cyber security and element set 39

Que.The antivirus or PC defender software in a system helps in detecting virus and Trojans.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Clicking a link which is there in your email which came from an unknown source can redirect you to ____________ that automatically installs malware in your system.
a. that vendor’s site
b. security solution site
c. malicious site
d. software downloading site
Que.An attacker may use automatic brute forcing tool to compromise your ____________
a. username
b. employee ID
c. system / PC name
d. password
Que.The attacker will use different bots (zombie PCs) to ping your system and the name of the attack is _________________
a. Distributed Denial-of-Service (DDoS)
b. Permanent Denial-of-Service (PDoS)
c. Denial-of-Service (DoS)
d. Controlled Denial-of-Service (CDoS)
Que.Illicit hackers may enter your personal area or room or cabin to steal your laptop, pen drive, documents or other components to make their hands dirty on your confidential information.
a. True
b. False
c. May be True or False
d. Can’t say
Que._____________ is a malicious method used by cyber-criminals to trick a user into clicking on something different from what the user wants.
a. Click-hacking
b. Click-fraud
c. Clickjacking
d. Using torrent links
Que.Through the clickjacking attack, the employee’s confidential ______________ may get leaked or stolen.
a. information
b. papers
c. hardcopy files
d. media files
Que.Which of the following is not a proper aspect of user integration?
a. Employee’s authentication
b. Physical authorization
c. Access control
d. Representing users in the database
Que.It is very important to block unknown, strange and ______________ within the corporate network.
a. infected sites
b. programs
c. unwanted files
d. important folders
Que.Every employee of the firm must need to have some basic knowledge of cyber-security and types of hacking and how they are done.
a. True
b. False
c. May be True or False
d. Can’t say