Looking For Anything Specific?

ads header

Computer System Security Quiz 2 Answers

 


  Programmer for Noobs

CSS Quiz 2 Answers

Q1) The storm botnet was mainly used for _______ ?

  • Phishing

  • D-Dos Attack

  • Hacking

  • None of the above


Note: The storm botnet was mainly used for Spamming.

  Programmer for Noobs

 

 

 

 

 

 

 

 

Q2) Which statement is incorrect for silent banker?

  • It is a trojan horse

  • It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker

  • Both A and B

  • None of the above

 

Note: The statement is incorrect for silent banker is Option ( c ) Both A and B.

  Programmer for Noobs

Q3) Which of the following is true for Stuxnet?

  • It is a virus

  • It is A botnet

  • It is a computer worm

  • A ransomware


Note: Stuxnet is a malicious computer worm first uncovered in 2010.

  Programmer for Noobs

  

Programmer for Noobs

Q4) Which of the following is incorrect for the attack on Target Corporation?

  • It is an example of server-side attack

  • More than 140 million credit card information was stolen in the attack

  • The attack happened in 2011

  • None of the above

 

Note:      The Attack Wasn’t performed in 2011.            

  Programmer for Noobs

 

 

 

 

 

 

 

Q5) Identify the correct name of the bug bounty program.

  • Google Vulnerability Program

  • Microsoft Bug Bounty Program

  • Mozilla Bounty Program

  • Pwn2Own competition

 

Note: Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference. First held in April 2007 in Vancouver, the contest is now held twice a year, most recently in November 2019. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities.

  Programmer for Noobs

 

 

 

 

 

Q6) _______ are attempts by individuals to obtain confidential information from you by falsifying their identity.

  • Computer viruses

  • Phishing scams

  • Phishing trips

  • Spyware scams



Note: phishing scams are attempts by individuals to obtain confidential information from you by falsifying their identity.

  Programmer for Noobs

 

 

 

 

 

 

 

 

  Programmer for Noobs

Q7) Which of the following is correct for MITM ?

  • It stands for Man-In-The-Middle attack

  • It happens when a communication between the two systems is intercepted by an outside entity

  • It can happen in any form of online communication, such as email, social media, web surfing, etc

  • All of the above

 

Note:  A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

  Programmer for Noobs

 





Q8) Which of the following describes a monitoring software, installed without your consent?

  • Malware

  • Adware

  • Spyware

  • Ransomware

 

Note: Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge.

  Programmer for Noobs

 

 

 

 

Q9) Which type of cyber-attack is commonly performed through emails ?

  • Trojans

  • Worms

  • Ransomware

  • Phishing

 

Note: Phishing is a type of online scam where criminals impersonate legitimate organizations via email, text message. it looks like Same As Original Email.

  Programmer for Noobs

 

 

 

 

 

 



  Programmer for Noobs

Q10) If you share too much information on social media, you might be at risk of?

  • Identity Theft

  • Ransomware

  • Malware

  • Adware

Note: Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.

  Programmer for Noobs

PLEASE LIKE SHARE AND SUBSCRIBE PLEASE!


Post a Comment

0 Comments