Forwarded from cRyPtHoN™ INFOSEC (EN)
Which of them does NOT comes under scanning methodologies?
Anonymous Quiz
9%
Vulnerability scanning
19%
Sweeping
8%
Port Scanning
64%
Google Dorks
👍1👏1🍌1
Forwarded from cRyPtHoN™ INFOSEC (EN)
________ is a way to breach the security by using the vulnerability of that system.
Anonymous Quiz
4%
Threat
6%
Vulnerability
86%
Exploit
4%
Attack
🍌1
Forwarded from cRyPtHoN™ INFOSEC (EN)
_______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.
Anonymous Quiz
14%
Data copying
36%
Data masking
12%
Data breaching
38%
Data duplicating
🍌1
Forwarded from cRyPtHoN™ INFOSEC (EN)
________ automates an action or attack so that repetitive tasks are done at a faster rate.
Anonymous Quiz
21%
Auto-bots
4%
Cookie-bots
6%
Robots
69%
Bots
🍌1
Forwarded from cRyPtHoN™ INFOSEC (EN)
Adware are pre-chosen _______ developed to display ads.
Anonymous Quiz
24%
banner
34%
software
35%
malware
7%
shareware
Forwarded from cRyPtHoN™ INFOSEC (EN)
________ is an attack technique occurs when excess data gets written to a memory block.
Anonymous Quiz
13%
Over buffering
6%
Buffering
81%
Buffer overflow
1%
Memory full
Forwarded from cRyPtHoN™ INFOSEC (EN)
Finding & publishing any user’s identity with the help of different personal details is called ________
Anonymous Quiz
79%
Doxing
16%
Data breaching
4%
Personal data copying
1%
Secure File Transferring Protocol
Forwarded from cRyPtHoN™ INFOSEC (EN)
____________ is an attempt to steal, spy, damage or destroy computer systems, networks or their associated information.
Anonymous Quiz
1%
Cyber-security
85%
Cyber attack
14%
Digital hacking
0%
Computer security
Forwarded from cRyPtHoN™ INFOSEC (EN)
______ is the term used for toolkits that are purchased and used for targeting different exploits.
Anonymous Quiz
7%
Exploit bag
5%
Exploit set
72%
Exploit Toolkit
17%
Exploit pack
Forwarded from cRyPtHoN™ INFOSEC (EN)
_________ is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic.
Anonymous Quiz
5%
Cyber-replication
39%
Mimicking
31%
Website-Duplication
25%
Pharming
👍1
Forwarded from cRyPtHoN™ INFOSEC (EN)
RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the hard drive.
Anonymous Quiz
29%
True
71%
False
👍1
Forwarded from cRyPtHoN™ INFOSEC (EN)
When you book online tickets by swiping your card, the details of the card gets stored in ______
Anonymous Quiz
38%
database system
46%
point-of-sale system
16%
servers
0%
hard drives
👍1
Forwarded from cRyPtHoN™ INFOSEC (EN)
Point-of-sale intrusion does not deal with financial details and credit card information.
Anonymous Quiz
23%
True
77%
False
👍1
Forwarded from cRyPtHoN™ INFOSEC (EN)
Zero-day exploits are also called __________
Anonymous Quiz
52%
zero-day attacks
7%
hidden attacks
18%
un-patched attacks
22%
un-fixed exploits
❤1
Forwarded from cRyPtHoN™ INFOSEC (EN)
👍1
Forwarded from cRyPtHoN™ INFOSEC (EN)
❤1
Forwarded from cRyPtHoN™ INFOSEC (EN)
Physical ports are usually referred to as ___________
Anonymous Quiz
27%
jacks
4%
cables
49%
interfaces
20%
hardware plugs
👍1
Forwarded from cRyPtHoN™ INFOSEC (EN)
________ needs some control for data flow on each and every logical port.
Anonymous Quiz
5%
Antivirus
52%
Network firewall
40%
Intrusion Detection Systems (IDS)
3%
Anti-malware
❤1
Forwarded from cRyPtHoN™ INFOSEC (EN)
Data leakage threats DO NOT usually occur from which of the following?
Anonymous Quiz
6%
Web and email
4%
Mobile data storage
6%
USB drives and laptops
83%
Television
Forwarded from cRyPtHoN™ INFOSEC (EN)
Data leakage is popularly known as ___________
Anonymous Quiz
68%
data theft
11%
data crack
8%
low and slow data theft
13%
slow data theft