250+ Understanding Attack Vectors part-11

Que.Which of the following is not an example or type of phishing?
a. Spear phishing
b. Deceptive phishing
c. Whaling
d. Monkey in the Middle
Que.Which of the following is not an example or type of phishing ?
a. Tracking
b. Vishing
c. Smishing
d. Pharming
Que._____________ is data interception method used by hackers.
a. Phishing
b. DoS
c. Sniffing
d. MiTM
Que.Sniffing is also known as ___________________
a. network-tapping
b. wiretapping
c. net-tapping
d. wireless-tapping
Que._____________ are programs or devices that capture the vital information from the target network or particular network.
a. Routers
b. Trappers
c. Wireless-crackers
d. Sniffers
Que.Which of them is not an objective of sniffing for hackers?
a. Fetching passwords
b. Email texts
c. Types of files transferred
d. Geographic location of a user
Que.Which of the following tech-concepts cannot be sniffed?
a. Router configuration
b. ISP details
c. Email Traffic
d. Web Traffic
Que.Which of the following tech-concepts cannot be sniffed ?
a. Cloud sessions
b. FTP passwords
c. Telnet passwords
d. Chat sessions
Que.Which of the below-mentioned protocol is not susceptible to sniffing?
a. HTTP
b. SMTP
c. POP
d. TCP
Que.Which of the below-mentioned protocol is not susceptible to sniffing ?
a. NNTP
b. UDP
c. FTP
d. IMAP