Que.Existence of weakness in a system or network is called _______
|
a. Threat |
b. Vulnerability |
c. Exploit |
d. Attack |
Que.When any IT product, system or network is in need for testing for security reasons, then the term used is called _________
|
a. Threat |
b. Vulnerability |
c. Target of Evaluation |
d. Attack |
Que.An/A ________ is an act that violates cyber-security.
|
a. Threat |
b. Vulnerability |
c. Exploit |
d. Attack |
Que.________ is a way to breach the security by using the vulnerability of that system.
|
a. Threat |
b. Vulnerability |
c. Exploit |
d. Attack |
Que._________ is an act of hacking by the means of which a political or social message is conveyed.
|
a. Hacktivism |
b. Whistle-blowing |
c. Surveillance |
d. Pseudonymization |
Que._______ is the method of developing or creating a structurally similar yet unauthentic and illegitimate data of any firm or company.
|
a. Data copying |
b. Data masking |
c. Data breaching |
d. Data duplicating |
Que.Data masking is also known as _________
|
a. Data obfuscation |
b. Data copying |
c. Data breaching |
d. Data duplicating |
Que.________ automates an action or attack so that repetitive tasks are done at a faster rate.
|
a. Auto-bots |
b. Cookie-bots |
c. Robots |
d. Bots |
Que.Backdoors are also known as ____________
|
a. Trap doors |
b. Front doors |
c. Cover doors |
d. Back entry |
Que.Adware are pre-chosen _______ developed to display ads.
|
a. banner |
b. software |
c. malware |
d. shareware |