CSS Quiz 2 aktu - Scifi Curoisity
  • CSS Quiz 2 aktu




    Q1) The storm botnet was mainly used for _______ ?

    • Phishing
    • ->D-Dos Attack
    • Hacking
    • None of the above


    Reason : The storm botnet was mainly used for Spamming.



    Q2) Which statement is incorrect for silent banker ?

    • It is a trojan horse
    • It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
    • ->Both A and B
    • None of the above


    Reason The statement is incorrect for silent banker is Option ( c ) Both A and B.



    Q3) Which of the following is true for Stuxnet?

    • It is a virus
    • It is A botnet
    • ->It is a computer worm
    • A ransomware

    Reason: Stuxnet is a malicious computer worm first uncovered in 2010.



    Q4) Which of the following is incorrect for the attack on Target Corporation?

    • It is an example of server-side attack
    • More than 140 million credit card information was stolen in the attack
    • ->The attack happened in 2011
    • None of the above


    Reason: The attack happened in 2011' is an incorrect statement for Target company attack. Explanation: This attack had been taken place in the year 2013. More than 100-140 million individuals got affected due to this attack



    Q5) Identify the correct name of the bug bounty program .

    • Google Vulnerability Program
    • Microsoft Bug Bounty Program
    • Mozilla Bounty Program
    • ->Pwn2Own competition

    Reason : Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference. First held in April 2007 in Vancouver, the contest is now held twice a year, most recently in November 2019. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities.



    Q6) _______ are attempts by individuals to obtain confidential information from you by falsifying their identity.

    • Computer viruses
    • ->Phishing scams
    • Phishing trips
    • Spyware scams

    Reason : phishing scams are attempts by individuals to obtain confidential information from you by falsifying their identity.



    Q7) Which of the following is correct for MITM ?

    • It stands for Man-In-The-Middle attack
    • It happens when a communication between the two systems is intercepted by an outside entity
    • It can happen in any form of online communication, such as email, social media, web surfing, etc
    • ->All of the above


    Reason  A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.


    Q8) Which of the following describes a monitoring software, installed without your consent ?

    • Malware
    • Adware
    • ->Spyware
    • Ransomware


    Reason :Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge.



    Q9) Which type of cyber-attack is commonly performed through emails ?

    • Trojans
    • Worms
    • Ransomware
    • ->Phishing


    Reason : Phishing is a type of online scam where criminals impersonate legitimate organizations via email, text message. it looks like Same As Original Email.



    Q10) If you share too much information on social media, you might be at risk of?

    • ->Identity Theft
    • Ransomware
    • Malware
    • Adware


    Reason : Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
  • You might also like

    1 comment :

    1. Css Quiz 2 Aktu
      -
      Scifi Curoisity >>>>> Download Now

      >>>>> Download Full

      Css Quiz 2 Aktu
      -
      Scifi Curoisity >>>>> Download LINK

      >>>>> Download Now

      Css Quiz 2 Aktu
      -
      Scifi Curoisity >>>>> Download Full

      >>>>> Download LINK

      ReplyDelete

Featured

CSS Quiz 8 AKTU Prutor

  Q:1.  Password should be combination of ____. (according to the video lecture). 1. Lower case letters only 2. Memorable names and dates 3....

Tags

Recommended Posts

randomposts

Trending This Week

How to integrate Git bash With Vs code

  # Integrated-VS-code-with-git-bash Let's See How to integrate git bash with vs code  > first you need to oopen setting > sarch setting.json  > then in last you have to paste like these  >      "terminal.integrated.shell.windows": "C:\\Program Files\\Git\\bin\\bash.exe"  Now you will able to use git bash terminal in vs code 

CSS Quiz 5 AKTU

  Q1) Chroot jail is used to _______ process and its children by ________ to the supplied directory name. isolate, changing the root directory ->  change, the name execute, renaming it All of the above Reason :   A  chroot jail  is a way to isolate a process and its children from the rest of the system. It should only be  used  for processes that don't run as root, as root users can break out of the  jail  very easily Q2) Taliking about FreeBSD jail, which of the following is true ? It can only bind to sockets with specified IP address and authorized ports ->  It can communicate with processes inside and outside of jail Root is limited (example: cannot load kernel modules) None of the above Reason :   The jail mechanism is an implementation of FreeBSD's OS-level virtualisation that allows system administrators to partition a FreeBSD-derived computer system into several independent mini-systems called jails, all sharing the sam...

CSS Quiz 1 aktu

     Question 1)  What was the percentage increase in Zero Day Vulnerabilities in the year 2015 ?     4%     50%     100% ->    125% Question 2)  Identify the software whose vulnerability is exploited the most ?     Android     -> Browser      Adobe Flash Player     Microsoft Office Question 3) The computer vulnerabilities and exploits databases are maintained by _________.    Kaspersky Lab    Symantec Corporation   ->  MITRE Corporation      None of the above Question 4) Which of the following is/are correct with respect to Ransomware ?     It is a form of Malware     It encrypts the whole hard drive of the computer, essentially locking the user out of the entire system.     It locks the system's screen or locks the users' files unless a ransom is paid. ->All of the above.   Questi...

Featured