Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings.(a) DNS mal-functioning(b) DNS cracking(c) DNS redirecting(d) DNS hijackingI had been asked this question in an interview for internship.My question is based upon Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer» CORRECT ANSWER is (d) DNS hijacking

For explanation I would say: Misconfigured DNS names which can direct to disclosure of INFORMATION regarding the domain. DNS hijacking is a form of nasty ONLINE ATTACK in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings.
52.

__________ is a naming system given to different computers which adapt to human-readable domain names.(a) HTTP(b) DNS(c) WWW(d) ISPI had been asked this question in semester exam.Question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (b) DNS

Best EXPLANATION: DNS is a NAMING system given to different computers that adapt to human-readable DOMAIN names. For example, Google.co.in has a computer-readable IP address which is 8.8.8.8 & 8.8.4.4 as the PRIMARY & secondary DNS addresses.

53.

Which one is not an example of .Net application decompiler?(a) Salamander(b) Dis#(c) Decompiler.Net(d) MultiRipperI have been asked this question in an interview.This interesting question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (d) MultiRipper

The best I can explain: Decompilers are part of Reverse ENGINEERING tools that take an EXECUTABLE file as input and tries to GENERATE high-level code. MultiRipper is a Delphi and C++ decompiler. Salamander, Dis#, Anakrino & Decompiler.Net are .NET application decompilers.

54.

DNS stands for _____________(a) Data Name System(b) Domain Name Server(c) Domain Name System(d) Domain’s Naming SystemThis question was addressed to me in semester exam.I want to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (c) Domain Name System

Explanation: Domain Name System can be COMPARED to the PHONEBOOK of the WWW. Users’ access information over the web through these human readable domain NAMES. For example www.google.co.in gas computer-readable IP ADDRESS which is 8.8.8.8 & 8.8.4.4 as the PRIMARY & secondary DNS addresses.

55.

_______________ is a universal interactive program environment for reverse engineering.(a) TurboC(b) Andromeda Decompiler(c) IDAPro(d) PE ExplorerThe question was posed to me by my college professor while I was bunking the class.This interesting question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

The correct ANSWER is (b) Andromeda Decompiler

For explanation I would say: Andromeda Decompiler is a universal interactive program environment for REVERSE ENGINEERING. It is a popular interactive decompiler that tries to generate high-level CODE.

56.

REC stands for ________________(a) Reverse Engineering Compiler(b) Reverse Engineering Computer(c) Return-to-Code Engineering Compiler(d) Reversing Engineered CompilerI got this question during an online interview.This intriguing question originated from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct choice is (a) REVERSE Engineering Compiler

Explanation: Reverse Engineering Compiler (REC) is a decompiler TOOL that is part of Reverse Engineering tools which takes an executable file as input and tries to GENERATE high-level code.

57.

Which of the following is not a decompiler tool?(a) DCC decompiler(b) Borol and C(c) Boomerang Decompiler(d) ExeToCI have been asked this question during an interview.This key question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (b) Borol and C

To EXPLAIN I would SAY: Decompilers are part of Reverse Engineering tools that TRY to generate high-level code. Some common decompiler tools are DCC decompiler, BOOMERANG Decompiler, ExeToC, REC (reverse engineering compiler) etc.

58.

_____________ will not recreate the original source file created by the compiler.(a) Debugger(b) Hex Editor(c) Decompiler(d) DisassemblerThis question was posed to me during an interview for a job.I want to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (c) Decompiler

Easiest explanation: Decompilers does not attempt to REVERSE the actions of a compiler; rather it transforms the input PROGRAM repeatedly until HLL code is achieved. They will not recreate the ORIGINAL source file CREATED by the compiler.

59.

A _____________ takes executable file as input and tries to generate high level code.(a) Debugger(b) Decompiler(c) Disassembler(d) Hex EditorThe question was posed to me in my homework.My doubt stems from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (B) Decompiler

Best explanation: A decompiler takes an executable file as INPUT and tries to generate high-level code. They can be said as opposite of compiler. It does not attempt to reverse the ACTIONS of the compiler; rather it TRANSFORMS the input program repeatedly until HLL code is achieved.

60.

Which of the following is not a feature of IDAPro?(a) Instant debugging(b) Connect local and remote systems easily(c) Explore in-depth binary data(d) Convert machine language to high-level codeI have been asked this question during an internship interview.This intriguing question originated from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer» CORRECT choice is (d) Convert machine language to high-level code

The BEST I can explain: IDAPRO is used as a disassembler in manual binary code analysis and also used as debugger which is used for instant DEBUGGING, connect LOCAL and remote systems easily and explore in-depth binary data.
61.

