Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is not an anti-spam technique?(a) Reputation control(b) Sender policy framework(c) DNS-based block-list(d) Domain-based blockingI had been asked this question during an internship interview.The query is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (d) Domain-based blocking

For explanation I would say: The techniques used in DROPPING the spamming of unwanted messages and emails. Reputation CONTROL, SENDER policy framework, DNS-based block-list are some of the anti-spamming techniques.

2.

Which of the following is not an anti-spamming tool or system?(a) Spam-Eater Pro(b) SpyTech Spam Agent(c) SpamExperts Desktop(d) Anti-spyware TechThis question was posed to me in an international level competition.Enquiry is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (d) Anti-spyware Tech

To EXPLAIN: Some anti-spamming TOOLS and SYSTEMS that can be used for PREVENTING your email from spamming are Spam-Eater Pro, SpyTech Spam Agent, SpamExperts DESKTOP etc.

3.

___________ is a tool used as spam filter in association with email programs and automatically intercepts spam emails.(a) Nessus(b) SpamExpert Desktop(c) Spam-Rescurer(d) Burp-SuiteThis question was addressed to me at a job interview.My doubt stems from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (B) SpamExpert Desktop

To elaborate: SpamExpert Desktop is a tool used as a spam filter in ASSOCIATION with EMAIL programs and AUTOMATICALLY intercepts spam emails. It is not keyword DEPENDENT for detecting spams; rather it checks the email content.

4.

Which of the following is not an anti-spam technique?(a) Signature-based content filtering(b) DNS routing(c) Bayesian Content Filtering(d) Collaborative content filteringThis question was addressed to me in examination.My question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»
5.

Which of the following is not a bulk emailing tool?(a) Wireshark(b) Sendblaster(c) Direct Sender(d) HotmailerThe question was posed to me by my school teacher while I was bunking the class.My query is from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (a) Wireshark

Easy explanation: There are tools and APPLICATIONS USED for sending spams and emails in a huge number for flooding the recipient’s inbox with unwanted emails. SENDBLASTER, direct Sender, hotmailer are examples of BULK emailing TOOL.

6.

Which of the following is not a bulk emailing tool?(a) Fairlogic Worldcast(b) 123 Hidden sender(c) YL Mail Man(d) NetCutThe question was posed to me during an interview for a job.Origin of the question is Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»
7.

Which of the following is not a type of spamming attack?(a) Page-jacking(b) Image spamming(c) Spear phishing(d) Blog & wiki spammingThis question was addressed to me at a job interview.This key question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Correct OPTION is (c) Spear phishing

The explanation: Spear phishing is not an example of a spamming ATTACK. HIDDEN text & links, double-tags, cloaking, blog & wiki SPAMS, image spamming, and page-jacking are types of spamming attack.

8.

There are _______ types of spamming.(a) 3(b) 4(c) 5(d) 6I have been asked this question in class test.This intriguing question comes from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Right ANSWER is (d) 6

For EXPLANATION I WOULD say: Spam attack populates the mail-box of any victim with unwanted emails. There are 6 types of spamming attack. These are by hidden text and LINKS, double-tags, cloaking, blog & wiki spams, image spamming, and page-jacking.

9.

There are ___________ major ways of spamming.(a) 4(b) 2(c) 3(d) 5I have been asked this question in final exam.The origin of the question is Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (b) 2

The best explanation: There are two major WAYS of spamming. First, by Usenet spam, where a single message is sent to more than 50 recipients or more Usenet NEWSGROUP, which has become old form of attack. The second one is by email-spam which target individual users and TOOLS are used to send spams directly to them.

10.

Which of the following is not a proper way of how spammers get the email Ids?(a) When a user registers to online services, blogs, and sites(b) Databases formed by spiders fetching email Ids from different sources(c) From offline form fill-up documents(d) Online ad-tracking toolsThe question was asked in an online quiz.My query is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct CHOICE is (c) From offline form fill-up documents

To explain: Spammers can get email IDs from sources such as data when a user REGISTERS to online services, blogs, and sites, databases formed by SPIDERS fetching email Ids from different sources, online ad-tracking tools, email-ID extraction tools, spyware and cookies ETC.

11.

