Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

201.

It is necessary to use ________________ for maintaining searched data privacy.(a) Private email services(b) Private search engines(c) Tor Browser(d) Private Browser windowThe question was posed to me in an interview for internship.This question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer» CORRECT option is (b) PRIVATE SEARCH engines

To explain: It is necessary to use private search engines for maintaining searched DATA PRIVACY. They do not keep track of your searched terms or your browsing behaviour and habits. Examples are like Search Encrypt, DuckDuckGo, StartPage and Wolfram Alpha.
202.

Which of the following browser is used for Privacy purpose?(a) Chrome(b) Firefox(c) Opera(d) TorThis question was addressed to me in an international level competition.My query is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

The correct ANSWER is (d) TOR

The best explanation: In the complex world where e-privacy is a CONCERN, one should preserve their online privacy. Some appropriate MEASURES for preserving privacy are by using browsers like Tor and by disabling cookies.

203.

Which of the following is a private Search-engine and do not track our searching data?(a) Google(b) Search Encrypt(c) Bing(d) YahooThe question was asked in class test.The above asked question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (b) Search Encrypt

Easy explanation: DIGITAL Privacy can be preserved in different ways. Few SUITABLE SOLUTIONS for preserving privacy are by using privacy-focussed search engines like Search Encrypt, DUCKDUCKGO, StartPage and Wolfram Alpha.

204.

Which of the following is not a private Search-engine?(a) Yahoo(b) DuckDuckGo(c) StartPage(d) Wolfram AlphaI have been asked this question in semester exam.This interesting question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

The CORRECT option is (a) Yahoo

For EXPLANATION: DIGITAL Privacy includes information privacy, individual privacy & COMMUNICATION privacy. One appropriate solution for preserving privacy is by USING privacy-focussed search engines like DuckDuckGo, StartPage and Wolfram Alpha.

205.

Which of the following is not an appropriate solution for preserving privacy?(a) Use privacy-focussed SE(b) Close all logical ports(c) Do not use malicious sites and torrent sites(d) Use VPNI have been asked this question during an interview.My question comes from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer» CORRECT option is (b) Close all LOGICAL ports

Easiest EXPLANATION: Closing of all logical ports is done to secure system from Trojans. Some appropriate WAY out for preserving privacy is by using VPNs, using private browser window & by disabling cookies also.
206.

Which of the following do not comes under the three pillars of digital privacy?(a) Information privacy(b) Individual privacy(c) Communication privacy(d) Family privacyThe question was asked in an online interview.The query is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct OPTION is (d) Family privacy

Explanation: Digital Privacy encompasses 3 sub-pillars; information privacy, INDIVIDUAL privacy, and COMMUNICATION privacy. Family privacy is not a PART of its 3-pillars.

207.

Which of the following is not an appropriate solution for preserving privacy?(a) Use privacy-focussed SE(b) Use private Browser-window(c) Disable cookies(d) Uninstall AntivirusThe question was asked in my homework.My question is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»
208.

_______________ is a combined term which encompasses 3 sub-pillars; information privacy, individual privacy, and communication privacy.(a) Digital Integrity(b) Digital privacy(c) Digital secrecy(d) Digital protectionThe question was asked in my homework.My question is based upon Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (B) DIGITAL privacy

Explanation: Digital Privacy is a combined term which ENCOMPASSES 3 sub-pillars; information privacy, individual privacy, and COMMUNICATION privacy where all of them DEAL with the protection of an individual’s information.

209.

_______________deals with the protection of an individual’s information which is implemented while using the Internet on any computer or personal device.(a) Digital agony(b) Digital privacy(c) Digital secrecy(d) Digital protectionThis question was posed to me by my school teacher while I was bunking the class.This is a very interesting question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (B) DIGITAL privacy

To explain I would SAY: Digital Privacy deals with the protection of an individual’s information which is implemented while using the Internet on any computer or personal device.

210.

Which of the following is an example of a Botnet program?(a) Slammer(b) GameOver(c) Stuxnet(d) Anna KournikovaThe question was posed to me in a job interview.My question is taken from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Right OPTION is (b) GameOver

Explanation: BOTNETS create logical connections with internet connected devices LIKE smart-phones, IoT devices, COMPUTER systems etc. EXAMPLES of some popular botnets are GameOver, ZeroAccess, & Zeus.