________________ does not attempt to reverse the actions of compiler; rather it transforms the input program repeatedly until HLL code is achieved.(a) Debugger(b) Hex Editor(c) Disassembler(d) DecompilerThis question was posed to me in class test.This key question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (d) Decompiler

To explain I would say: USUALLY, decompiler is feed with executable files and it tries to produce high-level code. They can be said as opposite of compiler. It does not attempt to reverse the ACTIONS of a compiler; RATHER it transforms the input PROGRAM repeatedly until HLL code is ACHIEVED.

62.

________________ is a type of reverse engineering tool that is used to dissect binary codes into assembly codes.(a) PE & Resource Viewer(b) Debugger(c) Disassembler(d) Hex EditorThe question was asked by my college director while I was bunking the class.This is a very interesting question from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (c) Disassembler

Explanation: Disassembler is a type of REVERSE ENGINEERING tool that is used to dissect BINARY codes into assembly codes. They are also in use to extract FUNCTIONS, STRINGS, libraries, and other parts of a program.

63.

Which of the following is not a function or use of disassembler?(a) Extracting functions & libraries(b) Extracting strings and values(c) Assemble medium-level codes(d) Dissect binary codesI got this question in an online quiz.Query is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (c) Assemble medium-level CODES

The explanation: Assembling of medium-level codes is not the use of DISASSEMBLER. The disassembler is a type of reverse engineering tool that is used to dissect BINARY codes into assembly codes.

64.

IDAPro is used as a _________________ in manual binary code analysis and also used a debugger.(a) PE & Resource Viewer(b) Debugger(c) Disassembler(d) Hex EditorThe question was posed to me in examination.My question is taken from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer» RIGHT answer is (c) Disassembler

To explain I would say: Disassembler in Reverse ENGINEERING USED to SLICE up binary codes into assembly codes. IDAPRO is used as a disassembler in manual binary code analysis and also used as a debugger.
65.

PE & Resource Viewer permits programmers to inspect & alter resources which are entrenched in the EXE file of any software.(a) PE & Resource Viewer(b) Debugger(c) Disassembler(d) Hex EditorThis question was posed to me in an online quiz.My question is taken from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Correct ANSWER is (a) PE & RESOURCE Viewer

Easiest EXPLANATION: There are VARIOUS categories of reverse engineering tools. PE & Resource Viewer permits programmers to inspect & alter resources which are entrenched in the EXE file of any software.

66.

Hex editors permit programmers to inspect & alter binaries based on some software requirements.(a) True(b) FalseThe question was posed to me in an internship interview.I want to ask this question from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Correct CHOICE is (a) True

Easiest explanation: Hex editors are reverse ENGINEERING tools that PERMIT programmers to inspect & alter binaries based on some SOFTWARE requirements. They help in manipulating fundamental binary data in an app.

67.

Which of the following is not an actual Reverse Engineering tool?(a) Debugger(b) Disassembler(c) Text Editor(d) Hex EditorThis question was posed to me in an online quiz.I'm obligated to ask this question of Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (C) Text Editor

The explanation: Reverse ENGINEERING is the art of finding out & duplication of ANOTHER creator’s or developer’s product by examination of any product or development methodologies. A text editor is not a Reverse Engineering tool.

68.

There are ______ types of reverse engineering methodologies.(a) 6(b) 2(c) 5(d) 3I had been asked this question by my school teacher while I was bunking the class.I need to ask this question from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (B) 2

For explanation: There are two types of REVERSE engineering methodologies. One is where the source-code is obtainable, but the high-level aspects of the PROGRAM are not. For the other type, the software’s source code is not obtainable.

69.

Which of the following is not a disassembler tool?(a) IDA Pro(b) PE Explorer(c) Turbo C(d) W32DASMThe question was asked during an interview.My question comes from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (c) TURBO C

Explanation: As assembler CONVERTS code written in ASSEMBLY language to binary/machine code, disassembler does the reverse for cracking purpose & it COMES under reverse engineering tool. Turbo C is not a disassembler tool.

70.

______________ comes under tools for reverse engineering (RE).(a) Reassembler(b) Compiler(c) Disassembler(d) InterpreterI got this question in my homework.The above asked question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

The correct OPTION is (c) Disassembler

The explanation: Disassembler is the opposite of assembler. As assemblers are used to CONVERT code written in ASSEMBLY language to binary/machine code, disassembler does the reverse for cracking purpose & it comes under reverse ENGINEERING TOOL.

