Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

A _______________ is a process of breaking a password protected system or server by simply & automatically entering every word in a dictionary as a password.(a) Dictionary attack(b) Phishing attack(c) Social engineering attack(d) MiTM attackThis question was posed to me during an interview for a job.My doubt stems from Password Cracking and Security Measures in portion Cyber Security Types of Cyber Security

Answer» RIGHT choice is (a) DICTIONARY ATTACK

For explanation: A dictionary attack is a process of breaking a password protected system or server by simply & automatically entering EVERY word in a dictionary as a password. It is very fast, time-saving and easy to PERFORM.
52.

Which of the following comes under the advantage of dictionary attack?(a) Time-consuming(b) Moderate efficient(c) Very fast(d) Complex to carry-outThe question was asked in an international level competition.This intriguing question originated from Password Cracking and Security Measures in division Cyber Security Types of Cyber Security

Answer»

The correct answer is (c) Very fast

The best I can EXPLAIN: A dictionary attack is a process of breaking a password protected system or SERVER by simply & automatically entering every word in a dictionary as a password. It is very fast, time-saving and EASY to perform.

53.

Which of the following is not an advantage of dictionary attack?(a) Very fast(b) Time-saving(c) Easy to perform(d) Very tough and inefficientThe question was asked by my college professor while I was bunking the class.Question is from Password Cracking and Security Measures topic in section Cyber Security Types of Cyber Security

Answer»

Right answer is (d) Very tough and inefficient

Explanation: A dictionary attack is a PROCESS of breaking a password PROTECTED system or server by simply & automatically entering every word in a dictionary as a password. It is very FAST, time-saving and easy to perform.

54.

Passwords need to be kept encrypted to protect from such offline attacks.(a) True(b) FalseI got this question during an internship interview.My question comes from Password Cracking and Security Measures in section Cyber Security Types of Cyber Security

Answer»

The correct answer is (a) True

Easy EXPLANATION: PHYSICAL access is needed in offline attack to the system that is having a password file or the hacker needs to crack the system by other means. HENCE, even if hackers GAIN physical access to the system, if the passwords are in the encrypted mode, it will be almost impossible to STEAL passwords.

55.

Saving passwords in the browser is a good habit.(a) True(b) FalseThe question was asked during an interview.This intriguing question originated from Password Cracking and Security Measures in section Cyber Security Types of Cyber Security

Answer»

The correct OPTION is (b) False

The best explanation: Saving passwords in the browser for your different user ACCOUNTS and web services is not a good habit. All browsers do not keep these passwords as an encrypted format. Chrome allows you to see those passwords if you know the SYSTEM’s PASSWORD which can lead to a SECURITY breach.

56.

Which of the following is not an example of offline password attack?(a) Dictionary attack(b) Rainbow attacks(c) Brute force attack(d) Spamming attackThis question was posed to me during an online interview.Query is from Password Cracking and Security Measures topic in division Cyber Security Types of Cyber Security

Answer»

Correct answer is (d) Spamming attack

The best I can EXPLAIN: The offline attack NEEDS physical access to the system that is having a password file or the HACKER needs to crack the system by other MEANS. A dictionary attack, rainbow, and brute force COME under offline attack.

57.

_______________ attacks always need physical access to the system that is having password file or the hacker needs to crack the system by other means.(a) online(b) offline(c) password(d) non-electronicI had been asked this question in exam.Asked question is from Password Cracking and Security Measures topic in division Cyber Security Types of Cyber Security

Answer»

Right option is (b) OFFLINE

To explain I would say: Offline password attacks are carried out from a LOCATION other than the real computer where the password RESIDES or was used. They NEED physical ACCESS to the system that is having a password file or the hacker needs to crack the system by other means.

58.

________________ attacks are carried out from a location other than the real computer where the password reside or was used.(a) passive online(b) active online(c) offline password(d) non-electronicThe question was asked in exam.My question is taken from Password Cracking and Security Measures topic in section Cyber Security Types of Cyber Security

Answer»

The correct option is (C) OFFLINE password

To EXPLAIN I would say: For this cyber-criminal needs to have physical access to the system and so offline password attacks are carried out from a location other than the real computer where the password reside or was used. They are common EXAMPLES of physical DATA breaching & hacking.

59.

