91. Which of the following is a common type of spoofing attack?
a. IP spoofing
b. Email spoofing
c. DNS spoofing
d. All of the above
92. What is IP spoofing?
a. A technique used to make it appear as if an attacker’s IP address is from a trusted source.
b. A technique used to gain unauthorized access to a system or network.
c. A type of malware that replicates itself to spread to other systems.
d. None of the above.
93. What is email spoofing?
a. A technique used in phishing attacks to make the attacker’s email or message appear as if it is coming from a legitimate source.
b. A technique used to gain unauthorized access to a system or network.
c. A type of malware that replicates itself to spread to other systems.
d. None of the above.
94. What is DNS spoofing?
a. A technique used to redirect users to a fake website that appears to be legitimate.
b. A technique used to make it appear as if an attacker’s IP address is from a trusted source.
c. A type of malware that replicates itself to spread to other systems.
d. None of the above.
95. Which of the following is a common defense against spoofing attacks?
a. Implementing anti-spoofing measures, such as DKIM and SPF.
b. Regularly updating and patching systems and software.
c. Implementing strong passwords and two-factor authentication.
d. All of the above.
96. What is a white hat hacker?
a. A hacker who uses their skills to improve security by finding and fixing vulnerabilities.
b. A hacker who uses their skills to gain unauthorized access to systems or networks for personal gain.
c. A hacker who uses their skills to attack and disrupt systems or networks.
d. None of the above.
97. What is a black hat hacker?
a. A hacker who uses their skills to gain unauthorized access to systems or networks for personal gain.
b. A hacker who uses their skills to improve security by finding and fixing vulnerabilities.
c. A hacker who uses their skills to attack and disrupt systems or networks.
d. None of the above.
98. What is a grey hat hacker?
a. A hacker who uses their skills to gain unauthorized access to systems or networks for personal gain.
b. A hacker who uses their skills to improve security by finding and fixing vulnerabilities, but may do so without permission.
c. A hacker who uses their skills to attack and disrupt systems or networks.
d. None of the above.
99. What is a brute force attack?
a. An attack that involves guessing a password or encryption key through trial and error.
b. An attack that involves tricking individuals into revealing sensitive information.
c. An attack that involves intercepting and altering network traffic.
d. None of the above.
100. What is a dictionary attack?
a. An attack that involves guessing a password or encryption key through trial and error using a pre-defined list of possible values.
b. An attack that involves tricking individuals into revealing sensitive information.
c. An attack that involves intercepting and altering network traffic.
d. None of the above.