Sunteți pe pagina 1din 6

This is the action of pretending to be a licensed venture and sending fake e-mails to

users.

Phishing
 Spamming

 Baiting

 All the above

:
Phishing

. _______ is the practice and precautions taken to protect valuable information from
unauthorised access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
Slowing down or crashing the system to render it slow or unusable is called a denial of service
attack.

Mobile Adhoc Networks (MANET) and

0.5 points
In these types of threats, one has physical access to the network with authorized
account or server access.

 External threats
 Structured threats
 Internal threats

 Unstructured threats
:
Internal threats
0.5 points
They hide themselves in various cycles of encryption and decryption.

 Trojans

 File Infectors
 Polymorphic Viruses

 Viruses

:
Polymorphic Viruses
0.5 points
_____ are serious types of Adhoc attacks.

 Protocol attacks
 Volume-based attacks
 Application attacks

 Malware attacks

:
Application attacks
0.5 points
________ consume network bandwidth and flood the networks .

 Protocol attacks
 Volume based attacks
 Application attacks

 Organized attacks

:
Volume based attacks
0.5 points
_______is the deliberate exploitation of computer systems and its resources
connected through Internet.

 Cyber crime
 Cyber warfare
 Hacking

 Cyber Attack

:
Cyber Attack
0.5 points
Port scanners use unique gadgets to spy the traffic between computers inside the
network.

 True

 False

:
False
0.5 points
Byzantine attack exclusively targets Mobile Adhoc networks.

 True

 False

:
True
0.5 points
In passive attack, the attacker communicates data to all divisions or blocks during
data transmission.

 True

 False

:
False
0.5 points
Botnets are millions of computers compromised with viruses.

 True

 False

:
True
------------ is a DoS attack where fragmented packets are sent to a target machine.
:
(Type: String) Tear drop attack

0.5 points
---------is a Countermeasure to a TCP SYN flood attack

:
(Type: String) Reducing time on open connection, when they are not used.
(Type: String) Firewalls can be installed to suspicious traffic
(Type: String) Connection queue size can be increased

0.5 points
----------is a DoS attack which involves IP spoofing

:
(Type: String) Smurf Attack

0.5 points
_______ viruses are basically attached to executable code or exe files.

:
(Type: String) File Infectors

0.5 points
Match the Malware Breakdowns with its type
a. WannaCry
b. Kovter
c. Mirai
d. NanoCore
e. Smoke Leader

Hint

:
(Type: String) d b e a c

0.5 points
0.5 points
Cybercrime attacks such as Advanced Persistent Threats APT and ransomware
often start with phishing.

 True

 False

:
True
0.5 points
Black hats use their skill to find vulnerabilities in the networks and report.

 True

 False

:
False
0.5 points
Worms are sometimes disguised as a useful program.

 True

 False

:
False
1 point
These Attacks are usually used for scattering Malware.

 Drive-by download attack


 Phishing

 Eavesdropping

 Birthday attack

:
Drive-by download attack
0.5 points
Viruses, Worms and Trojans Steal Information and delete data.
 True 

 False

:
False
Which of the following is correct?

 Risk=threat x vulnerability

 Threat=risk x vulnerability

 Vulnerability=risk +threat

 Risk=threat - vulnerability

No, the answer is incorrect.


Score: 0
Accepted Answers:
Risk=threat x vulnerability
Which of the following is the cheapest form of authentication?

 Password

 Encryption

 Biometrics

 Smart cards
No, the answer is incorrect.
Score: 0
Accepted Answers:
Password

S-ar putea să vă placă și