Computer Science, asked by arjitpal441gmailcom, 7 months ago

Answers require a reason. We may evaluate only those answers that have a proper reason
Q:1. The storm botnet was mainly used for _____________.
1.Phishing
2.DDos Attack
3.Hacking
4.None of the above

Q:2. Which statement is incorrect for silent banker?
1.It is a trojan horse
2.It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
3.Both A and B
4.None of the above

Q:3. Which of the following is true for Stuxnet?
1.It is a virus
2.It is A botnet
3.It is a computer worm
4.A ransomware

Q:4. Which of the following is incorrect for the attack on Target Corporation?
1.It is an example of server-side attack
2.More than 140 million credit card information was stolen in the attack
3.The attack happened in 2011
4.None of the above

Q:5. Identify the correct name of the bug bounty program .
1.Google Vulnerability Program
2.Microsoft Bug Bounty Program
3.Mozilla Bounty Program
4.Pwn2Own competition

Q:6. _________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
1.Computer viruses
2.Phishing scams
3.Phishing trips
4.Spyware scams

Q:7. Which of the following is correct for MITM?
1.It stands for Man-In-The-Middle attack
2.It happens when a communication between the two systems is intercepted by an outside entity
3.It can happen in any form of online communication, such as email, social media, web surfing, etc
4.All of the above

Q:8. Which of the following describes a monitoring software, installed without your consent?
1.Malware
2.Adware
3.Spyware
4.Ransomware

Q:9. Which type of cyber-attack is commonly performed through emails?
1.Trojans
2.Worms
3.Ransomware
4.Phishing

Q:10. If you share too much information on social media, you might be at risk of?
1.Identity Theft
2.Ransomware
3.Malware
4.Adware

Submit​

Answers

Answered by sharpshooter90
2

Answer:

itihaas up with the help c .jdgitsoysoysyisyosyosoysouduodphdpudourupd f t shirt ruptured ruprupdylduldyodludoudlydohdhoduoduodoyduodludlydludoydoydyodyodyldyodlydoydoydoyruld

Similar questions