Which of the following is not a technique used by spanners?(a) Spoofing the domain(b) Sending attached virus in spams(c) Junk tags associated with spam-emails(d) Making important deals through such emailsThe question was asked during an interview.My query is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (d) MAKING important deals through such emails

Easiest explanation: Spoofing the DOMAIN, sending attached VIRUS & junk tags associated with spam-emails are some of the techniques USED by spammers. Spam is one of the popular attack techniques.

12.

___________ are used which crawl web pages looking for email Ids and copies them to the database.(a) Caches(b) Cookies(c) Bots(d) SpidersI had been asked this question in my homework.Asked question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (d) Spiders

The best explanation: Spiders also KNOWN as crawlers are used which crawl different WEB pages looking for email Ids and copies them to the database. These EMAILS are collected together and used for the purpose of spamming.

13.

_________________ technique is also used in product advertisement.(a) Phishing(b) Cookies(c) e-Banners(d) SpammingThe question was asked in class test.I'd like to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (c) e-Banners

For explanation I would SAY: Spamming ATTACK over-fills the mail box of the target victim with UNWANTED spontaneous emails. The technique is also USED in PRODUCT advertisement through mass mailing.

14.

______________ is populating the inbox of any target victim with unsolicited or junk emails.(a) Phishing(b) Spamming(c) Hooking(d) DoSThis question was addressed to me in final exam.I need to ask this question from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer» CORRECT answer is (b) Spamming

To explain: Spamming is populating the inbox of any TARGET victim with unsolicited or junk emails. These junk emails may contain malicious COMPUTER programs that may HARM the recipient.
15.

Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security.(a) True(b) FalseI have been asked this question by my college professor while I was bunking the class.My question is based upon Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (a) True

The best I can EXPLAIN: Different SOCIAL media services OFFER tips as of how to use their services and site, still maintaining a high altitude of security. EVERY user must use those links to educate themselves and LEARN various features towards social-media security.

16.

Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media.(a) True(b) FalseThe question was posed to me in an interview for job.My query is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (a) True

The BEST I can EXPLAIN: SCANNING your system and destroying suspicious files can reduce risks of data compromise or LEAKAGE of compromised data over social media. There are different website caches and bots that GETS automatically downloaded to your system when you open different social-media sites and they store your sensitive data related to your social media account.

17.

Many social media sites and services provide _______________ for legitimate account verification.(a) Retina scanning(b) Fingerprint scanning(c) CAPTCHA(d) 2-step verificationI have been asked this question in a job interview.Enquiry is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (d) 2-step verification

For explanation: With 2-Step Verification (which is also KNOWN as 2-factor authentication), users can ADD an EXTRA layer of SECURITY to your account. After login, it asks for your existing phone number to send an OTP for layer-2 verification.

18.

Part of the social media sites are the various games & 3^rd party applications which helps ______________ to get access to your data.(a) ethical hackers(b) penetration testers(c) security auditors(d) cyber-criminalsThis question was posed to me in final exam.This is a very interesting question from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (d) cyber-CRIMINALS

The best I can explain: Part of the social media sites are the various games & 3^rd party applications which HELP cyber criminals to get ACCESS to your DATA. In this way, they can compromise your account or grab your valuable & confidential data.

19.

Strangers cannot cause much trouble if we connect to them over social media.(a) True(b) FalseI got this question in unit test.I'm obligated to ask this question of Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (b) False

The explanation: Strangers can cause huge trouble if we connect to them or chat with them without KNOWING exact details or whether the account is GENUINE or not. The STRANGER may send infected links which you might click and will redirect you to infected sites.

20.

Clicking on enticing Ads can cause trouble.(a) True(b) FalseI have been asked this question during an interview.I want to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (a) True

For explanation I would say: CLICKING on enticing Ads can cause trouble. Viruses & malware frequently find their mode of ENTERING onto the VICTIM computer through these annoying & enticing ads.

21.

If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation.(a) True(b) FalseI got this question during a job interview.The question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Right option is (a) True

For explanation: YES, there are script-kiddies or young-HACKERS who start their hacking career by cracking simple & weak PASSWORDS to enlighten their skills to others. These hackers may gain access to your social media accounts & can do some illicit or shameless ACT on BEHALF of your name to degrade your reputation.

22.

