Watch this video for css quiz 2 solution
Q:1. The storm botnet was mainly used for _____________.
a.Phishing
b.DDos Attack
c.Hacking
d.None of the above
Answer:- (b). Ddos Attack
Reason:-The storm botnet was mainly used for Spamming.
my youtube channel :- More Answers from my channel
Q:2. Which statement is incorrect for silent banker?
a.It is a trojan horse
b.It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
c.Both A and B
d.None of the above
Answer:- (c)Both A and B
Reason:- The statement is incorrect for silent banker is Option ( c ) Both A and B
Q:3. Which of the following is true for Stuxnet?
a.It is a virus
b.It is A botnet
c.It is a computer worm
d.A ransomware
Answer :- (c) .It is a computer worm
Reason :- Its Is a computer worm
Q:4. Which of the following is incorrect for the attack on Target Corporation?
a.It is an example of server-side attack
b.More than 140 million credit card information was stolen in the attack
c.The attack happened in 2011
d.None of the above
Answer:-(c).The attack happened in 2011
Reason:- Mentioned In Lecture
Q:5. Identify the correct name of the bug bounty program .
a.Google Vulnerability Program
b.Microsoft Bug Bounty Program
c.Mozilla Bounty Program
d.Pwn2Own competition
Answer"- (d).Pwn2Own competition
Reason :- Mentioned In the Lecture
Q:6. _________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
a.Computer viruses
b.Phishing scams
c.Phishing trips
d.Spyware scams
Answer:- b.Phishing scams
Reason:- Making Duplicate Of original
Q:7. Which of the following is correct for MITM?
a.It stands for Man-In-The-Middle attack
b.It happens when a communication between the two systems is intercepted by an outside entity
c.It can happen in any form of online communication, such as email, social media, web surfing, etc
d.All of the above
Answer :-(d).All of the above
Reason:- It All Lie Under This
Q:8. Which of the following describes a monitoring software, installed without your consent?
a.Malware
b.Adware
c.Spyware
d.Ransomware
Answer:-(c)..Spyware
Reason:- Takes Access Without Owner
Q:9. Which type of cyber-attack is commonly performed through emails?
a.Trojans
b.Worms
c.Ransomware
d.Phishing
Answer :- (d). Phishing
Reason:- Looks Like Same As Original Email
Q:10. If you share too much information on social media, you might be at risk of?
a.Identity Theft
b.Ransomware
c.Malware
d.Adware
Answer :- (a).Identity Theft
Reason:- identity Theft can be stolen
6 Comments
Bhai Themes change karo lo please white themes laga lo screen clear nahi hai black themes
ReplyDeleteMai
ok bro thankyou
DeleteReliable hai na yha pe answers??
ReplyDeleteHaa Bilkul correct answer hai , toda updates kiya hu to chek kar lo phir se
DeleteSahii hai answer
ReplyDeleteSir quiz 8 k answer.(cyber security)..., upload kar do...
ReplyDelete