Search
English
Mon - Sat 10:00 AM - 09.00 PM
1st Floor, Sairaj Landmark, Savarkar Road, Tilakwadi, Belagavi
+91-70197 13085
Toggle navigation
Home
Courses
Contact Us
🛒
Sign up
Sign up
Log in
Home
Courses
Contact Us
🛒
Have a question?
Send enquiry
Message sent
Close
News & Events
Eyesec
>
Technology
>
Common Threads MCQS Test1
Common Threads MCQS Test1
October 10, 2024
Posted by:
Shiva
Category:
Technology
No Comments
Common Threads MCQS Test1
Submit quiz
Once you submit, you will no longer be able to change your answers. Are you sure you want to submit the quiz?
Cancel
Submit
Questions count:
10
Start Quiz
1.
What is the primary goal of a phishing attack? •
To physically damage the user’s device •
To trick the victim into providing sensitive information.
To overload a website with traffic •
To infect a device with a virus.
2.
Spear phishing differs from regular phishing in that: •
It targets a large group of people •
It only targets financial institutions •
It targets specific individuals or organizations •
It uses malware exclusively •
3.
What is one common sign of a phishing email? •
A legitimate company logo •
A request for personal information •
No links or attachments •
Sent from a corporate email address •
4.
The primary objective of a DoS attack is to: •
Steal sensitive information •
Deny users access to a system or network •
Create a backdoor into the system •
Install malware on a server•
5.
What is the difference between a DoS and a DDoS attack?
DoS attacks involve multiple devices, while DDoS attacks use a single device
DDoS attacks use multiple compromised devices to flood the target with traffic
DoS attacks are more common than DDoS attacks
There is no difference; both terms mean the same thing
6.
Which of the following is a type of DoS attack that involves sending oversized data packets to crash a system?
SYN Flood
Ping of Death
SQL Injection
Session Hijacking
7.
A man-in-the-middle attack typically occurs when: •
An attacker physically steals a device •
An attacker intercepts communication between two parties •
A server experiences a hardware failure •
Users share data on encrypted networks
8.
Which of the following is a common method attackers use to execute a MitM attack? •
Sending a phishing email •
Spoofing a public Wi-Fi network •
DDoS attacks •
SQL Injection
9.
How can users protect themselves from MitM attacks when using public Wi-Fi? •
Avoid using VPNs •
Use encrypted websites (HTTPS) •
Disable firewalls •
Only connect to unsecured networks
10.
What is the primary goal of an eavesdropping attack? •
To intercept and capture sensitive information •
To overload a server with traffic •
To delete data from a user’s device •
To install malware on the system
Submit quiz
1
2
3
4
5
6
7
8
9
10
Leave a Reply
Cancel reply
Sign In
The password must have a minimum of 8 characters of numbers and letters, contain at least 1 capital letter
Remember me
Sign In
Sign Up
Restore password
Send reset link
Password reset link sent
to your email
Close
Confirmation link sent
Please follow the instructions sent to your email address
Close
Your application is sent
We'll send you an email as soon as your application is approved.
Go to Profile
No account?
Sign Up
Sign In
Sign up
as instructor
Lost Password?