Week 1 – Understanding Security Threats

1. In the CIA Triad, "Confidentiality" means ensuring that data is:

Answers

·        accurate and was not tampered with.

·        available and that people can access it.

·        not accessible by unwanted parties.

·        accessible anonymously.

Explanation: When discussing the CIA Triad, "Confidentiality" refers to the process of ensuring that material is kept secret and that only authorized persons are able to access it. Protecting sensitive information from being accessed or disclosed in an unauthorized manner is a part of it. To protect the privacy of sensitive information, it is common practice to use precautions such as encoding, access limits, and encrypted communication methods.

2. In the CIA Triad, "Integrity" means ensuring that data is:

Answers

·        available and that people can access it.

·        truthful and honest.

·        accurate and was not tampered with.

·        not accessible by unwanted parties.

Explanation: In the context of the CIA Triad, "integrity" refers to the process of ensuring that data does not lose its accuracy, consistency, or integrity while being stored, transmitted, or processed. It entails safeguarding data from illegal alterations or tampering, as well as ensuring that information continues to be reliable and trustworthy. Data checksums, hashing, and access control are some of the most frequent methods that are used while attempting to maintain the data's integrity.

3. In the CIA Triad, "Availability" means ensuring that data is:

Answers

·        available to anyone from anywhere.

·        available and people can access it.

·        not accessible by unwanted parties.

·        accurate and was not tampered with.

Explanation: In the context of the CIA Triad, "integrity" refers to the process of ensuring that data does not lose its accuracy, consistency, or integrity while being stored, transmitted, or processed. It entails safeguarding data from illegal alterations or tampering, as well as ensuring that information continues to be reliable and trustworthy. Data checksums, hashing, and access control are some of the most frequent methods that are used while attempting to maintain the data's integrity.

4. What's the relationship between a vulnerability and an exploit?

Answers

·        An exploit creates a vulnerability in a system.

·        An exploit takes advantage of a vulnerability to run arbitrary code or gain access.

·        They’re unrelated.

·        A vulnerability takes advantage of an exploit to run arbitrary code or gain access.

Explanation: Consider a vulnerability to be a weakness or fault in the design, implementation, or configuration of a system that has the potential to be exploited by an attacker. Now, an exploit is the specific instrument, strategy, or procedure that is used in order to take advantage of a vulnerability.

It's the same as having a gaping hole in the side of the building (a vulnerability), and an exploit is the method by which someone specifically breaches that gap. Therefore, flaws are referred to as vulnerabilities, and exploits are the elements that turn vulnerabilities into a problem.

5. Which statement is true for both a worm and a virus?

Answers

·        They infect other files with malicious code.

·        They’re self-replicating and self-propagating.

·        They don’t cause any harm to the target system.

·        They’re undetectable by antimalware software.

Explanation: Both worms and viruses are intended to multiply and propagate, and they may be harmful to a system in a variety of ways, including infecting files, taking advantage of weaknesses, or interfering with the way the system normally functions.

6. Check all examples of types of malware:

Answers

·        Adware

·        Viruses

·        Worms

·        Key Generators

7. What are the characteristics of a rootkit? Check all that apply.

Answers

·        Is harmless

·        Is difficult to detect

·        Is destructive

·        Provides elevated credentials

8. A person at a coffee shop leaves a laptop logged in with a token and walks away for a short time. An attacker goes to the laptop and starts impersonating the laptop’s user on the website the user is logged into. What kind of attack is this?

Answers

·        A ransomware attack.

·        A rogue AP attack

·        A session hijacking attack

·        A trojan attack.

Explanation: This hypothetical situation illustrates a kind of cyberattack that is variously referred to as "Session Hijacking" or "Session Sidejacking." The user leaves their session active on the laptop, which the attacker takes advantage of. The user's session may have a session token saved in a browser cookie or another kind of authentication. If the malicious user is able to get access to this token, they will have the ability to impersonate the user and access the website or online service as if they were the actual user.

