computer system security 2nd week solution


Watch this video for css quiz 2 solution 




Q:1. The storm botnet was mainly used for _____________.
a.Phishing
b.DDos Attack
c.Hacking
d.None of the above

Answer:- (b). Ddos Attack

Reason:-The storm botnet was mainly used for Spamming.



my youtube channel  :- More Answers from my channel

Q:2. Which statement is incorrect for silent banker?

a.It is a trojan horse
b.It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
c.Both A and B
d.None of the above

Answer:- (c)Both A and B

Reason:- The statement is incorrect for silent banker is Option ( c ) Both A and B

Q:3. Which of the following is true for Stuxnet?
a.It is a virus
b.It is A botnet
c.It is a computer worm
d.A ransomware

Answer :- (c) .It is a computer worm

Reason  :- Its Is a computer worm

Q:4. Which of the following is incorrect for the attack on Target Corporation?
a.It is an example of server-side attack
b.More than 140 million credit card information was stolen in the attack
c.The attack happened in 2011
d.None of the above

Answer:-(c).The attack happened in 2011


 Reason:- Mentioned In Lecture

Q:5. Identify the correct name of the bug bounty program .
a.Google Vulnerability Program
b.Microsoft Bug Bounty Program
c.Mozilla Bounty Program
d.Pwn2Own competition


Answer"- (d).Pwn2Own competition

Reason :- Mentioned In the Lecture

Q:6. _________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
a.Computer viruses
b.Phishing scams
c.Phishing trips
d.Spyware scams

Answer:- b.Phishing scams
Reason:- Making Duplicate Of original

Q:7. Which of the following is correct for MITM?
a.It stands for Man-In-The-Middle attack
b.It happens when a communication between the two systems is intercepted by an outside entity
c.It can happen in any form of online communication, such as email, social media, web surfing, etc
d.All of the above

Answer :-(d).All of the above
Reason:- It All Lie Under This 


Q:8. Which of the following describes a monitoring software, installed without your consent?
a.Malware
b.Adware
c.Spyware
d.Ransomware

Answer:-(c)..Spyware

Reason:- Takes Access Without Owner

Q:9. Which type of cyber-attack is commonly performed through emails?
a.Trojans
b.Worms
c.Ransomware
d.Phishing

Answer :- (d). Phishing

 Reason:- Looks Like Same As Original Email

Q:10. If you share too much information on social media, you might be at risk of?
a.Identity Theft
b.Ransomware
c.Malware
d.Adware

Answer :- (a).Identity Theft

Reason:- identity Theft can be stolen

Post a Comment

6 Comments

  1. Bhai Themes change karo lo please white themes laga lo screen clear nahi hai black themes
    Mai

    ReplyDelete
  2. Reliable hai na yha pe answers??

    ReplyDelete
    Replies
    1. Haa Bilkul correct answer hai , toda updates kiya hu to chek kar lo phir se

      Delete
  3. Sir quiz 8 k answer.(cyber security)..., upload kar do...

    ReplyDelete