_________________ can be alternatively termed as password guessing attack.(a) passive online(b) active online(c) offline attack(d) non-electronicThe question was posed to me during a job interview.My question is based upon Password Cracking and Security Measures topic in chapter Cyber Security Types of Cyber Security

Answer»

Right answer is (b) active online

The BEST explanation: Users with open authentication points and BAD or weak passwords often becomes the victim of the active online attack. It is alternatively termed as password GUESSING attack where the attacker DIRECTLY tries different passwords 1-by-1 against victim’s system/account.

60.

In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1 against victim’s system/account.(a) passive online(b) active online(c) offline attack(d) non-electronicI got this question by my school teacher while I was bunking the class.My query is from Password Cracking and Security Measures in section Cyber Security Types of Cyber Security

Answer» CORRECT choice is (b) active online

Best explanation: Users with open AUTHENTICATION points and BAD or WEAK passwords often becomes the victim of an active online attack where the attacker directly tries DIFFERENT passwords 1-by-1 against victim’s system/account.
61.

Which of them is not a disadvantage of active online attack?(a) Takes a long time(b) Easily and automatically detected(c) Need high network bandwidth(d) Need the patience to crackI got this question in my homework.I'm obligated to ask this question of Password Cracking and Security Measures in chapter Cyber Security Types of Cyber Security

Answer»

Right choice is (b) Easily and automatically detected

The best I can EXPLAIN: In an active online ATTACK, the attacker directly tries DIFFERENT passwords 1-by-1 against VICTIM’s system/account. It has some disadvantages as it takes a long time, hence a lot of patience & high NETWORK bandwidth also.

62.

Which of the following case comes under victims’ list of an active online attack?(a) Strong password based accounts(b) Unsecured HTTP users(c) Open authentication points(d) Logged in systems and servicesThe question was asked in final exam.My question is taken from Password Cracking and Security Measures topic in chapter Cyber Security Types of Cyber Security

Answer»

Correct choice is (c) Open authentication POINTS

Explanation: Systems with bad or weak PASSWORDS & with open authentication points OFTEN becomes the victim of an active online attack where the attacker directly tries different passwords 1-by-1 against victim’s system/account.

63.

Which of the following do not comes under hurdles of passive online attack for hackers?(a) Hard to perpetrate(b) Computationally complex(c) Time taking, so patience has to be there(d) Tools not availableThe question was posed to me during an internship interview.This interesting question is from Password Cracking and Security Measures topic in division Cyber Security Types of Cyber Security

Answer»

The correct choice is (d) Tools not AVAILABLE

The explanation: Tools for doing a passive offline ATTACK on PASSWORDS is widely available so it doesn’t come under disadvantage or hurdles of passive offline attack. But passive offline attacks are computationally COMPLEX, hard to perpetrate and may take time.

64.

Which of the following is not an example of a passive online attack?(a) MiTM(b) Reply Attack(c) Phishing(d) Wire sniffingI have been asked this question during an online interview.This question is from Password Cracking and Security Measures in division Cyber Security Types of Cyber Security

Answer»

Right OPTION is (c) Phishing

The best EXPLANATION: Phishing is not an example of a passive online attack. In passive online attacks, the ATTACKER does not contact with an authorized party to steal the password. Types of passive online attacks include wire sniffing, Man in the MIDDLE attack and reply attack.

65.

Which of the following is an example of passive online attack?(a) Phishing(b) Social Engineering(c) Spamming(d) Wire sniffingThe question was asked in semester exam.Query is from Password Cracking and Security Measures in portion Cyber Security Types of Cyber Security

Answer» CORRECT choice is (d) WIRE SNIFFING

The explanation: ATTACKER do not contact with an authorized party to steal the password in the passive online attack, rather the attacker attempts to grab password HACKING without communicating with the victim or his/her victim account. Examples of passive online attacks include wire sniffing, Man in the middle attack and reply attack.
66.

In _______________ attacks an attacker do not contact with authorizing party for stealing password.(a) passive online(b) active online(c) offline(d) non-electronicThis question was posed to me by my school teacher while I was bunking the class.I want to ask this question from Password Cracking and Security Measures topic in section Cyber Security Types of Cyber Security

Answer»

Correct choice is (a) PASSIVE online

For explanation I WOULD SAY: In passive online attacks, the attacker do not CONTACT with an authorized party to steal the password, rather the attacker attempts to grab password hacking without communicating with the VICTIM or his/her victim account.