It's important to remember to sign out of your account or lock your computer whenever you move away from it, particularly when you're in a public place.

9. Which one of these shows why a DNS cache poisoning attack is dangerous?

Answers

·        It lets attackers access a site’s database and cause damage by using database commands.

·        It allows an attacker to remotely control your computer.

·        It’s not actually dangerous.

·        It allows an attacker to redirect targets to malicious web servers.

Explanation: An attacker will perform a DNS cache poisoning attack in which they will modify the data stored in a DNS cache on a DNS resolver in order to provide inaccurate information. If clients cache this inaccurate information and utilize it, it might lead to users being sent to malicious websites, which may compromise the users' security as well as their privacy. It is a cunning method of diverting traffic and causing damage without the users being aware that they are being tricked.

10. Which of the following is true of a DDoS attack?

Answers

·        This type of attack is used to steal a token and hijack a session.

·        The attack is used to redirect web traffic to sites run by attackers.

·        The attack traffic comes from lots of different hosts.

·        The attack comes from one source sending a flood of SYN packets.

Explanation: An effort known as a Distributed Denial of Service (DDoS) assault is designed to interfere with the typical operation of a computer network, online service, or website by inundating it with an excessive volume of traffic coming from a number of different sources. The targeted computer system or network must be rendered inaccessible to the users for whom it was designed. DDoS assaults may vary in scope and methodology, but they always entail a concerted attempt to overwhelm the target with traffic in order to make it unusable, unresponsive, or sluggish. This can make it impossible for the target to function at all.

11. Which one of the following results from a denial-of-service attack?

Answers

·        Service unreachable

·        Email address theft

·        Data destruction

·        Malware infection

Explanation: An attempt to deny a service, also known as a denial-of-service attack (DoS), is made with the intention of interfering with the typical operation of a computer system, network, or service. This may result in the temporary or permanent cessation of such services. The attack floods the target with traffic or exploits vulnerabilities, making it difficult or impossible for genuine users to use the services offered by the targeted system. The attack may either exploit vulnerabilities or flood the target with traffic.

12. Which of these describes a rogue AP attack?

Answers

·        An attacker uses a form of malware to perform admin level modification to a victim’s operating system.

·        A user tries to get to a service, but the service can’t be reached because an attacker has overloaded it with packets

·        An employee at a company plugs a router into the company network to make a simple wireless network. An attacker standing outside the building takes advantage of this and goes onto the wireless network.

·        Company employees think they are connecting to the company network, but they are connecting to a fake, identical network controlled by an attacker.

Explanation: An illegal construction of a wireless access point inside a network is the basis of a kind of attack known as a rogue AP (Access Point). This may put the security of the network at risk since it creates a point of entry for malicious users to exploit in order to obtain unwanted access to the network or to intercept and alter data. It is a stealthy method that attackers may use to exploit vulnerabilities and perhaps conduct further assaults inside a network that has already been hacked.

13. How can you protect against client-side injection attacks? Check all that apply.

Answers

·        Use a SQL database

·        Use data sanitization

·        Utilize strong passwords

·        Use input validation.

14. An attacker uses software that continuously tries different combinations of characters to gain access to something password protected. What kind of attack is this?

Answers

·        A brute-force attack

·        A POD (Ping of Death) attack

·        A dictionary attack

·        A baiting attack

Explanation: An assault of this kind is referred to as a "Brute Force Attack." When conducting a brute force attack, the attacker will repeatedly and methodically try each and all conceivable character combinations (such as passwords) until the proper one is discovered. The procedure is simple yet time-consuming, and its efficacy is determined by aspects such as the degree to which the password is complicated and how long it is. The use of robust, convoluted passwords and the implementation of account lockout rules may be effective means of defending against brute force assaults.

15. Which of these are devices that let employees enter buildings and restricted areas and access secured computer systems at any time, day or night?

