Computer Security

WhatsApp Channel Join Now
Telegram Group Join Now

81. What is spear phishing?
a. A type of phishing attack that targets a specific individual or group.
b. A type of phishing attack that targets a wide range of individuals.
c. A type of phishing attack that uses voice communication to trick individuals.
d. None of the above.

View Answer >

82. What is whale phishing?
a. A type of phishing attack that targets high-profile individuals such as CEOs or executives.
b. A type of phishing attack that targets a wide range of individuals.
c. A type of phishing attack that uses voice communication to trick individuals.
d. None of the above.

View Answer >

83. What is vishing?
a. A type of phishing attack that uses voice communication to trick individuals.
b. A type of phishing attack that targets a wide range of individuals.
c. A type of phishing attack that targets high-profile individuals such as CEOs or executives.
d. None of the above.

View Answer >

84. What is smishing?
a. A type of phishing attack that uses SMS or text messages to trick individuals.
b. A type of phishing attack that targets high-profile individuals such as CEOs or executives.
c. A type of phishing attack that targets a wide range of individuals.
d. None of the above.

View Answer >

85. Which of the following is a common phishing technique?
a. Spoofing
b. Cross-site scripting
c. SQL injection
d. None of the above.

View Answer >

86. What is spoofing?
a. A technique used in phishing attacks to make the attacker’s email or message appear as if it is coming from a legitimate source.
b. A technique used to inject malicious code into a website.
c. A technique used to extract sensitive information from a database.
d. None of the above.

View Answer >

87. What is whaling?
a. A type of phishing attack that targets high-profile individuals such as CEOs or executives.
b. A type of phishing attack that targets a wide range of individuals.
c. A type of phishing attack that uses voice communication to trick individuals.
d. None of the above.

View Answer >

88. Which of the following is a common defense against phishing attacks?
a. Employee education and training
b. Two-factor authentication
c. Anti-phishing software
d. All of the above

View Answer >

89. Which of the following is a social engineering attack that involves sending fraudulent emails or messages to trick individuals into revealing sensitive information or performing actions that can compromise their security?
a. Hacking
b. Spoofing
c. Phishing
d. None of the above

View Answer >

90. What is hacking?
a. The act of exploiting vulnerabilities in a system or network to gain unauthorized access or control.
b. The act of making fraudulent phone calls to trick individuals into revealing sensitive information.
c. The act of sending fraudulent emails or messages to trick individuals into revealing sensitive information or performing actions that can compromise their security.
d. None of the above.

View Answer >


WhatsApp Channel Join Now
Telegram Group Join Now
                                                   

Leave a Comment

telegram Join Telegram
Join Now Join Now