Que.___________ is a type of DoS threats to overload a server as it sends a large number of requests requiring resources for handling & processing.
|
a. Network Layer DoS |
b. Physical Layer DoS |
c. Transport Layer DoS |
d. Application Layer DoS |
Que.Which of the following is not a type of application layer DoS?
|
a. HTTP flooding |
b. Slowloris |
c. TCP flooding |
d. DNS query flooding |
Que.Network layer attack is also known as ________________
|
a. Layer3-4 DoS attack |
b. Layer5 DoS attack |
c. Layer6-7 DoS attack |
d. Layer2 DoS attack |
Que.Which of the following do not comes under network layer DoS flooding?
|
a. UDP flooding |
b. HTTP Flooding |
c. SYN flooding |
d. NTP Amplification |
Que.DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per second (PPS).
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network infrastructures.
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.
|
a. Phishing attack |
b. DoS attack |
c. Website attack |
d. MiTM attack |
Que.In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.
|
a. URL Redirection |
b. DoS |
c. Phishing |
d. MiTM attack |
Que.Phishers often develop ______________ websites for tricking users & filling their personal data.
|
a. legitimate |
b. illegitimate |
c. genuine |
d. official |
Que.Which of the following type of data, phishers cannot steal from its target victims?
|
a. bank details |
b. phone number |
c. passwords |
d. apps installed in the mobile |
apps installed in the mobile