211.

Which of the following is not an example of a botnet program?(a) Zeus(b) GameOver(c) ZeroAccess(d) MyDoomThe question was asked in unit test.I'd like to ask this question from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (d) MyDoom

For EXPLANATION: Examples of some POPULAR botnets are gameover, ZeroAccess, and ZEUS. The infect computers & other SYSTEMS and TURNED them into zombies which are also called zombies systems.

212.

Which of the following is an example of Botnet?(a) Zeus(b) ILOVEYOU(c) Storm Worm(d) MyDoomI got this question during an online interview.Asked question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

Right option is (a) ZEUS

Easiest explanation: Botnets are can COMPROMISE any system and turn them into zombie COMPUTERS. GameOver, Zeus etc. are examples of some popular botnets programs.

213.

Nowadays, most botnets rely on existing _______________ networks for communication.(a) server-to-server(b) peer-to-peer(c) client-to-server(d) host-to-serverI had been asked this question during an online exam.I would like to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (b) peer-to-peer

Easy explanation: Botnets are COMPROMISED connectivity of SYSTEMS like smart-phones, IoT DEVICES, COMPUTER systems etc. Now-a-days, most botnets rely on existing peer-to-peer NETWORKS for communication.

214.

The bot program allows the bot-herders to perform all operations from a ___________ location.(a) local(b) open(c) corporate(d) remoteThe question was asked in an online quiz.Enquiry is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (d) remote

To explain I would SAY: Infected computers and other systems WITHIN the BOTNET are called zombies systems which are controlled by bot programs that allow the bot-herders to PERFORM all operations from a remote LOCATION.

215.

Infected computers and other systems within the botnet are called __________(a) killers(b) vampires(c) zombies(d) gargoylesI have been asked this question in an interview for job.My doubt is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (c) ZOMBIES

For explanation: Attackers use the botnet for connecting of smart-phones, IOT devices, computer systems ETC. These INFECTED COMPUTERS and other systems within the botnet connection are called zombies or zombie computers.

216.

Botnets are not the logical connection of which of the following?(a) Smart-phones(b) IoT devices(c) Computer systems(d) ModemsI had been asked this question in exam.This intriguing question originated from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Right option is (d) Modems

For EXPLANATION: Botnets are logical connections of smart-phones, IoT devices, computer systems ETC. They are strong enough to carry out distributed denial of SERVICE attacks & PERMIT HACKERS to access various devices & its connection.

217.

The word “botnet” is a blend of the words _____________ & ___________(a) robot, network(b) rocket, network(c) bot, network(d) bot, internetI have been asked this question in an online interview.The origin of the question is Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (a) robot, network

The EXPLANATION is: The word “botnet” is a blend of the WORDS robot & network. Botnets usually are not used for encrypting files for ransom. They are implemented to carry out distributed DDoS attacks, steal data, send SPAM MESSAGES and COMPROMISE various services & its connection.

218.

The full form of C&C is ____________(a) command and control(b) copy and cut(c) command and capture(d) copy and controlThe question was posed to me by my college director while I was bunking the class.I want to ask this question from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (a) command and control

To explain: The owner of botnets can control the BOTNET using command & control (C&C) software. Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to ACCESS various DEVICES & its CONNECTION.

219.

The owner of botnets can control the botnet using ___________________ software.(a) trojans(b) command and control(c) servers(d) infected serversI have been asked this question during an interview.The origin of the question is Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer» RIGHT option is (b) COMMAND and control

To explain I would say: A BOTNET owner can govern and manage the botnet through command & programs. Botnets are implemented to CARRY out distributed DDoS attacks, steal data, send spam messages & permits the hacker to ACCESS various devices & its connection.
220.

Botnets are not used for ______________(a) Perform DDoS(b) Steal bulk amount of sensitive data(c) Spamming(d) Encrypting for ransomThis question was addressed to me in an online quiz.The query is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer» RIGHT choice is (d) Encrypting for ransom

The explanation: BOTNETS usually are not used for encrypting files for ransom. Botnets are implemented to carry out distributed DDoS attacks, STEAL data, send SPAM messages & permits the hacker to ACCESS various devices & its connection.
221.