67.

There are ________ major types of passwords.(a) 4(b) 5(c) 6(d) 7I got this question in final exam.This interesting question is from Password Cracking and Security Measures in division Cyber Security Types of Cyber Security

Answer» RIGHT ANSWER is (d) 7

For explanation I would say: There are seven major types of passwords. These are a PASSWORD containing only letters, a password containing only number, a password containing only special characters, a password containing only alpha-numeric characters, a password containing letters, numbers as well as special SYMBOLS or password containing any two COMBINATIONS of the three.
68.

Password cracking in system hacking is of ________ types.(a) 2(b) 3(c) 4(d) 5This question was addressed to me in a job interview.My enquiry is from Password Cracking and Security Measures in section Cyber Security Types of Cyber Security

Answer»

Correct answer is (c) 4

The explanation: System hacking involves PASSWORD hacking as one of the major hacking methodologies. It is of 4 types. These are PASSIVE online attack, active online attack, OFFLINE attack, and non-electronic attack.

69.

System hacking involves password hacking as one of the major hacking methodologies.(a) True(b) FalseI had been asked this question in an interview for internship.The doubt is from Password Cracking and Security Measures in portion Cyber Security Types of Cyber Security

Answer»

The correct answer is (a) True

Explanation: System hacking, which is of four types involves password hacking as one of the MAJOR hacking METHODOLOGIES. It is used to crack the security of a system and gain access for STEALING data.

70.

______________ is a tool that is integrated with top 90 search engines to grab quick search for email addresses and other details.(a) Email Spider Toolkit(b) Email Spider Easy(c) Email Crawler Easy(d) Email Spider ToolkitThe question was posed to me in examination.Asked question is from Email Security topic in section Cyber Security Types of Cyber Security

Answer»

The correct answer is (b) Email Spider Easy

Easiest explanation: Email Spider Easy is TARGETED BULK email marketing SOFTWARE. It rapidly & automatically searches & spider from the search engine for finding email addresses. This tool is integrated with top search engines & its speed ALLOWS up to 500 email extraction threads SIMULTANEOUSLY.

71.

MegaHackerZ helps crackers to crack email passwords.(a) True(b) FalseThis question was posed to me in a job interview.The doubt is from Email Security topic in portion Cyber Security Types of Cyber Security

Answer»

Right choice is (a) True

To ELABORATE: MegaHackerZ helps crackers to crack EMAIL PASSWORDS. Though it is not used very much as the versions are deprecated. But it is still useful for weak passwords to crack easily.

72.

_______________ is targeted bulk email marketing software.(a) Email Spider Toolkit(b) Email Spider Easy(c) Email Crawler Easy(d) Email Spider ToolkitThis question was addressed to me during a job interview.This interesting question is from Email Security topic in division Cyber Security Types of Cyber Security

Answer»

The correct option is (B) Email Spider Easy

To explain I would say: Email Spider Easy is targeted bulk email MARKETING software. It rapidly & automatically searches & spider from the search ENGINE for finding email addresses. This tool is integrated with TOP search engines.

73.

Which of the following is not an email related hacking tool?(a) Email Finder Pro(b) Sendinc(c) Mail PassView(d) Mail PasswordThis question was posed to me during an interview for a job.Question is taken from Email Security topic in division Cyber Security Types of Cyber Security

Answer» CORRECT choice is (b) SENDINC

To ELABORATE: Sendinc is not an email data COMPROMISING tool. It is used for securing business email accounts and offers a quick web-based way to jump into offering secure emails for FIRMS. The rest three are email compromising tools.
74.

________________ is a free extension of browser that enables you in decrypting as well as encrypting emails.(a) Enlocked(b) MS Outlook(c) Cisco Jabber(d) MailvelopeThe question was asked in quiz.Question is taken from Email Security topic in section Cyber Security Types of Cyber Security

Answer»

Correct option is (d) Mailvelope

For explanation: Mailvelope is a free EXTENSION of the browser (which is available for both GOOGLE Chrome as well as Mozilla Firefox) that enables USERS in decrypting as well as encrypting EMAILS USING an openPGP standard of encryption.

75.

