AKTU -2 Computer System Security Quiz Answer
- Get link
- X
- Other Apps
AKTU .2 Computer System Security Quiz Answer
Question .1- The storm bot-net was mainly used for _______ ?
- Phishing
- D-Dos Attack
- Hacking
- None of the above
Question -2 Which statement is incorrect for silent banker ?
- It is a trojan horse
- It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
- Both A and B
- None of the above
Question .3- Which of the following is true for Stuxnet?
- It is a virus
- It is A botnet
- It is a computer worm
- A ransomware
Question . 4- Which of the following is incorrect for the attack on Target Corporation?
- It is an example of server-side attack
- More than 140 million credit card information was stolen in the attack
- The attack happened in 2011
- None of the above
Question .5- Identify the correct name of the bug bounty program .
- Google Vulnerability Program
- Microsoft Bug Bounty Program
- Mozilla Bounty Program
- Pwn2Own competition
Question. 6- _______ are attempts by individuals to obtain confidential information from you by falsifying their identity.
- Computer viruses
- Phishing scams
- Phishing trips
- Spyware scams
Question .7- Which of the following is correct for MITM ?
- It stands for Man-In-The-Middle attack
- It happens when a communication between the two systems is intercepted by an outside entity
- It can happen in any form of online communication, such as email, social media, web surfing, etc
- All of the above
Question. 8- Which of the following describes a monitoring software, installed without your consent ?
- Malware
- Adware
- Spyware
- Ransomware
Question. 9- Which type of cyber-attack is commonly performed through emails ?
- Trojans
- Worms
- Ransomware
- Phishing
Question. 10- If you share too much information on social media, you might be at risk of?
- Identity Theft
- Ransomware
- Malware
- Adware
- Get link
- X
- Other Apps

Comments
Post a Comment