A _____________ is a number of Internet-connected systems, where each of them is running one or more bots.(a) Trojan(b) Virus(c) Worms(d) BotnetThe question was asked by my school teacher while I was bunking the class.Query is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Right ANSWER is (d) Botnet

The best EXPLANATION: A botnet is a NUMBER of Internet-connected DEVICES, each of which is running one or more bots. Botnets are managed by bot-herders. These botnets have become foremost threats to cyber-security.

222.

_____________ are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection.(a) Trojan(b) Virus(c) Botnet(d) WormsThis question was posed to me in an online interview.I need to ask this question from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right CHOICE is (c) Botnet

Explanation: BOTNETS are implemented to carry out distributed DDoS attacks, steal data, send SPAM messages & permits the hacker to access VARIOUS DEVICES & its connection.

223.

Botnets are managed by ______________(a) Bot-holders(b) Bot-herders(c) Bot-trainers(d) Bot-creatorsI have been asked this question in class test.My question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

The correct CHOICE is (b) Bot-herders

For EXPLANATION: A botnet CONSISTS of at least one bot server or controller and one or more client-bots. Botnets are managed by bot-herders. The exact TERM is bot herders.

224.

A ___________ consists of at least one bot server or controller and one or more client-bots.(a) Virus(b) Trojan(c) Botnet(d) AdwareI got this question in a national level competition.I need to ask this question from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (C) BOTNET

The EXPLANATION: The botnet comprises one BOT server or CONTROLLER and one or more client-bots. Botnets are managed by bot-herders. They have become major threats to security as they are getting popular in the cyber-crime world.

225.

__________ is a powerful RAT build using the language Delphi 7.(a) Stuxnet(b) T-Bomb(c) Beast(d) ZeusThe question was asked in quiz.The query is from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Correct choice is (c) Beast

To elaborate: Beast is a powerful RAT BUILD USING the language Delphi 7. One special feature of Beast is that it can help attackers to CREATE all types of Trojans & it has capabilities of multiple TROJAN types.

226.

Which of the following is a remote Trojan?(a) Troya(b) DaCryptic(c) BankerA(d) Game-TrojI got this question by my college director while I was bunking the class.This question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer» RIGHT choice is (a) Troya

To explain I would say: Trojan is a small malicious program that RUNS HIDDEN on the INFECTED system. They are created with the intent and they infected the system by misleading the user. Troya is a remote Trojan that works remotely for its CREATOR.
227.

Backdoors are also known as ______________(a) Malware-doors(b) Trojan-backups(c) Front-doors(d) TrapdoorsThis question was posed to me in an interview.The query is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Correct ANSWER is (d) Trapdoors

Easy EXPLANATION: Trapdoors POPULARLY known as backdoors are used my cyber-criminals as a method in which a system’s security methods can be bypassed UNTRACEABLE.

228.

The threat of backdoors started when ____________ & ____________ OSs became widely accepted.(a) single-user, Windows(b) multiuser, networked(c) single-user, UNIX(d) multiuser, UNIXI have been asked this question in examination.The query is from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer» RIGHT choice is (b) multiuser, NETWORKED

To explain: Hackers take the HELP of backdoor to breach security mechanism & bypassed for stealing different types of information from the TARGET system. The threat of backdoors started when multiuser & networked OS became widely ACCEPTED.
229.

Trojans having backdoors are harmless.(a) True(b) FalseThe question was asked in an internship interview.My question is based upon Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

Correct answer is (b) False

For explanation: Backdoor trojans can cause huge DAMAGE as this is a method used by hackers to breach computer security mechanism. These types of code USUALLY come attached with Trojans programs and can STEAL your PERSONAL data.

230.

A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system’s hardware.(a) crypter(b) virus(c) backdoor(d) key-loggerThis question was posed to me by my school teacher while I was bunking the class.My question is taken from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Right OPTION is (C) backdoor

Easiest explanation: A backdoor may be a HIDDEN part of a PROGRAM, a separate infected program a Trojan in disguise of an executable or code in the FIRMWARE of any system’s hardware.

231.

Backdoors cannot be designed as ______________(a) the hidden part of a program(b) as a part of Trojans(c) embedded code of the firmware(d) embedded with anti-malwareThe question was posed to me in an online quiz.I need to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct choice is (d) embedded with anti-malware

The best explanation: Cyber-criminals use BACKDOORS as a means through which they can bypassed security postures UNTRACEABLE. They may be a hidden part of a program, a separate INFECTED program a Trojan in DISGUISE of an executable or code in the firmware of any system’s hardware.

