Professional Documents
Culture Documents
2. Identify the oldest phone hacking technique used by hackers to make free calls.
A. Spamming
B. Phreaking
C. Cracking
D. Phishing
3. Choose among the following techniques, which are used to hide information inside a
picture.
A. Image rendering
B. Steganongraphy
C. Rootkits
D. Bitmapping
5. Which software is mainly used to help users detect viruses and avoid them?
A. Antivirus
B. Adware
C. Malware
D. None of the above
10. A ____________ can be a hardware device or a software program that filters all
the packets of data that comes through a network, the internet, etc. // Firewall
11. Which of these is also malicious software?
a. Badware
b. Malicious Ware
c. Malware
d. Ilegalware
12. Using the cipher algorithm, which of these types of text would be transformed?
a. Plain text
b. Scalar text
c. Complex text
d. Transformed text
13. Which of the following malware types does not clone or replicate itself through
infection?
a. Viruses
b. Worms
c. Trojans
d. Rootkits
a) buffer-overrun
b) buffer-leak
c) memory leakage
d) data overflow
45. Which of the following is defined as an attempt to harm, damage or cause threat to a
system or network?
a) Digital crime
b) Threats
c) System hijacking
d) Cyber Attack
46. ____Virus__________ is a executable code that is attached to other executable files and
often legitimate program.
47. __Scareware____ is designed to persuade the user to take a specific action based on fear.
48. __Reverse Proxy Server_____placed in front of the webservers to protect, hide, offload
and distribute access to webservers.
49. ___RootKit____is designed to modify the operating system to create a backdoor.
50. _____Vishing_____________ use voice communication to try and gather private
information, such as login credentials, by masquerading as a reputable person.