250+ Understanding Attack Vectors part-22

Que.__________ is a naming system given to different computers which adapt to human-readable domain names.
b. DNS
c. WWW
d. ISP
Que.DNS stands for _____________
a. Data Name System
b. Domain Name Server
c. Domain Name System
d. Domain’s Naming System
Que.Some security issues might exist owing to misconfigured __________________ which can direct to disclosure of information regarding the domain.
a. DNS names
b. HTTP setup
c. ISP setup
d. FTP-unsecured
Que.______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings.
a. DNS mal-functioning
b. DNS cracking
c. DNS redirecting
d. DNS hijacking
Que._____________ can be attained by the use of malware or by changing the server’s settings.
a. DNS poisoning
b. DNS cracking
c. DNS hijacking
d. DNS redirecting
Que.There are _________ main types of DNS hijacking.
a. 4
b. 2
c. 3
d. 5
Que.DNS trojans are used for performing a type of DNS hijacking.
a. True
b. False
c. May be True or False
d. Can’t say
Que.The _______________ matches and maps to the user friendly domain name.
b. DNS
c. WWW
d. ISP
Que.Which of the following is not an example of DNS hijacking?
a. ISP DNS hijacking
b. DNS hijacking for phishing
c. DNS hijacking for pharming
d. HTTP-based DNS hacking
Que.A ______________ is essentially a text file residing on the server that hosts different domain containing entries for dissimilar resource records.
a. Zone file
b. Robot file
c. Bot file
d. DNS file