232.

Trojan-Spy programs can keep an eye on how you are using your system.(a) True(b) FalseThis question was addressed to me in an online quiz.I would like to ask this question from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (a) True

To explain I would say: Trojan-Spy programs can keep an eye on how you are using your system. These are one of the most notorious silent observers which EVEN track your BROWSING data and RECORD your BEHAVIOUR. Also, it keeps track of all the programs you use.

233.

A ___________ is a method in which a computer security mechanism is bypassed untraceable for accessing the computer or its information.(a) front-door(b) backdoor(c) clickjacking(d) key-loggingI have been asked this question in my homework.This question is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct CHOICE is (B) backdoor

Best explanation: Using backdoors hackers can breach computer security mechanism for accessing the computer or its information. This type of CODE usually comes ATTACHED with Trojans.

234.

The ______________ can cost you money, by sending text messages from your mobile phone numbers.(a) IM – Trojans(b) Backdoor Trojans(c) SMS Trojan(d) Ransom TrojanThe question was posed to me at a job interview.Origin of the question is Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (c) SMS Trojan

To explain I would say: The SMS Trojans can COST you money, by sending text messages from your mobile phone numbers. These generally target the smart-phones & some of them are DESIGNED to send their own COMPOSED SMS also, to embarrass the receiver as well as the SENDER of the SMS.

235.

_____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.(a) IM – Trojans(b) Backdoor Trojans(c) Trojan-Downloader(d) Ransom TrojanThis question was addressed to me in quiz.I need to ask this question from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (d) RANSOM Trojan

Explanation: Ransom Trojan can modify DATA on your system – so that your system doesn’t run correctly or you can no longer access SPECIFIC data, or it MAY even ask for ransom in order to give your access.

236.

A/an ___________ is a program that steals your logins & passwords for instant messaging applications.(a) IM – Trojans(b) Backdoor Trojans(c) Trojan-Downloader(d) Ransom TrojanThe question was posed to me in an interview.Enquiry is from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct CHOICE is (a) IM – Trojans

To explain: An IM TROJAN is a program that steals your LOGINS & passwords for instant MESSAGING applications. It popularly attacked APPS like AOL, Yahoo Pager, and Skype with vulnerabilities.

237.

____________ work in background & keeps on downloading other malicious programs when the system is online.(a) DDoS-Trojan(b) Backdoor Trojan(c) Trojan-Banker(d) Trojan-DownloaderThis question was posed to me in examination.Question is taken from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Correct CHOICE is (d) Trojan-Downloader

To explain: Trojan-Downloader is a special type of trojans that work SECRETLY & KEEP on DOWNLOADING other malicious programs when the system is online. They can also download & INSTALL new versions of malicious programs.

238.

______________ perform automated DoS (Denial of Service) attacks on a targeted web address.(a) DDoS-Trojan(b) Backdoor Trojan(c) Trojan-Banker(d) Trojan-DownloaderI got this question by my college professor while I was bunking the class.This interesting question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security

Answer»

Right choice is (a) DDoS-Trojan

Explanation: DDoS Trojan performs automated DoS (DENIAL of Service) attacks on a targeted WEB address. By sending multiple requests from your SYSTEM, it can target different WEBSITES which can lead to a Denial of Service attack.

239.

Trojan-Downloader is a special type of trojans which can download & install new versions of malicious programs.(a) True(b) FalseThis question was posed to me in a national level competition.I need to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (a) True

The best I can explain: Trojan-Downloader is another TYPE of trojans that can download & install new versions of malicious programs. They work SECRETLY & KEEP on DOWNLOADING other malicious programs when the system is online.

240.

_______________ programs are specially designed for stealing your account data for online banking systems, e-payment services & credit/debit cards.(a) DDoS-Trojan(b) Backdoor Trojan(c) Trojan-Banker(d) Trojan-DownloaderThis question was posed to me in an online quiz.My query is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer» CORRECT CHOICE is (c) Trojan-Banker

The best I can explain: Trojan-Banker is programs are specially designed for STEALING your account data for online banking systems, e-payment services & credit/debit cards. They work SILENTLY in the back of the system process to steal such data.
241.

