Cyber Security Questions and Answers – Attack Vectors – Spywares

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Attack Vectors – Spywares”.

1. ________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.
a) Shareware
b) Spyware
c) Ransomware
d) Freeware
View Answer

Answer: b
Explanation: Spyware is preventable software that spy on user’s activities, stealing internet usage data & sensitive information of that user. Spyware is categorized as a sub-type of malware intended to spy & gain access to or damage the system data, without your acquaintance.

2. They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?
a) Shareware
b) Ransomware
c) Spyware
d) Freeware
View Answer

Answer: c
Explanation: Here ‘they’ refer to spyware which is an unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.

3. Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
a) advertisers
b) dark-market
c) antivirus company
d) share market
View Answer

Answer: a
Explanation: Spyware is unnecessary software which infiltrates user’s system, spy on the user’s activities, stealing internet usage data & sensitive information of that user. Spyware collects user’s personal data & spreads it to advertisers, data-firms, or its creator.
advertisement
advertisement

4. Which of the following activity is not done by spyware?
a) sell internet usage data
b) capture credit card details
c) user’s personal identity
d) steal signature of the different virus
View Answer

Answer: d
Explanation: Spyware are harmful programs intended to spy & gain access to or damage the system data, without your acquaintance. It captures credit card details, user’s personal identity, sells internet usage data etc.

5. Which of the following activity is not done by spyware?
a) Monitors your internet activity
b) Track user’s login details and passwords
c) Uninstalls your mobile browser
d) Spy on sensitive information
View Answer

Answer: c
Explanation: Spyware is harmful software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user. It monitors your internet activity, track login credentials and spy on user’s sensitive information.

6. Spyware is not a powerful & one of the most widespread threats on the internet.
a) True
b) False
View Answer

Answer: b
Explanation: Spyware is one of the most powerful & widespread threats on the internet. Spyware is categorized as a sub-type of malware intended to spy & gain access to or damage the system data, without your acquaintance.

7. It actually infects your device easily & makes it hard to _____________
a) delete
b) identify
c) modify
d) copy
View Answer

Answer: b
Explanation: The most powerful & widespread threats for users are the spyware. It actually infects your device easily & makes it hard to detect. Once detected, we need specific tools and antivirus programs to delete them.
advertisement

8. There are __________ main types of spyware.
a) 2
b) 3
c) 4
d) 5
View Answer

Answer: c
Explanation: Spyware actually infects your device easily & makes it hard to detect. There are 4 major types of spyware. These are adware, tracking cookies, spy-trojans & system monitoring spyware.

9. _____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
View Answer

Answer: d
Explanation: There are 4 major types of spyware. One of them is the tracking cookies which track the user’s online activities like search queries, history pages & downloads, for selling purposes.
advertisement

10. _____________ tracks your data and displays those products as ads for promotions.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
View Answer

Answer: a
Explanation: Spyware are of four major types. One of them is adware. Adware or ad-based spyware tracks your data and displays those products as ads for promotions.

11. _________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
View Answer

Answer: c
Explanation: There are four major types of spyware. One of them is the spy-trojans which disguise them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.

12. ____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details.
a) Ad-based spyware
b) System Monitors
c) Spy-trojans
d) Tracking cookies
View Answer

Answer: b
Explanation: One of the types of spyware is the system monitoring spyware which records all your key-strokes, chat-room dialogs, a program run in your system, and system details.

13. Which of the following do not lead you to invite spyware into your system?
a) Accepting fishy prompt or pop-ups
b) Downloading apps from an unreliable source
c) Opening unknown attachments
d) Installing antivirus patches
View Answer

Answer: d
Explanation: Some of the largest possible ways your system can become contaminated with spyware is when you accept fishy prompts and pop-ups, download apps from unreliable sources or opening unknown attachments from mailing services.

14. As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents.
a) True
b) False
View Answer

Answer: a
Explanation: As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents. In this manner, you can protect your system before the spyware takes away all your sensitive data.

15. Which of the following is not an anti-spyware tool?
a) MalwareBytes Anti-Malware tool
b) SpyBot Search and Destroy
c) Emsisoft Emergency Kit
d) MS Firewall Defender
View Answer

Answer: d
Explanation: MS Firewall Defender is not used for detecting & removing spyware. MalwareBytes Anti-Malware tool, SpyBot Search and Destroy & Emsisoft Emergency Kit are some of the anti-spyware tools.

16. If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.
a) passwords
b) email ID
c) name
d) address
View Answer

Answer: a
Explanation: If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your passwords, and delete browsing activities from a web browser.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.