71.

De-compilation is not done for _______________(a) Recovery of lost source code(b) Migration of assembly language(c) Determining the existence of malicious code in any app(d) Targeting users with stealing codeThis question was posed to me during an internship interview.This is a very interesting question from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

The correct CHOICE is (d) Targeting users with stealing code

To elaborate: De-compilation is a TECHNIQUE of REVERSE engineering which is used for recovery of LOST source code, migration of assembly language or DETERMINING the existence of malicious code in any app.

72.

________________ is the opposite of assembler.(a) Reassembler(b) Disassembler(c) Compiler(d) InterpreterThis question was addressed to me during an internship interview.This key question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

The correct OPTION is (b) Disassembler

For EXPLANATION: An assembler converts code written in assembly language to binary/machine code, disassembler does the REVERSE for CRACKING purpose. The disassembler is the OPPOSITE of assembler.

73.

Which of the following is not a proper use of RE for ethical hackers?(a) Check for poorly designed protocols(b) Check for error conditions(c) Cracking for making paid apps free for use(d) Testing for boundary conditionsI had been asked this question during an interview.This is a very interesting question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct choice is (c) Cracking for making paid apps FREE for use

To EXPLAIN: Cracking for making paid apps free for use is not an acceptable REVERSE engineering work for ethical hackers. This PROCESS involves how the system or the application works internally and how to change the logic to crack the system or APP.

74.

Which of the following activity is a good aspect of reverse engineering in ethical hacking?(a) Cracking the trial version of the product to make it full-version(b) Removing the product key insertion step(c) Jumping the code for premium facilities(d) Determine whether the app contains any undocumented functionalityI got this question in an international level competition.Question is taken from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»
75.

Which of the following activity is a good aspect of reverse engineering in ethical hacking?(a) Cracking the trial version of the product to make it full-version(b) Removing the product key insertion step(c) Jumping the code for premium facilities(d) Determining the vulnerabilities in the product.I had been asked this question in quiz.This key question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (d) Determining the VULNERABILITIES in the product.

For explanation: Reverse engineering (RE) can be defined as the duplication of another creator’s or developer’s product trailing a thorough examination of its PRODUCTION or DEVELOPMENT. Determining the vulnerabilities in the product is one GOOD aspect of RE.

76.

RE is often defined as the crafting technique of ____________ who uses his skills to remove copy protection or trial versions from software or media.(a) crackers(b) risk assessment team(c) auditors(d) surveillance monitoring teamI have been asked this question during an interview for a job.This interesting question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (a) crackers

To elaborate: Reverse Engineering is often DEFINED as the crafting TECHNIQUE of crackers who uses his skills to remove copy protection or trial VERSIONS from SOFTWARE or media. Reverse engineering can be made FUNCTIONAL to diverse aspects of software development & hardware improvement activities.

77.

______________ can be defined as the duplication of another creator’s or developer’s product trailing a thorough examination of its production or development.(a) Reverse hacking(b) Cracking(c) Social engineering(d) Reverse engineeringThe question was posed to me in examination.I need to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (d) Reverse engineering

Easy explanation: Reverse engineering can be DEFINED as the duplication of another creator’s or developer’s product trailing a THOROUGH examination of its production or DEVELOPMENT. This PROCESS involves how the system or the application works and what needs to be done in order to crack it.

78.

_____________ can be made functional to diverse aspects of software development & hardware improvement activities.(a) Reverse hacking(b) Cracking(c) Reverse engineering(d) Social engineeringI have been asked this question in a job interview.My question is based upon Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer» CORRECT option is (c) Reverse engineering

Best explanation: Reverse engineering can be made functional to diverse aspects of software DEVELOPMENT & hardware improvement activities. This practice absorbs how the SYSTEM or the application works & what CONCEPTS have to implement in order to CRACK or duplicate it.
79.

If you’ve accidentally clicked any pop-up which seems malicious, it is recommended to take steps to remove it and proactively change your ________ and delete browsing activities from web browser.(a) passwords(b) email ID(c) name(d) addressThis question was posed to me in quiz.This interesting question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (a) passwords

The best I can explain: If you’ve ACCIDENTALLY clicked any pop-up which seems MALICIOUS, it is recommended to take STEPS to remove it and proactively CHANGE your passwords, and delete browsing activities from a web BROWSER.

80.