A _______________ provides malicious users remote control over the targeted computer.(a) DDoS-Trojan(b) Backdoor Trojan(c) Trojan-Banker(d) Trojan-DownloaderThis question was posed to me by my school principal while I was bunking the class.My doubt stems from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (b) Backdoor Trojan

To elaborate: A Backdoor Trojan provides malicious users remote CONTROL over the targeted computer. These trojans ENABLE the AUTHOR to perform anything they desire on the infected system which includes sending, receiving, launching & deleting files.

242.

Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.(a) virus, cyber-criminals(b) malware, penetration testers(c) trojans, cyber-criminals(d) virus, penetration testersI got this question during a job interview.Question is from Attack Vectors in division Understanding Attack Vectors of Cyber Security

Answer»

Correct choice is (c) trojans, cyber-criminals

To explain: Once activated, trojans can ENABLE cyber-criminals to spy on the victim, steal their SENSITIVE INFORMATION & gain BACKDOOR ACCESS to the system.

243.

Trojans can not ______________(a) steal data(b) self-replicate(c) steal financial information(d) steal login credentialsThe question was posed to me in unit test.The origin of the question is Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Right option is (B) self-replicate

To elaborate: A TROJAN is a MALICIOUS program that runs hidden on the INFECTED system. They are developed with the intent and they infected the system by misleading the user. It works behind the system and steals sensitive data but cannot self-replicate.

244.

Some Trojans carry ransomware with them to encrypt the data and ask for ransom.(a) True(b) FalseThis question was posed to me during an online exam.This interesting question is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer» CORRECT answer is (a) True

To explain: Trojans are usually created to carry out the following actions LIKE: modify data, COPY data to its creator, delete data from the infected system or blocking data by CARRYING ransomware embedded in it.
245.

Trojans do not do one of the following. What is that?(a) Deleting Data(b) Protecting Data(c) Modifying Data(d) Copying DataThe question was posed to me during an interview.My enquiry is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer»

The correct option is (b) Protecting Data

The explanation is: Trojans perform malicious ACTIONS and operations. These are to modify data, copy data to its creator, DELETE data from the INFECTED system or blocking data by CARRYING ransomware or other malicious PROGRAMS along with it.

246.

Which of the following port is not used by Trojans?(a) UDP(b) TCP(c) SMTP(d) MPI got this question in an interview for internship.Question is taken from Attack Vectors in chapter Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (d) MP

Best EXPLANATION: MP is not a valid PORT name and does not have any port number ALSO. But usually, Trojans likeBack Orifice, Deep Throat use UDP port; Trojans like Netbus, Master Paradise uses TCP & SMTP port to gain access to a system.

247.

Which of them is not a proper way of getting into the system?(a) IM(b) Attachments(c) Official product sites(d) Un-trusted sites, freeware and pirated softwareI had been asked this question in quiz.This key question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct OPTION is (c) Official product sites

The explanation: Official product sites such as Microsoft’s site giving the option for downloading their updates and OS won’t contain any Trojans. Other than that Trojans can access your system by EMAIL attachments, Instant Messaging APPS, un-trusted sites & links.

248.

Trojan creators do not look for _______________(a) Credit card information(b) Confidential data(c) Important documents(d) Securing systems with such programsThis question was posed to me during an online exam.I'm obligated to ask this question of Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

The correct CHOICE is (d) Securing systems with such programs

The best I can explain: Trojan creators do not look for securing victim’s system with their programs, rather they create such TROJANS for stealing CREDIT card and financial DETAILS as well as important documents and files.

249.

By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.(a) Trojan(b) Virus(c) Antivirus(d) Anti-malwareThis question was posed to me by my college professor while I was bunking the class.The doubt is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

Correct CHOICE is (a) Trojan

Explanation: By gaining access to the Trojaned system the ATTACKER can stage different types of attack using that Trojan PROGRAM running in the BACKGROUND when the infected user’s system goes ONLINE.

250.

A ___________ is a small malicious program that runs hidden on infected system.(a) Virus(b) Trojan(c) Shareware(d) AdwareI got this question during an online exam.My question is taken from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security

Answer»

Right answer is (b) Trojan

Explanation: A Trojan is a small malicious program that RUNS hidden on the infected SYSTEM. They are created with the intent and they infected the system by misleading the USER. It WORKS in the background and STEALS sensitive data.