CSS Quiz Week 2 answers

 





Q:1. The storm botnet was mainly used for _____________.

a.Phishing

b.DDos Attack

c.Hacking

d.None of the above


Answer:- (b). Ddos Attack




Q:2. Which statement is incorrect for silent banker?


a.It is a trojan horse

b.It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker

c.Both A and B

d.None of the above


Answer:- (c)Both A and B




Q:3. Which of the following is true for Stuxnet?

a.It is a virus

b.It is A botnet

c.It is a computer worm

d.A ransomware


Answer :- (c) .It is a computer worm




Q:4. Which of the following is incorrect for the attack on Target Corporation?

a.It is an example of server-side attack

b.More than 140 million credit card information was stolen in the attack

c.The attack happened in 2011

d.None of the above


Answer:-(c).The attack happened in 2011



 


Q:5. Identify the correct name of the bug bounty program .

a.Google Vulnerability Program

b.Microsoft Bug Bounty Program

c.Mozilla Bounty Program

d.Pwn2Own competition



Answer"- (d).Pwn2Own competition




Q:6. _________ are attempts by individuals to obtain confidential information from you by falsifying their identity.

a.Computer viruses

b.Phishing scams

c.Phishing trips

d.Spyware scams


Answer:- b.Phishing scams




Q:7. Which of the following is correct for MITM?

a.It stands for Man-In-The-Middle attack

b.It happens when a communication between the two systems is intercepted by an outside entity

c.It can happen in any form of online communication, such as email, social media, web surfing, etc

d.All of the above


Answer :-(d).All of the above




Q:8. Which of the following describes a monitoring software, installed without your consent?

a.Malware

b.Adware

c.Spyware

d.Ransomware


Answer:-(c)..Spyware




Q:9. Which type of cyber-attack is commonly performed through emails?

a.Trojans

b.Worms

c.Ransomware

d.Phishing


Answer :- (d). Phishing


 


Q:10. If you share too much information on social media, you might be at risk of?

a.Identity Theft

b.Ransomware

c.Malware

d.Adware


Answer :- (a).Identity Theft

Post a Comment

0 Comments