Question Bank - ICT

Here's the question bank on all the ICT topics.

Match List I with List II List I List II Security threats MeaningA.HackingI.'Clog-up' a user's inbox with unwanted emailsB.PhishingII.Gives the originator access to all data entered by the keyboardC.SpywareIII.Identify fraudD.SpamIV.Illegal use of personal dataChoose the correct answer from the options given below:

A.
A - I, B - III, C - II, D - IV
B.
A - II, B - IV, C - III, D - I
C.
A - IV, B - I, C - III, D - II
D.
A - IV, B - III, C - II, D - I

Solution:

A cyber security threat is any harmful attack that attempts to gain unauthorized access to data, disrupt digital activities, or damaged data. A cyber security threat can be employed by various agents such as corporate spies, hacktivists, terrorist groups, hostile nation-states, etc. Important PointsSecurity threatsMeaning HackingIt is the process of detecting and exploiting security flaws in a computer system or network in order to obtain access to data. It can be also done by clog-up a user's inbox with unwanted emails so that users. In the spirit of a denial of service assault, a new method of attack against AI systems tries to clog up a network and slow down processing. Hacking Technique used by hackers: Botnets, Browser hijacks, Denial of service (DDoS) attacks, Ransomware, Rootkits, Trojans, Viruses, Worms PhishingPhishing is a cyber security threat done by social engineering in which an attacker sends a false message in the hopes of tricking the victim into exposing sensitive information. The attacker will frequently customize an email to communicate personally to you and include information that only a close friend would know. Phishing can also be a targeted attack directed at a single person. That is why Phishing comes under Identity fraud. Types of Phishing: Spear Phishing, Whaling, Vishing, Email Phishing. SpywareSpyware is a term used to define a kind of software that is designed to steal personal or organizational data. When spyware is used intentionally, it is camouflaged in the computer's system files, making it hard to identify. It gives the originator access to all data entered by the keyboardTypes of Spyware: Browser Hijack, Adware, Keyboard LoggersSpam Spam email is an unwanted junk email delivered in bulk to an indiscriminate recipient list. Spam email is generated by botnets, and networks of infected computers. it can use personal data after providing access to attach malware. Types of Spam: Commerical advertisements, Antivirus warnings, Email spoofing, Sweepstakes winners, Money scams. ?Hence, the correct option is A - IV, B - III, C - II, D - I

For more questions,

Click Here

Download Gyanm App

free current affairs for competitive exams

Scan QR code to download our App for
more exam-oriented questions

free current affairs for competitive exams

OR
To get link to download app

Thank you! Your submission has been received. You will get the pdf soon. Call us if you have any question: 9117343434
Oops! Something went wrong while submitting the form.