Which of them is not an example of business email security tool?(a) Enlocked(b) RPost Office(c) MS Outlook(d) SendincI had been asked this question in class test.I would like to ask this question from Email Security in division Cyber Security Types of Cyber Security

Answer»

The correct OPTION is (c) MS OUTLOOK

The explanation is: MS Outlook is a web-based DESKTOP app as well as an online suite of webmail, tasks, CONTACTS & CALENDARING services developed by Microsoft. The rest three are a business email security tools.

76.

Which of them is not an example of business email security tool?(a) Microsoft Office Trust Center(b) Sendinc(c) Hushmail Business(d) Cisco JabberThe question was posed to me in an online quiz.This is a very interesting question from Email Security topic in section Cyber Security Types of Cyber Security

Answer»
77.

PGP is abbreviated as _______________(a) Pretty Good Privacy(b) Powerful Good Privacy(c) Protocol Giving Privacy(d) Pretty Good ProtocolThis question was posed to me at a job interview.I want to ask this question from Email Security in chapter Cyber Security Types of Cyber Security

Answer» RIGHT answer is (a) Pretty Good PRIVACY

The explanation is: Pretty Good Privacy (PGP) is an encryption program which provides cryptographic privacy & authentication for email communication. Basically, it is used for SECURING user’s TEXTS, emails, attachments etc.
78.

_____________ is an encryption program or add-ons which provides cryptographic privacy & authentication for email communication.(a) Powerful Good Privacy(b) Pretty Good Privacy(c) Pretty Good Encryption(d) Pretty Strong EncryptionThis question was posed to me during an interview.Question is from Email Security topic in division Cyber Security Types of Cyber Security

Answer»

The correct answer is (b) Pretty Good Privacy

The explanation is: Pretty Good Privacy is an ENCRYPTION PROGRAM which provides CRYPTOGRAPHIC privacy & authentication for email communication. BASICALLY, it is USED for securing user’s texts, emails, attachments etc.

79.

Once the email is compromised, all other sites and services online associated with this email can be compromised.(a) True(b) FalseThe question was asked during an online exam.Origin of the question is Email Security in chapter Cyber Security Types of Cyber Security

Answer»

The CORRECT option is (a) True

For explanation: Email security is very much necessary because once the email is compromised, all other sites and services online ASSOCIATED with this email can be compromised and the HACKER will be able to ACCESS all other ACCOUNTS linked to this email.

80.

Advanced SER is abbreviated as ___________(a) Advanced Stealth Electronic Redirector(b) Advanced Security Email Redirector(c) Advanced Stealth Email Redirector(d) Advanced Stealth Email RecorderI have been asked this question in class test.The question is from Email Security topic in division Cyber Security Types of Cyber Security

Answer»

Correct choice is (c) Advanced Stealth Email Redirector

Easy EXPLANATION: Advanced Stealth Email Redirector (Advanced SER) is a tool to monitor outgoing traffic of TARGET PC’s email and intercept all the EMAILS send from it. INTERCEPTED emails are then forwarded to a pre-specified email ID.

81.

Which of the following will not help in preserving email security?(a) Create a strong password(b) Connect your email to a phone number(c) Use two-factor authentication for password verification and login(d) Click on unknown links and sitesI have been asked this question during an online interview.This intriguing question originated from Email Security in division Cyber Security Types of Cyber Security

Answer»

Correct choice is (d) Click on unknown LINKS and sites

For explanation: Some of the FOLLOWING measures to preserve your email security is via creating a STRONG password, connecting your EMAILS to your personal phone number and SET up 2-factor authentication for login.

82.

Which of the following is a tool to monitor outgoing traffic of target PC’s email and intercept all the emails sent from it?(a) Wireshark(b) Advanced Stealth Email Redirector(c) MS Outlook(d) Cisco JabberI got this question in an online interview.I'm obligated to ask this question of Email Security topic in chapter Cyber Security Types of Cyber Security

Answer»

Correct option is (B) Advanced Stealth Email REDIRECTOR

Explanation: Advanced Stealth Email Redirector is a tool to monitor OUTGOING traffic of target PC’s email and intercept all the emails send from it. INTERCEPTED emails are then forwarded to a pre-specified email ID.

83.

