Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Physical _________ is important to check & test for possible physical breaches.(a) penetration test(b) security check(c) hacking(d) accessI have been asked this question in homework.The above asked question is from Social Engineering and Physical Hacking topic in section Cyber Security of Cyber Security

Answer»

Correct answer is (a) PENETRATION test

For explanation: Physical penetration test is important in ORDER to check for the POSSIBLE physical security BREACHES. Usually corporate firms and organizations stay busy in securing the networks and data and penetration testers are hired for data and network pentesting, but physical security BREACH can also equally hamper.

2.

Which of them is not an example of physical hacking?(a) Walk-in using piggybacking(b) Sneak-in(c) Break-in and steal(d) PhishingThis question was posed to me in my homework.Question is from Social Engineering and Physical Hacking topic in division Cyber Security of Cyber Security

Answer»

The correct answer is (d) Phishing

To explain I WOULD say: Phishing does not come under PHYSICAL security. Walk-in WITHOUT proper AUTHORIZATION, sneaking in through glass windows or other means and breaking in and stealing sensitive documents are examples of physical hacking.

3.

IT security department must periodically check for security logs and entries made during office hours.(a) True(b) FalseI have been asked this question in a job interview.I'd like to ask this question from Social Engineering and Physical Hacking in section Cyber Security of Cyber Security

Answer»

The correct answer is (a) True

Best explanation: Checking for security logs and entries MADE by employees and other outsiders who entered the office can HELP in IDENTIFYING whether any suspicious PERSON is getting in and out of the building or not.

4.

Which of the following is not a physical security measure to protect against physical hacking?(a) Add front desk & restrict unknown access to the back room(b) Create a phishing policy(c) Analyze how employees maintain their physical data and data storage peripheral devices(d) Updating the patches in the software you’re working at your office laptop.I had been asked this question in final exam.The above asked question is from Social Engineering and Physical Hacking in section Cyber Security of Cyber Security

Answer»

The correct CHOICE is (d) Updating the patches in the software you’re working at your office laptop.

Explanation: Updating the patches in your working software does not COME under security measures for physical hacking. Updating the patches will help your software GET free from bugs and flaws in an application as they get a FIX when patches are UPDATED.

5.

Which of the following is not considering the adequate measure for physical security?(a) Lock the drawers(b) Keep strong passwords for corporate laptops and mobile phones(c) Keep confidential organization’s document file open in the desk(d) Hide your hand against camera while inserting the PIN codeI had been asked this question during an interview for a job.This intriguing question comes from Social Engineering and Physical Hacking in division Cyber Security of Cyber Security

Answer»

Correct option is (C) Keep CONFIDENTIAL organization’s document file open in the DESK

For explanation: Keeping confidential files left open in the desk is not an adequate way of maintaining PHYSICAL security; as ANYONE can pick these up and perform physical hacking.

6.

Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.(a) network security(b) physical security(c) database security(d) wireless securityThe question was posed to me during an online exam.Asked question is from Social Engineering and Physical Hacking in section Cyber Security of Cyber Security

Answer» RIGHT option is (b) physical security

The explanation is: When cyber-criminal gain access to an authorized area and steal PEN drives and DVDs which CONTAIN sensitive information about an employee or about the organization, then it can be SAID that the physical security of the organization is WEAK.
7.

________ is the ability of an individual to gain physical access to an authorized area.(a) Network accessing(b) Database accessing(c) Remote accessing(d) Physical accessingThis question was posed to me in an internship interview.This question is from Social Engineering and Physical Hacking topic in chapter Cyber Security of Cyber Security

Answer»

Right OPTION is (d) Physical accessing

The explanation is: Physical accessing without prior security checking is the ability of a person to gain ACCESS to any authorized area. Physical accessing is done USING PIGGYBACKING or any other suspicious means.

8.

Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations.(a) True(b) FalseI got this question during an online exam.This intriguing question originated from Social Engineering and Physical Hacking topic in division Cyber Security of Cyber Security

Answer»

The CORRECT answer is (b) FALSE

Explanation: PHYSICAL hacking, LIKE other types of hacking, is possible in any institutions, organizations, clinics, private firms, banks or any other financial institutions. Hence, the above statement is false.

