InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Physical _________ is important to check & test for possible physical breaches.(a) penetration test(b) security check(c) hacking(d) accessI have been asked this question in homework.The above asked question is from Social Engineering and Physical Hacking topic in section Cyber Security of Cyber Security |
|
Answer» Correct answer is (a) PENETRATION test |
|
| 2. |
Which of them is not an example of physical hacking?(a) Walk-in using piggybacking(b) Sneak-in(c) Break-in and steal(d) PhishingThis question was posed to me in my homework.Question is from Social Engineering and Physical Hacking topic in division Cyber Security of Cyber Security |
|
Answer» The correct answer is (d) Phishing |
|
| 3. |
IT security department must periodically check for security logs and entries made during office hours.(a) True(b) FalseI have been asked this question in a job interview.I'd like to ask this question from Social Engineering and Physical Hacking in section Cyber Security of Cyber Security |
|
Answer» The correct answer is (a) True |
|
| 4. |
Which of the following is not a physical security measure to protect against physical hacking?(a) Add front desk & restrict unknown access to the back room(b) Create a phishing policy(c) Analyze how employees maintain their physical data and data storage peripheral devices(d) Updating the patches in the software you’re working at your office laptop.I had been asked this question in final exam.The above asked question is from Social Engineering and Physical Hacking in section Cyber Security of Cyber Security |
|
Answer» The correct CHOICE is (d) Updating the patches in the software you’re working at your office laptop. |
|
| 5. |
Which of the following is not considering the adequate measure for physical security?(a) Lock the drawers(b) Keep strong passwords for corporate laptops and mobile phones(c) Keep confidential organization’s document file open in the desk(d) Hide your hand against camera while inserting the PIN codeI had been asked this question during an interview for a job.This intriguing question comes from Social Engineering and Physical Hacking in division Cyber Security of Cyber Security |
|
Answer» Correct option is (C) Keep CONFIDENTIAL organization’s document file open in the DESK |
|
| 6. |
Stealing pen drives and DVDs after tailgating is an example of lack of _______ security.(a) network security(b) physical security(c) database security(d) wireless securityThe question was posed to me during an online exam.Asked question is from Social Engineering and Physical Hacking in section Cyber Security of Cyber Security |
|
Answer» RIGHT option is (b) physical security The explanation is: When cyber-criminal gain access to an authorized area and steal PEN drives and DVDs which CONTAIN sensitive information about an employee or about the organization, then it can be SAID that the physical security of the organization is WEAK. |
|
| 7. |
________ is the ability of an individual to gain physical access to an authorized area.(a) Network accessing(b) Database accessing(c) Remote accessing(d) Physical accessingThis question was posed to me in an internship interview.This question is from Social Engineering and Physical Hacking topic in chapter Cyber Security of Cyber Security |
|
Answer» Right OPTION is (d) Physical accessing |
|
| 8. |
Physical hacking is not at all possible in hospitals, banks, private firms, and non-profit organizations.(a) True(b) FalseI got this question during an online exam.This intriguing question originated from Social Engineering and Physical Hacking topic in division Cyber Security of Cyber Security |
|
Answer» The CORRECT answer is (b) FALSE |
|
| 9. |
Tailgating is also termed as ___________(a) Piggybacking(b) Pretexting(c) Phishing(d) BaitingThe question was posed to me in an interview for internship.This intriguing question comes from Social Engineering and Physical Hacking topic in chapter Cyber Security of Cyber Security |
|
Answer» Right choice is (a) Piggybacking |
|
| 10. |
In a phishing, attackers target the ________ technology to so social engineering.(a) Emails(b) WI-FI network(c) Operating systems(d) Surveillance cameraI got this question in final exam.My query is from Social Engineering and Physical Hacking topic in section Cyber Security of Cyber Security |
|
Answer» Right option is (a) Emails |
|
| 11. |
Which of the following is not an example of social engineering?(a) Dumpster diving(b) Shoulder surfing(c) Carding(d) Spear phishingThis question was addressed to me in final exam.Enquiry is from Social Engineering and Physical Hacking topic in chapter Cyber Security of Cyber Security |
|
Answer» Right choice is (C) Carding |
|
| 12. |
Which of the following is the technique used to look for information in trash or around dustbin container?(a) Pretexting(b) Baiting(c) Quid Pro Quo(d) Dumpster divingThe question was posed to me in unit test.This is a very interesting question from Social Engineering and Physical Hacking in chapter Cyber Security of Cyber Security |
|
Answer» The correct answer is (d) Dumpster diving |
|
| 13. |
_________ involves scams where an individual (usually an attacker) lie to a person (the target victim) to acquire privilege data.(a) Phishing(b) Pretexting(c) Spamming(d) VishingThis question was addressed to me in class test.This is a very interesting question from Social Engineering and Physical Hacking topic in section Cyber Security of Cyber Security |
|
Answer» Right option is (b) Pretexting |
|
| 14. |
Which of the following do not comes under Social Engineering?(a) Tailgating(b) Phishing(c) Pretexting(d) SpammingThis question was addressed to me in an internship interview.This intriguing question originated from Social Engineering and Physical Hacking in division Cyber Security of Cyber Security |
|
Answer» Correct OPTION is (d) Spamming |
|
| 15. |
___________ is a special form of attack using which hackers’ exploit – human psychology.(a) Cross Site Scripting(b) Insecure network(c) Social Engineering(d) Reverse EngineeringThis question was addressed to me in unit test.The origin of the question is Social Engineering and Physical Hacking topic in portion Cyber Security of Cyber Security |
|
Answer» Right option is (c) Social Engineering |
|