Answers

·        Door locks

·        Equipment locks

·        Badge readers

·        Bollards

Explanation: It is common practice to refer to "Access Control Systems" or simply "Access Cards/Keycards" when referring to the devices that allow personnel unrestricted entry into buildings and other restricted locations as well as anytime access to protected computer systems. These systems may regulate and monitor access to a variety of physical and digital places inside an organization by using physical cards, key fobs, or even biometric data as a form of identification.

16. Two people arrive at a building saying they are repair workers. An employee trusts them and lets them in. As soon as they have access to the building, they hack into a computer and steal confidential information. What kind of attack is this?

Answers

·        A tailgating attack

·        A spoofing attack

·        A zero day vulnerability attack

·        A phishing attack

Explanation: This hypothetical situation illustrates a social engineering tactic known as a "Pretexting Attack." In the assault technique known as pretexting, the adversary concocts a made-up situation or pretext with the intention of misleading others into granting access to sensitive information or systems. In one instance, the attackers claimed to be maintenance personnel in order to obtain physical entry to the facility. Once they were there, they used the access they had gained by hacking into a computer in order to take private information. It is a misleading strategy that takes advantage of people's confidence in one another and often entails coercing individuals into engaging in behaviors that undermine security.

17. Which of these is an XSS (Cross-site scripting) injection attack?

Answers

·        An attack where attackers fool an employee into letting them into a restricted area or building

·        An attack that targets a whole website and uses database commands to delete or steal data and run other malicious commands

·        An attack that overloads a system with ICMP echo requests to overwhelm it, and to prevent legitimate users from accessing it.

·        An attack that inserts malicious code into a website and targets the users of a service

Explanation: An XSS injection attack is one in which malicious scripts are inserted into a website in an attempt to compromise its security. When users visit a website that has been infiltrated, the browsers on those users' computers run these malicious scripts without their knowledge. This gives the attacker the ability to steal information, modify online content, or carry out other harmful acts in the user's name. It is a typical example of a flaw in the security of websites.

 

18. An IT professional makes a backup of critical information from a company’s system so it can still be accessed if the system is attacked. Which key principle for designing information security policies does this represent?

Answers

·        The availability principle

·        The intelligence principle

·        The risk principle

·        The integrity principle

Explanation: The "Data Backup and Recovery" concept is the most important thing to keep in mind while creating information security policies, as shown by this example. A vital component of information security is the creation of backups of important data in order to guarantee that data can be recovered in the event that a system fails, a cyber attack is launched, or any other unanticipated event takes place. This preventative precaution ensures that essential data will always be accessible and will not be tampered with.

19. Which of the following is true of black hat and white hat hackers?

Answers

·        Black hats are malicious. White hats identify weaknesses to help mitigate threats.

·        Black hats try to find weaknesses, but white hats don’t.

·        Neither black hats nor white hats can be trusted.

·        Black hats work with owners to fix problems. White hats just try to get into a system.

Explanation: Black hat hackers are persons who utilize their hacking talents for evil goals, such as exploiting vulnerabilities, stealing data, or causing damage to computer systems. They are distinguished from white hat hackers by their employment of a black hat. White hat hackers, on the other side, are ethical hackers that utilize their expertise for lawful and defensive objectives. White hat hackers are often engaged to test and enhance the security of systems. They are working to identify vulnerabilities and implement fixes, which will improve cybersecurity overall. The primary distinction resides in their goals as well as the moral implications of the activities they choose to do.

20. After a user downloads a free software product, the computer’s browser automatically opens and jumps to random product pages. What kind of malicious software is this?

Answers

·        Adware

·        A worm

·        A Keylogger

·        A rootkit

Explanation: This behavior is very suggestive of a piece of malicious software that is referred to as "Adware." Adware is software that shows adverts that the user does not wish to see. These advertisements often appear in the form of pop-up windows or by diverting the user's browser to websites that offer various products or services. It is generally distributed along with free software or is downloaded without the user's knowledge. Adware is software that is meant to make cash for its authors by presenting advertisements to users; nevertheless, the experience of using adware may be annoying and obtrusive to the user.

