Documente Academic
Documente Profesional
Documente Cultură
users.
Phishing
Spamming
Baiting
:
Phishing
. _______ is the practice and precautions taken to protect valuable information from
unauthorised access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
Slowing down or crashing the system to render it slow or unusable is called a denial of service
attack.
0.5 points
In these types of threats, one has physical access to the network with authorized
account or server access.
External threats
Structured threats
Internal threats
Unstructured threats
:
Internal threats
0.5 points
They hide themselves in various cycles of encryption and decryption.
Trojans
File Infectors
Polymorphic Viruses
Viruses
:
Polymorphic Viruses
0.5 points
_____ are serious types of Adhoc attacks.
Protocol attacks
Volume-based attacks
Application attacks
Malware attacks
:
Application attacks
0.5 points
________ consume network bandwidth and flood the networks .
Protocol attacks
Volume based attacks
Application attacks
Organized attacks
:
Volume based attacks
0.5 points
_______is the deliberate exploitation of computer systems and its resources
connected through Internet.
Cyber crime
Cyber warfare
Hacking
Cyber Attack
:
Cyber Attack
0.5 points
Port scanners use unique gadgets to spy the traffic between computers inside the
network.
True
False
:
False
0.5 points
Byzantine attack exclusively targets Mobile Adhoc networks.
True
False
:
True
0.5 points
In passive attack, the attacker communicates data to all divisions or blocks during
data transmission.
True
False
:
False
0.5 points
Botnets are millions of computers compromised with viruses.
True
False
:
True
------------ is a DoS attack where fragmented packets are sent to a target machine.
:
(Type: String) Tear drop attack
0.5 points
---------is a Countermeasure to a TCP SYN flood attack
:
(Type: String) Reducing time on open connection, when they are not used.
(Type: String) Firewalls can be installed to suspicious traffic
(Type: String) Connection queue size can be increased
0.5 points
----------is a DoS attack which involves IP spoofing
:
(Type: String) Smurf Attack
0.5 points
_______ viruses are basically attached to executable code or exe files.
:
(Type: String) File Infectors
0.5 points
Match the Malware Breakdowns with its type
a. WannaCry
b. Kovter
c. Mirai
d. NanoCore
e. Smoke Leader
Hint
:
(Type: String) d b e a c
0.5 points
0.5 points
Cybercrime attacks such as Advanced Persistent Threats APT and ransomware
often start with phishing.
True
False
:
True
0.5 points
Black hats use their skill to find vulnerabilities in the networks and report.
True
False
:
False
0.5 points
Worms are sometimes disguised as a useful program.
True
False
:
False
1 point
These Attacks are usually used for scattering Malware.
Eavesdropping
Birthday attack
:
Drive-by download attack
0.5 points
Viruses, Worms and Trojans Steal Information and delete data.
True
False
:
False
Which of the following is correct?
Risk=threat x vulnerability
Threat=risk x vulnerability
Vulnerability=risk +threat
Risk=threat - vulnerability
Password
Encryption
Biometrics
Smart cards
No, the answer is incorrect.
Score: 0
Accepted Answers:
Password