_______________ needs to be turned off in order to prevent from this attack.(a) Email scripting(b) Email attachments(c) Email services(d) Third party email programsI had been asked this question during a job interview.My query is from Email Security topic in section Cyber Security Types of Cyber Security

Answer»

The correct option is (a) Email SCRIPTING

Explanation: Email USERS who use INTERNET Explorer as their HTML engine are vulnerable to Reaper Exploit. It works in the background and sends a copy of a reply or forwarded the email to its creator or sender. Email scripting needs to be turned off in ORDER to prevent from this ATTACK.

84.

Email users who use IE as their _________________ are vulnerable to Reaper Exploit.(a) Web engine(b) Rendering engine(c) Game engine(d) HTML engineI have been asked this question during an internship interview.My question is from Email Security in portion Cyber Security Types of Cyber Security

Answer»

Correct choice is (d) HTML ENGINE

The explanation: Email USERS who use Internet Explorer as their HTML engine are vulnerable to Reaper Exploit. It works in the background and sends a copy of a reply or forwarded the email to its CREATOR or sender.

85.

Fraudulent email messages are some fake email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information.(a) True(b) FalseI got this question in an online quiz.This key question is from Email Security topic in portion Cyber Security Types of Cyber Security

Answer»

The CORRECT ANSWER is (a) True

The explanation is: Yes, FRAUDULENT email messages are some FAKE email messages that seem legitimate which ask for your bank details and reply those emails with updated confidential information. Email users MUST stay aware of such e-frauds.

86.

Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)?(a) Zeus(b) Stuxnet(c) Reaper Exploit(d) Friday the 13This question was addressed to me during an online exam.My question is taken from Email Security in chapter Cyber Security Types of Cyber Security

Answer»

Right answer is (c) Reaper EXPLOIT

For explanation I would SAY: Reaper exploit is a micro-virus that can compromise the email security as it works in the BACKGROUND and sends a copy of reply or FORWARDED the email to its creator or sender.

87.

Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as _____________ details _________ and passwords.(a) credit card, antivirus name(b) credit card, login ID(c) cell phone, antivirus name(d) car model, account IDThis question was posed to me during an interview.Question is taken from Email Security in portion Cyber Security Types of Cyber Security

Answer»

Correct answer is (b) credit CARD, LOGIN ID

To explain I would say: Fraudulent email messages are some fake email messages that seem legitimate which ASK for your confidential bank details such as credit card details, cell phone NUMBER, Login ID and PASSWORDS.

88.

Unsolicited Bulk E-mails (UBI) are called __________(a) SMS(b) MMS(c) Spam emails(d) Malicious emailsI got this question by my college director while I was bunking the class.My doubt is from Email Security in section Cyber Security Types of Cyber Security

Answer»

Right choice is (C) Spam emails

For EXPLANATION I would say: Unsolicited Bulk E-mails (UBI) are an act of sending unwanted emails which one has no specific or important thing in it. Email spams are actually JUNK emails that are sent by commercial firms as an ADVERTISEMENT of their products and services.

89.

Which of the following is a non-technical type of intrusion or attack technique?(a) Reverse Engineering(b) Malware Analysis(c) Social Engineering(d) Malware WritingI got this question by my college director while I was bunking the class.Question is taken from Email Security topic in section Cyber Security Types of Cyber Security

Answer»

Right option is (c) Social Engineering

For explanation I would SAY: Social Engineering is a non-technical type of INTRUSION or ATTACK technique which relies heavily on HUMAN interaction. It involves tricking target users to break normal security postures.

90.

Using email hacking illicit hackers can send & spread ___________virus _____________ and spam emails.(a) trojans, redirected malicious URLs(b) antivirus, patches(c) cracked software, redirected malicious URLs(d) malware, security patchesI got this question during an internship interview.The query is from Email Security in section Cyber Security Types of Cyber Security

Answer»

Right option is (a) TROJANS, redirected malicious URLS

To explain I would say: Using email hacking illicit hackers can send & SPREAD malware, trojans, virus, WORMS, redirected malicious URLs which can take the target recipients to some infected webpage ALSO.

91.

_____________ is the technique used for tricking users to disclose their username and passwords through fake pages.(a) Social Engineering(b) Phishing(c) Cookie Stealing(d) Banner GrabbingThis question was posed to me in an interview.My query is from Email Security topic in chapter Cyber Security Types of Cyber Security

Answer» CORRECT ANSWER is (B) Phishing

Easy explanation: Phishing is the technique used for TRICKING users to disclose their USERNAME and passwords through fake pages.
92.