Which of the following is not an anti-spyware tool?(a) MalwareBytes Anti-Malware tool(b) SpyBot Search and Destroy(c) Emsisoft Emergency Kit(d) MS Firewall DefenderI got this question during a job interview.My doubt is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Correct CHOICE is (d) MS FIREWALL Defender

Best explanation: MS Firewall Defender is not used for DETECTING & removing spyware. MalwareBytes Anti-Malware tool, SpyBot Search and Destroy & Emsisoft Emergency KIT are some of the anti-spyware tools.

81.

As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for making sure it has cleaned up all malicious contents.(a) True(b) FalseThe question was posed to me by my college director while I was bunking the class.This interesting question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct CHOICE is (a) True

The BEST I can explain: As you sense your device has been infected with spyware, you should run a scan with your existing security software/AV for MAKING sure it has cleaned up all MALICIOUS CONTENTS. In this manner, you can protect your system before the spyware takes away all your sensitive data.

82.

Which of the following do not lead you to invite spyware into your system?(a) Accepting fishy prompt or pop-ups(b) Downloading apps from an unreliable source(c) Opening unknown attachments(d) Installing antivirus patchesI have been asked this question in semester exam.My question is taken from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (d) INSTALLING antivirus patches

The explanation is: Some of the largest POSSIBLE WAYS your SYSTEM can become contaminated with spyware is when you accept fishy prompts and pop-ups, download apps from unreliable SOURCES or opening unknown attachments from mailing services.

83.

____________ records all your key-strokes, chat-room dialogs, program run in your system, and system details.(a) Ad-based spyware(b) System Monitors(c) Spy-trojans(d) Tracking cookiesI got this question in a job interview.I want to ask this question from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (B) SYSTEM Monitors

For explanation I would say: One of the TYPES of spyware is the system monitoring spyware which records all your key-strokes, chat-room dialogs, a program run in your system, and system DETAILS.

84.

_________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.(a) Ad-based spyware(b) System Monitors(c) Spy-trojans(d) Tracking cookiesThis question was addressed to me in quiz.The doubt is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer» CORRECT ANSWER is (c) Spy-trojans

Best explanation: There are four major types of spyware. One of them is the spy-trojans which DISGUISE them as legitimate software & appear as JAVA or Flash PLAYER updates. They will periodically collect your system data and send it to its creator.
85.

_____________ tracks your data and displays those products as ads for promotions.(a) Ad-based spyware(b) System Monitors(c) Spy-trojans(d) Tracking cookiesI had been asked this question in my homework.The query is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (a) Ad-based spyware

To EXPLAIN I would say: Spyware are of four major types. ONE of them is adware. Adware or ad-based spyware tracks your data and displays those products as ads for PROMOTIONS.

86.

It actually infects your device easily & makes it hard to _____________(a) delete(b) identify(c) modify(d) copyI got this question in a job interview.The doubt is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (b) identify

To EXPLAIN: The most powerful & WIDESPREAD threats for users are the spyware. It actually infects your device easily & makes it hard to detect. Once detected, we NEED specific TOOLS and antivirus PROGRAMS to delete them.

87.

There are __________ main types of spyware.(a) 2(b) 3(c) 4(d) 5I got this question by my school teacher while I was bunking the class.This key question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Right option is (c) 4

To EXPLAIN: Spyware actually infects your device EASILY & makes it hard to detect. There are 4 major TYPES of spyware. These are adware, tracking cookies, spy-trojans & system monitoring spyware.

88.

_____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes.(a) Ad-based spyware(b) System Monitors(c) Spy-trojans(d) Tracking cookiesThe question was asked by my school principal while I was bunking the class.My question is based upon Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (d) Tracking cookies

The best explanation: There are 4 major TYPES of spyware. One of them is the tracking cookies which track the user’s online ACTIVITIES like search queries, HISTORY pages & downloads, for SELLING purposes.

89.

Spyware is not a powerful & one of the most widespread threats on the internet.(a) True(b) FalseI got this question by my college director while I was bunking the class.Origin of the question is Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer» RIGHT option is (b) False

To explain: Spyware is one of the most powerful & WIDESPREAD threats on the internet. Spyware is categorized as a sub-type of malware intended to spy & gain ACCESS to or damage the system DATA, without your acquaintance.
90.

Which of the following activity is not done by spyware?(a) Monitors your internet activity(b) Track user’s login details and passwords(c) Uninstalls your mobile browser(d) Spy on sensitive informationI had been asked this question in homework.My question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (c) Uninstalls your mobile browser

The best explanation: Spyware is harmful SOFTWARE which infiltrates USER’s system, spy on user’s activities, STEALING INTERNET usage data & sensitive information of that user. It monitors your internet activity, track login credentials and spy on user’s sensitive information.

