250+ Understanding Attack Vectors part-25

Que.Try to keep your passwords without meaning so that _____________ attack becomes almost impossible to perform successfully.
a. social engineering
b. phishing
c. password guessing
d. brute force
Que.Keeping the password by the name of your pet is a good choice.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Increase your security for social media account by always ____________ as you step away from the system.
a. signing in
b. logging out
c. signing up
d. logging in
Que.Clicking on enticing Ads can cause trouble.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Strangers cannot cause much trouble if we connect to them over social media.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Part of the social media sites are the various games & 3rd party applications which helps ______________ to get access to your data.
a. ethical hackers
b. penetration testers
c. security auditors
d. cyber-criminals
Que.Many social media sites and services provide _______________ for legitimate account verification.
a. Retina scanning
b. Fingerprint scanning
c. CAPTCHA
d. 2-step verification
Que.Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security.
a. True
b. False
c. May be True or False
d. Can’t say
Que.______________ is populating the inbox of any target victim with unsolicited or junk emails.
a. Phishing
b. Spamming
c. Hooking
d. DoS
Que._________________ technique is also used in product advertisement.
a. Phishing
b. Cookies
c. e-Banners
d. Spamming
Que.Which of the following is not a technique used by spanners?
a. Spoofing the domain
b. Sending attached virus in spams
c. Junk tags associated with spam-emails
d. Making important deals through such emails
Que.___________ are used which crawl web pages looking for email Ids and copies them to the database.
a. Caches
b. Cookies
c. Bots
d. Spiders
Que.Which of the following is not a proper way of how spammers get the email Ids?
a. When a user registers to online services, blogs, and sites
b. Databases formed by spiders fetching email Ids from different sources
c. From offline form fill-up documents
d. Online ad-tracking tools
Que.There are ___________ major ways of spamming.
a. 4
b. 2
c. 3
d. 5
Que.There are _______ types of spamming.
a. 3
b. 4
c. 5
d. 6
Que.Which of the following is not a type of spamming attack?
a. Page-jacking
b. Image spamming
c. Spear phishing
d. Blog & wiki spamming
Que.Which of the following is not a bulk emailing tool ?
a. Fairlogic Worldcast
b. 123 Hidden sender
c. YL Mail Man
d. NetCut