250+ Understanding Attack Vectors part-23

Que.______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet.
a. DNS poisoning
b. DNS re-routing
c. DNS cracking
d. Domain link poisoning
Que.DNS poisoning is very dangerous because it can extend its reach from one ___________ to another.
a. ISP server
b. DNS server
c. Linux server
d. Domain user
Que.A _________________ can be poisoned if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of information on it.
a. Server data
b. Domain name
c. DNS cache
d. System file
Que.The ____________ Domain Name Server data will get spread to the ISPs & will be cached there.
a. working
b. compromised
c. corrupted
d. poisoned
Que.The user could be influenced by DNS hijacking if the government of that country uses DNS redirecting as a mechanism to mask censorship.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Which of the following data is not appropriate here, if you delete cache, cookies, and browser history?
a. Address bar predictions
b. Saved passwords
c. Browser plug-ins
d. Shopping cart content
Que.____________ are tiny files which get downloaded to your system when you visit a website.
a. Cookies
b. Caches
c. Bots
d. Crawlers
Que.Browser ___________ are impermanent internet files which helps the browsers download web images, data & documents for rapid performance & viewing in the future.
a. plug-ins
b. cache
c. ad-on
d. history
Que.___________ is just a group of data downloaded for helping in displaying a web page faster.
a. plug-ins
b. cache
c. ad-ons
d. history
Que.Attackers could steal ___________ to achieve illegitimate accessing to online accounts & disturbs the personal information.
a. plug-ins
b. cache
c. cookies
d. history