cyber security and element set 13

Que.____________ is the way or technique through which majority of the malware gets installed in our system.
a. Drive-by click
b. Drive-by redirection
c. Drive-by download
d. Drive-by injecting USB devices
Que.______ is the term used for toolkits that are purchased and used for targeting different exploits.
a. Exploit bag
b. Exploit set
c. Exploit Toolkit
d. Exploit pack
Que.Identity theft is the term used when a cyber-thief uses anybody’s personal information to impersonate the victim for their benefit.
a. True
b. False
c. May be True or False
d. Can’t say
Que._________ is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic.
a. Cyber-replication
b. Mimicking
c. Website-Duplication
d. Pharming
Que.RAM-Scraping is a special kind of malware that looks (scrape) for sensitive data in the hard drive.
a. True
b. False
c. May be True or False
d. Can’t say
Que.When you book online tickets by swiping your card, the details of the card gets stored in ______
a. database system
b. point-of-sale system
c. servers
d. hard drives
Que.Point-of-sale intrusion does not deal with financial details and credit card information.
a. True
b. False
c. May be True or False
d. Can’t say
Que._______ are deadly exploits where the vulnerability is known and found by cyber-criminals but not known and fixed by the owner of that application or company.
a. Unknown attacks
b. Secret attacks
c. Elite exploits
d. Zero-day exploits
Que.Zero-day exploits are also called __________
a. zero-day attacks
b. hidden attacks
c. un-patched attacks
d. un-fixed exploits
Que.There are ______ major types of ports in computers.
a. 1
b. 2
c. 3
d. 4