Increase your security for social media account by always ____________ as you step away from the system.(a) signing in(b) logging out(c) signing up(d) logging inI got this question during an interview.The above asked question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

The CORRECT OPTION is (b) logging out

The EXPLANATION is: Increase your security for social MEDIA account by always logging out as you step AWAY from the system. This will reduce both remote hacking as well as physical hacking.

23.

Keeping the password by the name of your pet is a good choice.(a) True(b) FalseThis question was posed to me in an interview for job.Enquiry is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (b) False

To elaborate: KEEPING the password by the name of your pet is not at all a good choice. Because they do social engineering & RESEARCH on different data ASSOCIATED with you as a VICTIM and will perform password guessing TECHNIQUES.

24.

Try to keep your passwords without meaning so that _____________ attack becomes almost impossible to perform successfully.(a) social engineering(b) phishing(c) password guessing(d) brute forceThis question was posed to me during an interview.This question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer» CORRECT choice is (c) password guessing

To elaborate: Try to KEEP your passwords without meaning so that password guessing ATTACK becomes ALMOST impossible to perform successfully. This will reduce the POTENTIAL to do both passwords guessing as well as dictionary attacks.
25.

________________ is a popular tool to block social-media websites to track your browsing activities.(a) Fader(b) Blur(c) Social-Media Blocker(d) Ad-blockerI got this question during an interview.My question is based upon Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (b) Blur

The BEST explanation: Blur is a free browser extension and a popular TOOL used to block social-media websites to track your browsing activities & PREVENT users from these surfing PATTERN stealers.

26.

Which of them is a proper measure of securing social networking account?(a) Never keep your password with any relevant names(b) Keep written records of your passwords(c) Keep records of your password in audio format in your personal cell-phone(d) Passwords are kept smaller in size to rememberThis question was addressed to me by my college director while I was bunking the class.Enquiry is from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Right option is (a) Never keep your PASSWORD with any RELEVANT names

To elaborate: Never keep your password with any relevant names because there are different types of HACKERS who either use password guessing TECHNIQUES or some of them are hard-working and they do social engineering and research on different data associated to the VICTIM.

27.

Which of the following is not an appropriate measure for securing social networking accounts?(a) Strong passwords(b) Link your account with a phone number(c) Never write your password anywhere(d) Always maintain a soft copy of all your passwords in your PCThe question was asked in an interview for job.The query is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer» RIGHT choice is (d) Always maintain a soft COPY of all your PASSWORDS in your PC

Explanation: ‘Always maintain a soft copy of all your passwords in your PC’ is not an appropriate MEASURE for securing your online accounts because, if your system got accessed by anyone or ANYBODY put spyware or screen-recording malware, then all your passwords will get revealed.
28.

____________ type of sites are known as friend-of-a-friend site.(a) Chat Messenger(b) Social networking sites(c) Tutorial sites(d) Chat-roomsI got this question in examination.The above asked question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

The CORRECT OPTION is (b) Social networking sites

For explanation I would say: Social networking sites are the most USED site which acts to connect people for social interaction. So USERS must keep their ACCOUNTS secure & safe from getting into wrong hands.

29.

Which of the following is the most viral section of the internet?(a) Chat Messenger(b) Social networking sites(c) Tutorial sites(d) Chat-roomsThis question was addressed to me in an interview for job.My doubt stems from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Correct ANSWER is (b) SOCIAL networking sites

The best explanation: Social networking sites are the most used sites and the most viral section of the internet. So users MUST KEEP their accounts SECURE and safe from getting into wrong hands.

30.

There are ____________ that are designed to track your browsing habits & aim ads that are relevant to the user.(a) plug-ins(b) cache(c) cookies(d) historyThis question was posed to me in an international level competition.My doubt is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer» CORRECT option is (C) COOKIES

Easy explanation: Cookies are tiny files which get DOWNLOADED to your system when you visit a website. There are cookies that are designed to track your browsing habits & aim ads that are relevant to the USER.
31.

Keeping browsing habits & aiming specific ads to you is harmless but it might reduce your online privacy.(a) True(b) FalseThe question was posed to me in an internship interview.My question comes from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (a) True

The best explanation: There are COOKIES that are designed to track your browsing habits & aim ads that are relevant to the USER. Keeping browsing habits & AIMING specific ads to users is harmless but it MIGHT reduce your ONLINE privacy.