21. An unhappy systems administrator installed malware that attacked after a timed event, rather than when it was installed. What type of malware does this describe?

Answers

·        Ransomware

·        A logic bomb

·        A rootkit

·        Spyware

Explanation: The predicament illustrates a kind of malicious software referred to as a "Logic Bomb." A logic bomb is a kind of malicious programming that is programmed to run only when a certain circumstance or event takes place, such as at a predetermined date and time. In this particular instance, the logic bomb went off as a consequence of a timed event, which may have been caused by the discontent of the systems administrator. Logic bombs are designed to cause disruption or harm to a system at a later, predetermined point in time. This is often their intended goal.

22. A victim connects to a network they think is legitimate, but the network is really an identical network controlled by a hacker. What type of network attack are they a victim of?

Answers

·        A Denial of Service (DoS)

·        A logic bomb

·        An evil twin

·        DNS cache poisoning

Explanation: It is quite probable that a "Man-in-the-Middle" (MitM) assault is being carried out on the victim in this scenario. A "Man in the Middle" attack is one in which a hacker monitors and possibly modifies the communication that is taking place between two parties without either of them being aware of it. In this scenario, the victim connects to a network that they perceive to be genuine, but which is really controlled by the attacker. This gives the attacker the ability to intercept and influence the victim's communication since the network is controlled by the attacker.

23. Which type of network-based attack prevents legitimate users from accessing a system by overwhelming the network?

Answers

·        A brute force password attack

·        An injection attack

·        A Denial of Service (DoS) attack

·        A malware attack

Explanation: The term "Denial-of-Service" (DoS) refers to the sort of assault that is based on a network and stops authorized users from accessing a system by overloading the network. This form of attack is known as a "Denial-of-Service" attack. The goal of a denial of service attack (DoS) is to make it difficult or impossible for authorized users to access the resource that is the focus of the assault by flooding a network, system, or website with traffic. An assault is referred regarded as "Distributed Denial-of-Service (DDoS)" if it is organized and disseminated across numerous sources.

24. An attacker sends a large number of SYN packets, but does not send any ACK messages back. The connection stays open and uses up the source’s resources. What is this attack called?

Answers

·        A zero day exploit

·        A half-open attack

·        A DNS cache poisoning attack

·        A ping flood

Explanation: A "SYN Flood" attack is the name given to this particular kind of assault. The attacker in a SYN Flood attack will transmit a high number of SYN (synchronization) packets to a target server. However, the attacker will not finish the three-way handshake by providing the requisite ACK (acknowledgment) packets. This causes the target server to hold a large number of connections that are only partially open, which uses up its resources and may result in a denial-of-service attack in which genuine users are unable to make connections with the server.

25. Which of the following measures can prevent injection attacks? Select all that apply.

Answers

·        Data sanitization

·        Log analysis systems

·        Input validation

·        Flood guards


26. What kind of attack keeps trying different combinations of characters and letters until it gets password access to a system?

Answers

·        An Injection attack

·        A phishing attack

·        A dictionary attack

·        A brute force attack

Explanation: An assault of this kind is referred to as a "Brute Force Attack." An attacker will use brute force on a target when they have no other choice except to try every possible combination of characters, such as a password, until they succeed in guessing it. It is an easy procedure, but it takes a lot of time, and the success of it is contingent on variables such as the length and difficulty of the password. It is possible to reduce the danger of being subjected to a brute force assault by taking precautions such as putting in place account lockout rules and selecting robust and complicated passwords.

27. An email message tells a user there is a problem with the user’s bank account. The email directs the user to a login page that steals the user’s information. What is this called?

