Education
Antivirus
Both A & B
5.
Social engineering can be thwarted using what kinds of controls?
Technical
Administrative
Physical
All of above
6.
Social engineering is designed to ...
Manipulate human behavior
Make people distrustful
Negotiate to say yes
Gain a physical advantage
7.
"Hi! This is Sulaiman, CFO Secretary. I'm working on an urgent project and lost my system password. Can you help me out? ” Which one is correct of this human-based Social Engineering?
Posing as an important user
Posing as a legitimate end user
Posing as technical support
Third Party Authorization
8.
______ are emails that issue warnings to the user on new viruses, Trojan or Worms that may harm the user's system
Chain letters
Hoax letters
Spam emails
Pop-up windows
9.
Read the Question on the image
Phising
Spam
Vishing
Piggybacking
Report Question
Previous
Next
warning
Submit
access_time
Time
Report Question
A bunch of text
Support mcqmojo.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page