cyber security and element set 11

Que.Existence of weakness in a system or network is called _______
a. Threat
b. Vulnerability
c. Exploit
d. Attack
Que.When any IT product, system or network is in need for testing for security reasons, then the term used is called _________
a. Threat
b. Vulnerability
c. Target of Evaluation
d. Attack
Que.An/A ________ is an act that violates cyber-security.
a. Threat
b. Vulnerability
c. Exploit
d. Attack
Que.________ is a way to breach the security by using the vulnerability of that system.
a. Threat
b. Vulnerability
c. Exploit
d. Attack
Que._________ is an act of hacking by the means of which a political or social message is conveyed.
a. Hacktivism
b. Whistle-blowing
c. Surveillance
d. Pseudonymization
Que._______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.
a. Data copying
b. Data masking
c. Data breaching
d. Data duplicating
Que.Data masking is also known as _________
a. Data obfuscation
b. Data copying
c. Data breaching
d. Data duplicating
Que.________ automates an action or attack so that repetitive tasks are done at a faster rate.
a. Auto-bots
b. Cookie-bots
c. Robots
d. Bots
Que.Backdoors are also known as ____________
a. Trap doors
b. Front doors
c. Cover doors
d. Back entry
Que.Adware are pre-chosen _______ developed to display ads.
a. banner
b. software
c. malware
d. shareware