0

Identify the name of attack.

Description: Its a quiz to identify the type of attack
Number of Questions: 6
Created by:
Tags: security technology
Attempted 0/6 Correct 0 Score 0

Name the attack: link to a fake website

  1. keylogger

  2. brute force

  3. phishing

  4. e-mail spoofing


Correct Option: C

Alice access the following URL : http://www.testrun.com/%2e/2e%2e%2e@2e%2f/etc/passwd What is the name of the attack ?

  1. Buffer overflow

  2. Cross site scripting (XSS)

  3. Directory traversal

  4. Obfuscation


Correct Option: C

Name the attack: Technique used to access files and directories stored outside web root folder

  1. Insecure file upload

  2. Path Traversal

  3. Brute forcing

  4. Universal PDF XSS


Correct Option: B
  1. Web cache poisoning

  2. Account Harvesting

  3. Eaves dropping

  4. Cookie Poisoning


Correct Option: D

Name the attack: A software that uses a security hole to carry out an attack before the developer knows about the vulnerability.

  1. Zero day

  2. Unknown

  3. stealth

  4. Trojan


Correct Option: A
Explanation:

To answer this question, the user needs to have knowledge about cybersecurity and different types of attacks. The attack described in the question is a type of cyber attack that exploits a vulnerability before the developer is aware of it.

Option A is correct. This type of attack is called a "zero-day" attack. It refers to an attack that exploits a security vulnerability that the developer or vendor is unaware of and has not had time to patch. Zero-day attacks are particularly dangerous because they can be used to gain unauthorized access to systems or steal sensitive data without being detected.

Option B is incorrect because "unknown" is too broad of a term to refer to a specific type of attack.

Option C is incorrect because "stealth" is a term used to describe the ability of an attack to remain undetected. While zero-day attacks can certainly be stealthy, "stealth" is not the specific term used to describe this type of attack.

Option D is incorrect because a Trojan is a specific type of malware that disguises itself as a legitimate program in order to gain access to a system. While a Trojan can certainly be used in a zero-day attack, the two terms are not interchangeable.

Therefore, the correct answer is:

The Answer is: A. Zero day

- Hide questions