32.

There are cookies that are designed to track your browsing habits & aim ads to you.(a) True(b) FalseI got this question during an internship interview.I'd like to ask this question from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Correct ANSWER is (a) True

Easiest EXPLANATION: Cookies are tiny files which get downloaded to your system when you visit a website. There are cookies that are DESIGNED to track your browsing habits & aim ads that are relevant to the USER.

33.

Which of the following is not an example of browsing data?(a) Forms and Search-bar data(b) Cache data(c) Downloading history(d) Start bar search dataThe question was asked in an internship interview.I'd like to ask this question from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (d) START bar search data

To elaborate: Attackers MAY target data such as forms and Search-bar data, cache & cookies data, BROWSING and download history records, ACTIVE logins and site PREFERENCES to steal user’s sensitive data.

34.

Attackers could steal ___________ to achieve illegitimate accessing to online accounts & disturbs the personal information.(a) plug-ins(b) cache(c) cookies(d) historyI have been asked this question in unit test.My question comes from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (c) cookies

The EXPLANATION is: Attackers COULD steal cookies to achieve illegitimate accessing ONLINE accounts & disturbs the personal information. Hence, clearing the browser’s cookies may eradicate data such as saved PASSWORDS and IDs as WELL as shopping cart contents.

35.

___________ is just a group of data downloaded for helping in displaying a web page faster.(a) plug-ins(b) cache(c) ad-ons(d) historyThis question was posed to me during a job interview.Origin of the question is Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (b) cache

Explanation: A cache is just a group of DATA downloaded for helping in DISPLAYING a web page faster. These files help the browsers DOWNLOAD web images, data & documents for rapid performance & VIEWING in the future.

36.

Browser ___________ are impermanent internet files which helps the browsers download web images, data & documents for rapid performance & viewing in the future.(a) plug-ins(b) cache(c) ad-on(d) historyThe question was posed to me in an interview for internship.Enquiry is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (b) cache

The best I can explain: BROWSER caches are impermanent INTERNET files that helps the BROWSERS download web images, data & documents for rapid performance & viewing in the FUTURE.

37.

____________ are tiny files which get downloaded to your system when you visit a website.(a) Cookies(b) Caches(c) Bots(d) CrawlersThe question was posed to me in an interview.The query is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right option is (a) Cookies

The best I can explain: Cookies are tiny files which GET downloaded to your SYSTEM when you visit a website. They are a very important PART of hacking and so clearing the browser’s cookies, cache & history may eradicate data such as address bar predictions, saved passwords and SHOPPING cart CONTENTS so that hackers don’t steal them.

38.

Which of the following data is not appropriate here, if you delete cache, cookies, and browser history?(a) Address bar predictions(b) Saved passwords(c) Browser plug-ins(d) Shopping cart contentI have been asked this question at a job interview.My question comes from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right ANSWER is (c) Browser plug-ins

To explain: Clearing the browser’s cookies, cache & history may eradicate data such as address BAR predictions, SAVED passwords and shopping cart contents. In this way, hackers won’t be ABLE to take your data through browser HACKING or cookie stealing.

39.

The ____________ Domain Name Server data will get spread to the ISPs & will be cached there.(a) working(b) compromised(c) corrupted(d) poisonedThe question was asked during an internship interview.This interesting question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (d) poisoned

Explanation: DNS cache poisoning is a KIND of attack which USES DNS based vulnerabilities for DIVERTING the traffic of the internet. The poisoned Domain Name Server data will get spread to the ISPs & will be cached there.

40.

A _________________ can be poisoned if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of information on it.(a) Server data(b) Domain name(c) DNS cache(d) System fileI got this question in exam.The question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (c) DNS cache

The explanation is: A DNS cache can be poisoned if it is having an erroneous entry where the invader gets to organize the DNS server & change DIFFERENT kinds of INFORMATION on it. DNS poisoning is very dangerous because it can EXTEND its REACH from one DNS server to another.

41.

The user could be influenced by DNS hijacking if the government of that country uses DNS redirecting as a mechanism to mask censorship.(a) True(b) FalseThis question was posed to me in final exam.The above asked question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

The CORRECT option is (a) True

Explanation: A DNS cache can be POISONED if it is having an erroneous entry where the invader gets to organize the DNS server & change different kinds of INFORMATION on it. The user COULD be influenced by DNS hijacking if the government of that country uses DNS redirecting as a MECHANISM to mask censorship.