Answers

·        Phishing

·        Tailgating

·        Injection

·        Denial of Service

Explanation: A "Phishing" assault is the name given to this specific kind of cyberattack. Phishing is a sort of electronic assault in which the perpetrators send people misleading emails or messages in an effort to deceive the recipients into giving personal information such as usernames, passwords, or financial information. The email will often include a link that, when clicked, will take the user to a fake website that has been created to seem just like a real one. Once there, the user will unwittingly disclose their personal information, which will then be harvested by the cybercriminals. It's a sort of social engineering that involves taking advantage of people's confidence in one another and manipulating them into divulging private information by using deception.

 

Shuffle Q/A 1


28. Which of the following is an example of the CIA triad’s confidentiality principle in action?

Answers

·        Preventing an unwanted download

·        Making sure data hasn’t been tampered with

·        Protecting online accounts with a password

·        Preventing data loss

Explanation: An example of the idea of secrecy being put into practice is the encrypting of sensitive client data. The data is protected against unauthorized access and can only be read by those who have been given the correct decryption key thanks to the use of encryption. This contributes to the protection of the confidentiality of the information and helps to stop illegal access to sensitive data.

29. Which of the following is an example of a zero-day vulnerability?

Answers

·        A user accidentally loads malware onto a computer that logs the user’s keypresses and uses them to get confidential information.

·        After a user downloads and starts a piece of software, it starts showing ads and collecting data.

·        A group of hackers finds a flaw in a new software product and takes advantage of it before the vendor or developer finds it.

·        A user voluntarily downloads a piece of software hoping it will be useful, but instead it lets hackers access the user’s computer.

Explanation: 
A security defect or problem in software is referred to as having a zero-day vulnerability when it is exploited by attackers before the program manufacturer provides a patch or remedy for the issue. The term "zero-day" refers to the fact that there is no defense available on the day when the vulnerability is found, and so there are zero days of protection. In this circumstance, the vulnerability was only recently found, and the software vendor has not yet released a patch or remedy for it; as a result, it is considered a zero-day vulnerability.

30. What kind of malware can block access to data and decrease the availability of security by holding the system hostage?

Answers

·        Spyware

·        A logic bomb

·        Ransomware

·        Adware

Explanation: Ransomware is a kind of malicious software that may prevent users from gaining access to their data and reduce the level of protection that is available to them by taking the system hostage. A kind of malicious software known as ransomware is malware that encrypts the data of a victim and then demands a ransom payment in return for the key to decode the files. The data of the victim is essentially held hostage and rendered unavailable until the ransom is paid or alternate recovery measures are used.

31. What is it called when a hacker gets into a system through a secret entryway to gain remote access to the computer?

Answers

·        Ransomware

·        A backdoor

·        Adware

·        A Trojan

Explanation: The process of a hacker gaining illegal access to a system by means of a hidden entrance in order to acquire remote control or access to the computer is generally referred to as "Backdoor Access" or simply "Backdooring." Unauthorized users are able to get access to a system via the use of a "backdoor," which is a covert route that sidesteps the typical authentication process. Hackers may take advantage of security flaws or install backdoors in order to keep access for use in future nefarious operations.

32. Which of the following best helps you strengthen your password?

Answers

·        Use passwords from a precompiled list

·        Incorporate symbols, numbers, and capital letters

·        Choose the name of a favorite movie as a password

·        Use the name of a beloved pet as a password

Explanation: Utilizing a mix of capital and lowercase letters, numbers, and special characters is required in order to generate a secure password. Because of the password's complexity, it is more resistant to assaults using brute force, which in turn boosts the password's overall security. In addition, it is vital to steer clear of information that may be guessed readily, such as words, names, or patterns that are sequential in nature. In order to produce a password that is both difficult and distinct, as this will increase the password's level of security.

33. An attacker leaves a flash drive loaded with malware on a table. Someone plugs the drive into their computer to see what’s on it and accidentally installs malware. What kind of attack is this?

