Programmer for Noobs
CSS Quiz 2 Answers
Q1) The storm botnet was mainly used for _______ ?
Phishing
D-Dos Attack
Hacking
None of the above
Note: The storm botnet was mainly used for Spamming.
Programmer for Noobs
Q2) Which statement is incorrect for silent banker?
It is a trojan horse
It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
Both A and B
None of the above
Note: The statement is incorrect for silent banker is Option ( c ) Both A and B.
Programmer for Noobs
Q3) Which of the following is true for Stuxnet?
It is a virus
It is A botnet
It is a computer worm
A ransomware
Note: Stuxnet is a malicious computer worm first uncovered in 2010.
Programmer for Noobs
Programmer for Noobs
Q4) Which of the following is incorrect for the attack on Target Corporation?
It is an example of server-side attack
More than 140 million credit card information was stolen in the attack
The attack happened in 2011
None of the above
Note: The Attack Wasn’t performed in 2011.
Programmer for Noobs
Q5) Identify the correct name of the bug bounty program.
Google Vulnerability Program
Microsoft Bug Bounty Program
Mozilla Bounty Program
Pwn2Own competition
Note: Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference. First held in April 2007 in Vancouver, the contest is now held twice a year, most recently in November 2019. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities.
Programmer for Noobs
Q6) _______ are attempts by individuals to obtain confidential information from you by falsifying their identity.
Computer viruses
Phishing scams
Phishing trips
Spyware scams
Note: phishing scams are attempts by individuals to obtain confidential information from you by falsifying their identity.
Programmer for Noobs
Programmer for Noobs
Q7) Which of the following is correct for MITM ?
It stands for Man-In-The-Middle attack
It happens when a communication between the two systems is intercepted by an outside entity
It can happen in any form of online communication, such as email, social media, web surfing, etc
All of the above
Note: A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.
Programmer for Noobs
Q8) Which of the following describes a monitoring software, installed without your consent?
Malware
Adware
Spyware
Ransomware
Note: Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge.
Programmer for Noobs
Q9) Which type of cyber-attack is commonly performed through emails ?
Trojans
Worms
Ransomware
Phishing
Note: Phishing is a type of online scam where criminals impersonate legitimate organizations via email, text message. it looks like Same As Original Email.
Programmer for Noobs
Programmer for Noobs
Q10) If you share too much information on social media, you might be at risk of?
Identity Theft
Ransomware
Malware
Adware
Note: Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
Programmer for Noobs
PLEASE LIKE SHARE AND SUBSCRIBE PLEASE!
0 Comments