πŸ“Š Information and Network Security
Q. Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.
  • (A) Virus, Cyber-Criminals
  • (B) Malware, Penetration Testers
  • (C) Trojans, Cyber-Criminals
  • (D) Virus, Penetration Testers
πŸ’¬ Discuss
βœ… Correct Answer: (C) Trojans, Cyber-Criminals
πŸ“Š Information and Network Security
Q. During a DOS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted.
  • (A) Network
  • (B) System
  • (C) Website
  • (D) Router
πŸ’¬ Discuss
βœ… Correct Answer: (C) Website
πŸ“Š Information and Network Security
Q. The intent of a __________ is to overkill the targeted server’s bandwidth and other resources of the target website.
  • (A) Phishing attack
  • (B) DoS attack
  • (C) Website attack
  • (D) MiTM attack
πŸ’¬ Discuss
βœ… Correct Answer: (B) DoS attack
πŸ“Š Information and Network Security
Q. In ________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.
  • (A) URL Redirection
  • (B) DOS
  • (C) Phishing
  • (D) MiTM attack
πŸ’¬ Discuss
βœ… Correct Answer: (C) Phishing
πŸ“Š Information and Network Security
Q. Trojan creators do not look for _______________.
  • (A) Credit card information
  • (B) Confidential data
  • (C) Important documents
  • (D) Securing systems with such programs
πŸ’¬ Discuss
βœ… Correct Answer: (D) Securing systems with such programs
πŸ“Š Information and Network Security
Q. 1. When one participant in a communication pretends to be someone else, it is called _________?
  • (A) Virus Attacks
  • (B) Fire Attacks
  • (C) Data Driven Attacks
  • (D) Masquerade
πŸ’¬ Discuss
βœ… Correct Answer: (D) Masquerade
πŸ“Š Information and Network Security
Q. ________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities.
  • (A) Message Authentication Code
  • (B) Steganography
  • (C) Whale phishing
  • (D) A cipher
πŸ’¬ Discuss
βœ… Correct Answer: (C) Whale phishing
πŸ“Š Information and Network Security
Q. Masquerading is _______.
  • (A) Attempting to hack a system through backdoors to an operating system or application.
  • (B) Pretending to be an authorized user
  • (C) Always done through IP spoofing
  • (D) Applying a subnet mask to an internal IP range
πŸ’¬ Discuss
βœ… Correct Answer: (B) Pretending to be an authorized user

Jump to