Answers

·        Baiting

·        DDoS

·        Phishing

·        Tailgating

Explanation: The term "USB drop attack" or "USB baiting" is widely used to refer to this form of cyberattack. In this version of the assault, the perpetrator plants a USB flash drive that is infected with malware in an area where it is likely to be discovered by an inquisitive person. When an unwary individual connects the drive into their computer to examine its contents, they unwittingly launch the malicious software, which leads to an unintended infection of their system.

It is a method of social engineering that takes use of human inquisitiveness and relies on people's innate propensity to examine newly found things and engage with them. The assault takes advantage of the widespread confidence that people have in media that may be removed, which makes it a possible security issue.


34. What's the difference between a virus and a worm?

Answers

·        Worms replicate through files, but viruses live on their own.

·        Viruses do not replicate, but worms do.

·        Worms replicate, but viruses do not.

·        Viruses replicate through files, but worms live on their own.

Explanation: When it comes to the realm of computer dangers, viruses and worms may be thought of as distant relatives. Both pieces of software are dangerous, yet they cause problems in different ways and propagate in distinctive ways.

A computer virus might be thought of as a digital hitchhiker. It then waits for a user to access or execute the genuine application or file that it has attached itself to, after which it deletes itself. After it has been triggered, the virus will begin to multiply and will move to other files and applications, where it will attempt to corrupt or damage them.

On the other hand, a worm is more self-sufficient and takes the initiative more often. It is not necessary for there to be a host software for it to attach onto. Instead, it replicates and spreads itself by taking advantage of flaws in the operating system of a computer or the network that it is connected to. Worms are capable of moving via several networks and systems, which may result in broad infections.


35. An employee at a company plugs a router into the corporate network to make a simple wireless network. An attacker outside the building uses it to get access to the corporate network. What is the name of this type of attack?

Answers

·        SYN flood attack

·        A rogue AP (Access Point) attack

·        A Denial-of-Service (DoS) attack

·        A DNS cache poisoning attack

Explanation: An assault known as a "Rogue Access Point" explains the current scenario. In this scenario, the worker does not intend to bring a potentially harmful router, known as a rogue access point, onto the business network. The threat to the company's network's safety is posed by the attacker who is located outside the building and who uses this illegal access point to gain entry into the network. Attackers may take use of rogue access points in order to obtain illegal access to the business network, intercept sensitive information, or launch further assaults against the network.

36. Which of the following can occur during a ping of death (POD) attack? Select all that apply.

Answers

·        Phishing

·        Baiting

·        A buffer overflow

·        Execution of malicious code

Explanation: A Ping of Death (POD) attack is carried out by sending an Internet Control Message Protocol (ICMP) packet to the system that is being attacked that is either too large or corrupted. The objective is to find and exploit weaknesses in the manner that the target system deals with packets of this kind.

37. What is it called when a hacker takes down multiple services very quickly with the help of botnets?

Answers

·        Distributed denial-of-service (DDoS)

·        Cross-site Scripting (XSS)

·        A SQL injection

·        A password attack

Explanation: It is often referred to as a "Distributed Denial of Service" (DDoS) attack when a hacker brings down numerous services all at once with the assistance of botnets. In a distributed denial of service assault, the attacker will employ a botnet, which is a network of computers that have been hacked, to bombard the system, network, or service that is the intended victim with an excessive quantity of traffic. This influx of traffic might result in a significant decrease in the performance of the target, or even in the target being completely unavailable, which prevents access for users who are authorized to use it.

Because of the spread nature of the assault, which involves several devices that have been infiltrated, it is more difficult to find a single source and find a solution to the problem. The purpose of a distributed denial of service assault (DDoS) is often to cause disruption to services, financial losses, or to make a statement.


38. If a hacker targets a vulnerable website by running commands that delete the website's data in its database, what type of attack did the hacker perform?