42.

______________ which is also termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the internet.(a) DNS poisoning(b) DNS re-routing(c) DNS cracking(d) Domain link poisoningI got this question by my school teacher while I was bunking the class.Asked question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Correct choice is (a) DNS poisoning

The best EXPLANATION: DNS cache poisoning which is ALSO termed as DNS spoofing, is a kind of attack which uses DNS based vulnerabilities for diverting the traffic of the INTERNET away from genuine servers.

43.

DNS poisoning is very dangerous because it can extend its reach from one ___________ to another.(a) ISP server(b) DNS server(c) Linux server(d) Domain userI have been asked this question in an internship interview.Query is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (b) DNS server

The EXPLANATION: DNS poisoning which is also termed as DNS spoofing is a KIND of attack which uses DNS based vulnerabilities for diverting the traffic of the internet. DNS poisoning is very dangerous because it can EXTEND its reach from ONE DNS server to ANOTHER.

44.

A ______________ is essentially a text file residing on the server that hosts different domain containing entries for dissimilar resource records.(a) Zone file(b) Robot file(c) Bot file(d) DNS fileI had been asked this question in exam.This question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer» CORRECT answer is (a) Zone file

To explain: A Zone file is essentially a text file RESIDING on the server that hosts different DOMAIN containing entries for dissimilar RESOURCE records. It is used in DNS hijacking.
45.

Which of the following is not an example of DNS hijacking?(a) ISP DNS hijacking(b) DNS hijacking for phishing(c) DNS hijacking for pharming(d) HTTP-based DNS hackingThe question was asked in unit test.This intriguing question comes from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (d) HTTP-based DNS hacking

Best explanation: DNS hijacking is a FORM of nasty online attack in which a user gets redirects queries to a DNS because of OVERRIDE of system’s TCP/IP settings. ISP DNS hijacking, DNS hijacking for phishing, DNS hijacking for pharming are some of the examples of DNS hijacking attack.

46.

The _______________ matches and maps to the user friendly domain name.(a) HTTP(b) DNS(c) WWW(d) ISPI have been asked this question during an interview.My question comes from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (B) DNS

To explain I WOULD say: The DNS matches for DIRECTING the user-friendly domain name (like google.co.in) to its equivalent IP address. DNS servers are typically owned by any ISPs or other business ORGANIZATIONS.

47.

DNS trojans are used for performing a type of DNS hijacking.(a) True(b) FalseThe question was asked during an online exam.This key question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Right option is (a) True

To explain: DNS hijacking is a form of nasty online attack in which a user GETS redirects queries to a DNS because of override of system’s TCP/IP SETTINGS. There are TWO main types of DNS hijacking. These are by INFECTING the computer with MALWARE or DNS trojans.

48.

Some security issues might exist owing to misconfigured __________________ which can direct to disclosure of information regarding the domain.(a) DNS names(b) HTTP setup(c) ISP setup(d) FTP-unsecuredThis question was posed to me in a national level competition.This intriguing question comes from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (a) DNS names

To elaborate: Some security issues MIGHT EXIST owing to misconfigured DNS names which can DIRECT to disclosure of information REGARDING the domain. DNS adapts to HUMAN readable domain names.

49.

There are _________ main types of DNS hijacking.(a) 4(b) 2(c) 3(d) 5The question was posed to me during an interview.The origin of the question is Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (b) 2

For explanation I would say: There are TWO main types of DNS hijacking. These are by INFECTING the computer with malware or DNS trojans and the other TYPE is hacking the target website and changes its DNS ADDRESS.

50.

_____________ can be attained by the use of malware or by changing the server’s settings.(a) DNS poisoning(b) DNS cracking(c) DNS hijacking(d) DNS redirectingThis question was addressed to me in final exam.The origin of the question is Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer» CORRECT choice is (c) DNS hijacking

For explanation I would say: DNS hijacking is a form of nasty online attack in which a user gets redirects QUERIES to a DNS because of OVERRIDE of system’s TCP/IP settings. It can be attained by the use of MALWARE or by changing the server’s settings.