91.

Which of the following activity is not done by spyware?(a) sell internet usage data(b) capture credit card details(c) user’s personal identity(d) steal signature of the different virusThe question was asked by my college professor while I was bunking the class.I'm obligated to ask this question of Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»
92.

They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?(a) Shareware(b) Ransomware(c) Spyware(d) FreewareThis question was posed to me in quiz.This interesting question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Correct choice is (c) Spyware

To explain I would say: Here ‘they’ refer to spyware which is an unnecessary SOFTWARE which infiltrates user’s system, SPY on user’s activities, stealing internet USAGE data & SENSITIVE information of that user.

93.

Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.(a) advertisers(b) dark-market(c) antivirus company(d) share marketThe question was posed to me in an online quiz.I would like to ask this question from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (a) ADVERTISERS

The EXPLANATION: Spyware is unnecessary SOFTWARE which infiltrates user’s SYSTEM, spy on the user’s ACTIVITIES, stealing internet usage data & sensitive information of that user. Spyware collects user’s personal data & spreads it to advertisers, data-firms, or its creator.

94.

________________ are unnecessary software which infiltrates user’s system, spy on user’s activities, stealing internet usage data & sensitive information of that user.(a) Shareware(b) Spyware(c) Ransomware(d) FreewareThis question was posed to me in quiz.I'd like to ask this question from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

Correct ANSWER is (b) Spyware

Explanation: Spyware is preventable software that spy on user’s activities, stealing internet USAGE DATA & sensitive information of that user. Spyware is CATEGORIZED as a sub-type of malware intended to spy & gain access to or damage the system data, without your acquaintance.

95.

Adware will not come to your system if you are using Chrome.(a) True(b) FalseThe question was posed to me in exam.This interesting question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer» RIGHT answer is (b) False

To elaborate: As adware HIJACKS your system, VARIOUS kinds of unessential tasks KEEP occurring. Adware may come and junk up your system through any browser, whether it is Firefox, Chrome, Opera or Edge.
96.

Which of the following term is not a valid terminology and type of adware?(a) Mobile adware(b) Mac Adware(c) Smart-home adware(d) Windows adwareI have been asked this question in my homework.I'm obligated to ask this question of Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (C) Smart-home adware

Easiest explanation: Website LINKS redirect to sites UNLIKE from what the user is intended, web browser acts slows to a crawl, the browser might crash frequently etc are some of the symptoms of adware infected system. These are mobile/android adware, MAC and Windows adware etc.

97.

Modern ____________ can even use it to target users with additional advertisements that are customized to the browsing habits.(a) smart shareware(b) smart adware(c) smart bloatware(d) smart spywareThe question was asked by my school teacher while I was bunking the class.Origin of the question is Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right option is (b) smart ADWARE

The explanation: Creators of adware also sell your browsing behaviour & information to 3^rd PARTIES. Modern smart adware can even use it to target USERS with additional advertisements that are CUSTOMIZED to browsing habits.

98.

Which among the following is not a symptom of your system compromised with adware?(a) Website links redirect to sites unlike from what user is intended(b) Web browser acts slows to a crawl(c) System takes restarts frequently(d) The browser might crash frequentlyI got this question during an interview.My query is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (c) System takes restarts frequently

The best explanation: When adware hijacks your system, various KINDS of unessential tasks KEEP on happening. WEBSITE links redirect to sites unlike from what user is INTENDED, web browser acts slows to a CRAWL, the browser might crash frequently etc are some of the symptoms of adware infected system.

99.

Malicious adware may sneak into your system by __________ different ways.(a) five(b) four(c) three(d) twoI have been asked this question in homework.Enquiry is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer» RIGHT answer is (d) two

To explain: Malicious adware MAY sneak into your system in 2 different WAYS. 1^st, if you download and install a program that is freeware or shareware, it might install some other programs and ads –popping applications. 2^nd, through insidious – WEBSITES containing adware.
100.

Creators of adware also sell your browsing behaviour & information to 3^rd parties.(a) True(b) FalseI had been asked this question in an online quiz.I'd like to ask this question from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (a) True

Easy explanation: The adware’s functions may be intended to analyze the victim’s location & what different Internet SITES he/she is visiting. CREATORS of adware also sell your browsing behaviour & information to 3^rd parties.