Which of them is an example of grabbing email information?(a) Cookie stealing(b) Reverse engineering(c) Port scanning(d) Banner grabbingI had been asked this question by my college director while I was bunking the class.This intriguing question comes from Email Security in chapter Cyber Security Types of Cyber Security

Answer»

Right answer is (a) Cookie STEALING

The best explanation: There are three major ways of stealing email INFORMATION. These are by stealing COOKIES, social engineering and password PHISHING technique. The remaining three (in the OPTION) are not ways of stealing email information.

93.

If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.(a) memory(b) quarantine(c) cookies(d) hard driveThe question was posed to me in a national level competition.This question is from Email Security in portion Cyber Security Types of Cyber Security

Answer»

The CORRECT CHOICE is (c) COOKIES

Explanation: If the data stored in the cookies is not encrypted, then after cookie stealing, ATTACKERS can see INFORMATION such as username and password stored by the cookie.

94.

The stored cookie which contains all your personal data about that website can be stolen away by _____________ using _____________ or trojans.(a) attackers, malware(b) hackers, antivirus(c) penetration testers, malware(d) penetration testers, virusThe question was asked during a job interview.My enquiry is from Email Security in section Cyber Security Types of Cyber Security

Answer»

The correct option is (a) attackers, MALWARE

To explain: If a WEBSITE uses a cookie, or a browser contains the cookie, then every TIME you visit that website, the browser TRANSFERS the cookie to that website. This STORED cookie which contains all your personal data about that website can be stolen away by attackers using malware or trojans.

95.

If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.(a) True(b) FalseThis question was posed to me in an internship interview.Question is taken from Email Security in section Cyber Security Types of Cyber Security

Answer» CORRECT option is (a) True

For explanation I would SAY: If a website uses a COOKIE, or a BROWSER contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. This helps in initiating cookie stealing attack.
96.

Which of them is not a proper method for email security?(a) Use Strong password(b) Use email Encryption(c) Spam filters and malware scanners(d) Click on unknown links to exploreThe question was asked in an internship interview.This key question is from Email Security topic in portion Cyber Security Types of Cyber Security

Answer»

Right answer is (d) Click on unknown links to explore

The explanation is: Use of STRONG PASSWORDS and email ENCRYPTION other than planting spam filters and installing MALWARE SCANNERS are some of the proper methods for email security.

97.

_____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.(a) Cloud(b) Pen drive(c) Website(d) EmailThe question was posed to me in an interview for internship.I want to ask this question from Email Security topic in chapter Cyber Security Types of Cyber Security

Answer»

Correct option is (d) Email

Easiest explanation: Email is a famous technological medium for the SPREAD of MALWARE, facing problems of spam, & phishing attacks and to ENTICE recipients in divulging sensitive information, by open attachments and/or by CLICKING on hyperlinks which in background install malware on the victim’s device.

98.

____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.(a) Email security(b) Email hacking(c) Email protection(d) Email safeguardingThe question was posed to me in an interview.My enquiry is from Email Security in section Cyber Security Types of Cyber Security

Answer»

Right OPTION is (a) Email security

To elaborate: Email security is the METHOD for keeping sensitive information in email communication & ACCOUNTS SECURE against unofficial access, loss, or COMPROMISE.

99.

Which of them is not a major way of stealing email information?(a) Stealing cookies(b) Reverse Engineering(c) Password Phishing(d) Social EngineeringI have been asked this question in an online interview.The query is from Email Security topic in chapter Cyber Security Types of Cyber Security

Answer»

Right answer is (B) Reverse Engineering

Best EXPLANATION: There are three MAJOR ways of STEALING email information. These are by stealing cookies, social engineering and password phishing TECHNIQUE. Reverse engineering is not a way of stealing email information.

100.

There are _______ major ways of stealing email information.(a) 2(b) 3(c) 4(d) 5I have been asked this question in semester exam.My question is from Email Security topic in division Cyber Security Types of Cyber Security

Answer» CORRECT option is (b) 3

The best I can EXPLAIN: There are three major ways of stealing EMAIL information. These are by stealing cookies, social ENGINEERING and password PHISHING technique.