Types on Cyber Security related Questions and Answers - Page 7

Question 61 : _______________ needs to be turned off in order to prevent from this attack.
1. Email scripting
2. Email attachments
3. Email services
4. Third party email programs
View Answer   Discuss with Members

Question 62 : Email users who use IE as their _________________ are vulnerable to Reaper Exploit.
1. Web engine
2. Rendering engine
3. Game engine
4. HTML engine
View Answer   Discuss with Members

Question 63 : Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)?
1. Zeus
2. Stuxnet
3. Reaper Exploit
4. Friday the 13
View Answer   Discuss with Members

Question 64 : Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as _____________ details _________ and passwords.
1. credit card, antivirus name
2. credit card, login ID
3. cell phone, antivirus name
4. car model, account ID
View Answer   Discuss with Members

Question 65 : Fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information.
1. True
2. False
3.
4.
View Answer   Discuss with Members

Question 66 : Unsolicited Bulk E-mails (UBI) are called __________
1. SMS
2. MMS
3. Spam emails
4. Malicious emails
View Answer   Discuss with Members

Question 67 : Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails.
1. trojans, redirected malicious URLs
2. antivirus, patches
3. cracked software, redirected malicious URLs
4. malware, security patches
View Answer   Discuss with Members

Question 68 : _____________ is the technique used for tricking users to disclose their username and passwords through fake pages.
1. Social Engineering
2. Phishing
3. Cookie Stealing
4. Banner Grabbing
View Answer   Discuss with Members

Question 69 : Which of them is an example of grabbing email information?
1. Cookie stealing
2. Reverse engineering
3. Port scanning
4. Banner grabbing
View Answer   Discuss with Members

Question 70 : Which of the following is a non-technical type of intrusion or attack technique?
1. Reverse Engineering
2. Malware Analysis
3. Social Engineering
4. Malware Writing
View Answer   Discuss with Members


View 61 - 70 of 77 Questions

* Be the First to Post a Comment.

Submit comment :


Captcha Image
Reload

Ask Question

Captcha Image
Reload

Note : Name and Email never shown.





Subscribe


Become a part of EducationForever. Subscribe to our FREE Newsletter