9.

Tailgating is also termed as ___________(a) Piggybacking(b) Pretexting(c) Phishing(d) BaitingThe question was posed to me in an interview for internship.This intriguing question comes from Social Engineering and Physical Hacking topic in chapter Cyber Security of Cyber Security

Answer»

Right choice is (a) Piggybacking

The BEST I can explain: Piggybacking is the technique used for SOCIAL engineering, as the ATTACKER or unauthorized person/individual follows behind an authorized person/employee & gets into an authorized AREA to observe the system, gain confidential data or for a fraudulent PURPOSE.

10.

In a phishing, attackers target the ________ technology to so social engineering.(a) Emails(b) WI-FI network(c) Operating systems(d) Surveillance cameraI got this question in final exam.My query is from Social Engineering and Physical Hacking topic in section Cyber Security of Cyber Security

Answer»

Right option is (a) Emails

The BEST I can explain: In a phishing ATTACK, the attacker fraudulently attempts to obtain sensitive data (such as username & PASSWORDS) of the target user and use emails to send fake LINKS which redirect them to a fake WEBPAGE which looks legitimate.

11.

Which of the following is not an example of social engineering?(a) Dumpster diving(b) Shoulder surfing(c) Carding(d) Spear phishingThis question was addressed to me in final exam.Enquiry is from Social Engineering and Physical Hacking topic in chapter Cyber Security of Cyber Security

Answer»

Right choice is (C) Carding

The best I can explain: Carding is the method of trafficking of bank details, credit cards or other financial information over the INTERNET. HENCE it’s a fraudulent technique used by hackers and does not COMES under SOCIAL engineering.

12.

Which of the following is the technique used to look for information in trash or around dustbin container?(a) Pretexting(b) Baiting(c) Quid Pro Quo(d) Dumpster divingThe question was posed to me in unit test.This is a very interesting question from Social Engineering and Physical Hacking in chapter Cyber Security of Cyber Security

Answer»

The correct answer is (d) Dumpster diving

The BEST I can explain: In the technology world, where information about a person seems EVERYWHERE; dumpster diving is the name of the technique where the attacker looks for information in dustbins and TRASHES. For example, after withdrawing money from ATM, the user usually throw the receipt in which the total amount and account DETAILS are mentioned. These type of information becomes helpful to a hacker, for which they use dumpster diving.

13.

_________ involves scams where an individual (usually an attacker) lie to a person (the target victim) to acquire privilege data.(a) Phishing(b) Pretexting(c) Spamming(d) VishingThis question was addressed to me in class test.This is a very interesting question from Social Engineering and Physical Hacking topic in section Cyber Security of Cyber Security

Answer»

Right option is (b) Pretexting

Easiest explanation: In the pretexting TECHNIQUE of social engineering, the ATTACKER pretends in need of legitimate information from the victim for CONFIRMING his/her identity.

14.

Which of the following do not comes under Social Engineering?(a) Tailgating(b) Phishing(c) Pretexting(d) SpammingThis question was addressed to me in an internship interview.This intriguing question originated from Social Engineering and Physical Hacking in division Cyber Security of Cyber Security

Answer»

Correct OPTION is (d) Spamming

Explanation: Spamming is the ATTACK TECHNIQUE where the same message is sent indiscriminately repeatedly in order to overload the INBOX or harm the USER.

15.

___________ is a special form of attack using which hackers’ exploit – human psychology.(a) Cross Site Scripting(b) Insecure network(c) Social Engineering(d) Reverse EngineeringThis question was addressed to me in unit test.The origin of the question is Social Engineering and Physical Hacking topic in portion Cyber Security of Cyber Security

Answer»

Right option is (c) Social Engineering

To explain I would say: Using social engineering techniques, HACKERS try to EXPLOIT the victim’s mind to gain VALUABLE information about that person such as his/her PHONE number, date of birth, pet NAME etc.