My Report

Cyber Security Practice Test 8


Correct Answer: 2 points | Wrong: -1 point
Grades: A* (100% score) | A (80%-99%) | B (60%-80%) | C (40%-60%) | D (0%-40%)
advertisement

1. _____________ is data interception method used by hackers.

2. Which of the following tech-concepts cannot be sniffed?

3. A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.

4. ______________ was the first type of phishing where the phishers developed an algorithm for generating random credit card numbers.

5. CleanIISLog is not a hacking tool.

6. DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per second (PPS).

7. Which of the following type of data, phishers cannot steal from its target victims?

8. The __________________ protects your privacy by bouncing your connection and links around a distributed network over the globe run by volunteers. It gives three layers of anonymity.

9. Which of the following is not an example of web application hacking?

10. A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.


 

Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.