Home » Cyber Security » Understanding Attack Vectors
Que.Botnets are not the logical connection of which of the following? a. Smart-phones b. IoT devices c. Computer systems d. Modems
Que.Infected computers and other systems within the botnet are called __________ a. killers b. vampires c. zombies d. gargoyles
Que.The bot program allows the bot-herders to perform all operations from a ___________ location. a. local b. open c. corporate d. remote
Que.Nowadays, most botnets rely on existing _______________ networks for communication. a. server-to-server b. peer-to-peer c. client-to-server d. host-to-server
Que.Which of the following is not an example of a botnet program? a. Zeus b. GameOver c. ZeroAccess d. MyDoom
Que.Which of the following is an example of Botnet? a. Zeus b. ILOVEYOU c. Storm Worm d. MyDoom
Que.Which of the following is an example of a Botnet program? a. Slammer b. GameOver c. Stuxnet d. Anna Kournikova
Que._______________deals with the protection of an individual’s information which is implemented while using the Internet on any computer or personal device. a. Digital agony b. Digital privacy c. Digital secrecy d. Digital protection
Que._______________ is a combined term which encompasses 3 sub-pillars; information privacy, individual privacy, and communication privacy. a. Digital Integrity b. Digital privacy c. Digital secrecy d. Digital protection
Que.Which of the following do not comes under the three pillars of digital privacy? a. Information privacy b. Individual privacy c. Communication privacy d. Family privacy