Que.Which of the following is not an example or type of phishing?
|
a. Spear phishing |
b. Deceptive phishing |
c. Whaling |
d. Monkey in the Middle |
Que.Which of the following is not an example or type of phishing ?
|
a. Tracking |
b. Vishing |
c. Smishing |
d. Pharming |
Que._____________ is data interception method used by hackers.
|
a. Phishing |
b. DoS |
c. Sniffing |
d. MiTM |
Que.Sniffing is also known as ___________________
|
a. network-tapping |
b. wiretapping |
c. net-tapping |
d. wireless-tapping |
Que._____________ are programs or devices that capture the vital information from the target network or particular network.
|
a. Routers |
b. Trappers |
c. Wireless-crackers |
d. Sniffers |
Que.Which of them is not an objective of sniffing for hackers?
|
a. Fetching passwords |
b. Email texts |
c. Types of files transferred |
d. Geographic location of a user |
Geographic location of a user
Que.Which of the following tech-concepts cannot be sniffed?
|
a. Router configuration |
b. ISP details |
c. Email Traffic |
d. Web Traffic |
Que.Which of the following tech-concepts cannot be sniffed ?
|
a. Cloud sessions |
b. FTP passwords |
c. Telnet passwords |
d. Chat sessions |
Que.Which of the below-mentioned protocol is not susceptible to sniffing?
|
a. HTTP |
b. SMTP |
c. POP |
d. TCP |
Que.Which of the below-mentioned protocol is not susceptible to sniffing ?
|
a. NNTP |
b. UDP |
c. FTP |
d. IMAP |