250+ Understanding Attack Vectors part-19

Que.____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details.
a. Ad-based spyware
b. System Monitors
c. Spy-trojans
d. Tracking cookies
Que.Which of the following do not lead you to invite spyware into your system?
a. Accepting fishy prompt or pop-ups
b. Downloading apps from an unreliable source
c. Opening unknown attachments
d. Installing antivirus patches
Que.As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Which of the following is not an anti-spyware tool?
a. MalwareBytes Anti-Malware tool
b. SpyBot Search and Destroy
c. Emsisoft Emergency Kit
d. MS Firewall Defender
Que.If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.
a. passwords
b. email ID
c. name
d. address
Que.______________ can be defined as the duplication of another creator’s or developer’s product trailing a thorough examination of its production or development.
a. Reverse hacking
b. Cracking
c. Social engineering
d. Reverse engineering
Que._____________ can be made functional to diverse aspects of software development & hardware improvement activities.
a. Reverse hacking
b. Cracking
c. Reverse engineering
d. Social engineering
Que.RE is often defined as the crafting technique of ____________ who uses his skills to remove copy protection or trial versions from software or media.
a. crackers
b. risk assessment team
c. auditors
d. surveillance monitoring team
Que.Which of the following activity is a good aspect of reverse engineering in ethical hacking?
a. Cracking the trial version of the product to make it full-version
b. Removing the product key insertion step
c. Jumping the code for premium facilities
d. Determining the vulnerabilities in the product.
Que.Which of the following activity is a good aspect of reverse engineering in ethical hacking ?
a. Cracking the trial version of the product to make it full-version
b. Removing the product key insertion step
c. Jumping the code for premium facilities
d. Determine whether the app contains any undocumented functionality