1. The beginning value of an ordered list can be changed using the ______________attribute. (1 Point)
1) TYPE
2) START
3) FACE
4) BGCOLOR
2. ____________________ includes searching for sensitive information in the trash bins. (1 Point)
1) ShoulderSurfing
2) Eavesdropping
3) DumpsterDiving
4) Noneofthese
3. A list within a list is called a __________________________________list. (1 Point)
1) Unordered
2) Nested
3) Ordered
4) Description
4. The background colour of a webpage can be changed using the
_________________________________ attribute of the tag. (1 Point)
1) bgcolor
2)
3)
4)
5.
(1
1)
2)
3)
4)
6. ____________________________________. (1 Point)
backgroundcolour
bgcolour
noneofthese
Which among the following is an example of Computer-based Social Engineering ?
Point) DumpsterDiving ShoulderSurfing Pop-upWindows Noneofthese
The BEHAVIOR attribute of the tag can be assigned the value
1) SCROLL
2) SLIDE
3) ALTERNATE
4) Alloftheabove
7. You should enable anti-phishing features offered by your email client and web browser.
(1 Point)
1) True
2) False
8. Which attribute of the tag will help you display the image on right hand side of the webpage ?
(1 Point)
1) SRC
2) WIDTH
3) ALT
4) ALIGN
9. Social Engineers cannot research about their targets via social media, blogs and google searches.
(1 Point)
1) True
2) False
10. Which of the following is NOT a text formatting tag ?
(1 Point)
1)
2)
3)
4)
11. Unauthorized listening/reading of conversations is called ________________________________________.
(1 Point)
1) DumpsterDiving
2) ShoulderSurfing
3) Tailgating
4) Eavesdropping
12. By default, an unvisited link is underlined and blue.
(1 Point)
1) True
2) False
13. The _______________________________ part contains information about the HTML document.
(1 Point)
1) BODY
2) HEAD
14. A social engineer may ask for your identity card to know your personal information like name, school etc.
(1 Point)
1) True
2) False
15. Which attribute of the tag will change the bullet style ?
(1 Point)
1) Start
2) Type
3) Bullet
4) Noneofthese
16. The windows that suddenly appear while surfing the Internet and ask for user's critical information are called _______________________.
(2 Points)
17. Fill in the missing attribute in the following piece of code:
LVIS Website
(2 Points)
18._________________________ based social engineering use direct interactions to exploit or manipulate people for providing the confidential information.
(2 Points)
19. ___________________________ networking websites are used by social engineers for making friends online, chatting with them, sharing photos etc.
(2 Points)
20. Which attribute of the specifies the scrolling speed ?
Answers
Answered by
0
xnxnxnxnxnxnxnxnxnxnxxnxnxn
Similar questions