250+ Understanding Attack Vectors part-9

Que.___________ is a type of DoS threats to overload a server as it sends a large number of requests requiring resources for handling & processing.
a. Network Layer DoS
b. Physical Layer DoS
c. Transport Layer DoS
d. Application Layer DoS
Que.Which of the following is not a type of application layer DoS?
a. HTTP flooding
b. Slowloris
c. TCP flooding
d. DNS query flooding
Que.Network layer attack is also known as ________________
a. Layer3-4 DoS attack
b. Layer5 DoS attack
c. Layer6-7 DoS attack
d. Layer2 DoS attack
Que.Which of the following do not comes under network layer DoS flooding?
a. UDP flooding
b. HTTP Flooding
c. SYN flooding
d. NTP Amplification
Que.DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per second (PPS).
a. True
b. False
c. May be True or False
d. Can’t say
Que.A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network infrastructures.
a. True
b. False
c. May be True or False
d. Can’t say
Que.______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.
a. Phishing attack
b. DoS attack
c. Website attack
d. MiTM attack
Que.In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.
a. URL Redirection
b. DoS
c. Phishing
d. MiTM attack
Que.Phishers often develop ______________ websites for tricking users & filling their personal data.
a. legitimate
b. illegitimate
c. genuine
d. official
Que.Which of the following type of data, phishers cannot steal from its target victims?
a. bank details
b. phone number
c. passwords
d. apps installed in the mobile