Cyber Security Questions and Answers – Attack Vectors – Social Networking Security

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Attack Vectors – Social Networking Security”.

1. Which of the following is the most viral section of the internet?
a) Chat Messenger
b) Social networking sites
c) Tutorial sites
d) Chat-rooms
View Answer

Answer: b
Explanation: Social networking sites are the most used sites and the most viral section of the internet. So users must keep their accounts secure and safe from getting into wrong hands.

2. ____________ type of sites are known as friend-of-a-friend site.
a) Chat Messenger
b) Social networking sites
c) Tutorial sites
d) Chat-rooms
View Answer

Answer: b
Explanation: Social networking sites are the most used site which acts to connect people for social interaction. So users must keep their accounts secure & safe from getting into wrong hands.

3. Which of the following is not an appropriate measure for securing social networking accounts?
a) Strong passwords
b) Link your account with a phone number
c) Never write your password anywhere
d) Always maintain a soft copy of all your passwords in your PC
View Answer

Answer: d
Explanation: ‘Always maintain a soft copy of all your passwords in your PC’ is not an appropriate measure for securing your online accounts because, if your system got accessed by anyone or anybody put spyware or screen-recording malware, then all your passwords will get revealed.
advertisement
advertisement

4. Which of them is a proper measure of securing social networking account?
a) Never keep your password with any relevant names
b) Keep written records of your passwords
c) Keep records of your password in audio format in your personal cell-phone
d) Passwords are kept smaller in size to remember
View Answer

Answer: a
Explanation: Never keep your password with any relevant names because there are different types of hackers who either use password guessing techniques or some of them are hard-working and they do social engineering and research on different data associated to the victim.

5. If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation.
a) True
b) False
View Answer

Answer: a
Explanation: Yes, there are script-kiddies or young-hackers who start their hacking career by cracking simple & weak passwords to enlighten their skills to others. These hackers may gain access to your social media accounts & can do some illicit or shameless act on behalf of your name to degrade your reputation.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. ________________ is a popular tool to block social-media websites to track your browsing activities.
a) Fader
b) Blur
c) Social-Media Blocker
d) Ad-blocker
View Answer

Answer: b
Explanation: Blur is a free browser extension and a popular tool used to block social-media websites to track your browsing activities & prevent users from these surfing pattern stealers.

7. Try to keep your passwords without meaning so that _____________ attack becomes almost impossible to perform successfully.
a) social engineering
b) phishing
c) password guessing
d) brute force
View Answer

Answer: c
Explanation: Try to keep your passwords without meaning so that password guessing attack becomes almost impossible to perform successfully. This will reduce the potential to do both passwords guessing as well as dictionary attacks.
advertisement

8. Keeping the password by the name of your pet is a good choice.
a) True
b) False
View Answer

Answer: b
Explanation: Keeping the password by the name of your pet is not at all a good choice. Because they do social engineering & research on different data associated with you as a victim and will perform password guessing techniques.

9. Increase your security for social media account by always ____________ as you step away from the system.
a) signing in
b) logging out
c) signing up
d) logging in
View Answer

Answer: b
Explanation: Increase your security for social media account by always logging out as you step away from the system. This will reduce both remote hacking as well as physical hacking.
advertisement

10. Clicking on enticing Ads can cause trouble.
a) True
b) False
View Answer

Answer: a
Explanation: Clicking on enticing Ads can cause trouble. Viruses & malware frequently find their mode of entering onto the victim computer through these annoying & enticing ads.

11. Strangers cannot cause much trouble if we connect to them over social media.
a) True
b) False
View Answer

Answer: b
Explanation: Strangers can cause huge trouble if we connect to them or chat with them without knowing exact details or whether the account is genuine or not. The stranger may send infected links which you might click and will redirect you to infected sites.

12. Part of the social media sites are the various games & 3rd party applications which helps ______________ to get access to your data.
a) ethical hackers
b) penetration testers
c) security auditors
d) cyber-criminals
View Answer

Answer: d
Explanation: Part of the social media sites are the various games & 3rd party applications which help cyber criminals to get access to your data. In this way, they can compromise your account or grab your valuable & confidential data.

13. Many social media sites and services provide _______________ for legitimate account verification.
a) Retina scanning
b) Fingerprint scanning
c) CAPTCHA
d) 2-step verification
View Answer

Answer: d
Explanation: With 2-Step Verification (which is also known as 2-factor authentication), users can add an extra layer of security to your account. After login, it asks for your existing phone number to send an OTP for layer-2 verification.

14. Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media.
a) True
b) False
View Answer

Answer: a
Explanation: Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media. There are different website caches and bots that gets automatically downloaded to your system when you open different social-media sites and they store your sensitive data related to your social media account.

15. Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security.
a) True
b) False
View Answer

Answer: a
Explanation: Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security. Every user must use those links to educate themselves and learn various features towards social-media security.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.