Answers

·        Cross-site Scripting (XSS)

·        SQL injection

·        A dictionary attack

·        A Denial-of-Service (DoS) attack

Explanation: A "SQL Injection" attack is a typical name for the sort of assault that you are describing, which occurs when a hacker executes instructions in order to remove a website's data that is stored in its database. Structured Query Language is a language that is used for maintaining and manipulating databases. SQL is the abbreviation for this language. An SQL Injection attack is one in which the attacker takes advantage of weaknesses in the website's code by inserting malicious SQL code into input fields or parameters on the website being attacked.

An attacker may get access to the website's database by altering the input in such a manner that it results in the execution of undesired SQL instructions. In the scenario that you described, the attacker is executing instructions that remove data from the database, which might result in the loss of data as well as an interruption to the functioning of the website. In order to avoid SQL Injection vulnerabilities, web developers need to incorporate effective input validation and parameterized queries. SQL Injection vulnerabilities are a major threat to website security.


39. Fill in the blank: Phishing, spoofing, and tailgating are examples of ________ attacks.

Answers

·        Network

·        Social engineering

·        Malware

·        Injection

Explanation: Attacks that fall under the category of "social engineering" include phishing, spoofing, and tailgating. The term "social engineering" refers to the practice of coercing someone into exposing sensitive information, carrying out acts, or committing security errors via manipulation. Attacks like this often take advantage of human psychology and trust in order to obtain illegal access or collect sensitive information.

 

Shuffle Q/A 2

40. In the terminology of information security, what is a vulnerability?

Answers

·        The possibility of suffering a loss in the event of an attack

·        A program that entices users to download it, then installs malware on their systems

·        A piece of malware that records each keypress by the user and gathers confidential information

·        A flaw in the code of an application that can be exploited

Explanation: A vulnerability is a weakness or defect in a system, application, network, or process that might be exploited by a threat in order to compromise the security of the system. In the vocabulary of information security, a vulnerability refers to a weakness or flaw in a system. Software, hardware, settings, and even human factors may all be sources of vulnerabilities in a system. The exploitation of these vulnerabilities may result in security breaches, illegal access, data leaks, or a variety of other unfavorable outcomes.

Information security experts actively seek to find, analyze, and mitigate vulnerabilities inside a system or organization in order to lower the risk of such vulnerabilities being exploited and improve the overall security posture of the system or organization. This procedure often include doing routine security audits, patching and upgrading software, and putting in place best practices in order to address any possible vulnerabilities.


41. What is a tool that protects passwords by checking whether the input is coming from a machine or a human?

Answers

·        A firewall

·        A CAPTCHA

·        A key logger

·        Antimalware software

Explanation: 
The acronym "CAPTCHA" stands for "Completely Automated Public Turing test to tell Computers and Humans Apart." A "CAPTCHA" is a tool that secures passwords by determining if the input is coming from a computer or a person. Challenges known as CAPTCHAs are given in a variety of formats, including distorted text, picture recognition, and riddles, and are designed to be simple for humans to complete while remaining challenging for automated programs, often known as bots.

CAPTCHAs are designed to prevent automated scripts or bots from exploiting online services, notably in situations such as account registration, attempted logins, or the submission of forms. Websites may add an extra degree of security by asking users to complete a CAPTCHA in order to verify that the interaction was not started by an automated program but rather by a real person. This helps to prevent malicious bots from taking over websites.

42. Which one of the following is a type of DoS attack?

Answers

·        A brute force attack

·        A rogue AP attack

·        A SYN flood attack

·        A DNS cache poisoning attack

Explanation: The "Ping Flood" option that you supplied is an example of a Denial of Service (DoS) attack. An attacker may launch a Ping Flood attack on a target system by sending it an overwhelming amount of ping requests. This causes the target system's network resources to be depleted and results in a denial of service for legitimate users. The objective is to overwhelm the target with so much traffic that it either stops responding to genuine requests or takes an excessively long time to do so.

Post a Comment

Previous Post Next Post