Web Security Quiz

Description: Web Security Quiz
Number of Questions: 5
Created by:
Tags: security
Attempted 0/5 Correct 0 Score 0

Which of the following is most likely to install a "backdoor" internet connection?

  1. Trojan

  2. Virus

  3. Worm

  4. Adware


Correct Option: C

AI Explanation

To answer this question, you need to understand the different types of malicious software and their functionalities. Let's go through each option to understand why it is correct or incorrect:

Option A) Trojan - This option is correct. A Trojan is a type of malicious software that disguises itself as a legitimate program to trick users into installing it. Once installed, a Trojan can create a "backdoor" internet connection, allowing unauthorized access to a user's computer.

Option B) Virus - This option is incorrect. A virus is a type of malicious software that can replicate and spread itself by attaching to other programs or files. While a virus can cause various types of damage to a computer, it does not typically install a "backdoor" internet connection.

Option C) Worm - This option is incorrect. A worm is a type of malicious software that can replicate itself and spread across networks without requiring user interaction. While a worm can cause significant harm by consuming network bandwidth and disrupting systems, it does not typically install a "backdoor" internet connection.

Option D) Adware - This option is incorrect. Adware is a type of software that displays unwanted advertisements on a user's computer. While adware can be annoying and intrusive, it does not typically install a "backdoor" internet connection.

The correct answer is Option A) Trojan. This option is correct because a Trojan is most likely to install a "backdoor" internet connection, allowing unauthorized access to a user's computer.

You have entered www.google.com in the URL and page is redirected to www.yahoo.com. In this scenario you have been _________________.

  1. IP Spoofed

  2. DNS Spoofed

  3. Email Spoofed

  4. Packet Spoofed


Correct Option: B

AI Explanation

To answer this question, you need to understand the concept of DNS spoofing.

Option A) IP Spoofed - This option is incorrect because IP spoofing involves disguising the source IP address in a packet to hide the identity of the sender. It is not relevant to the scenario described in the question.

Option B) DNS Spoofed - This option is correct. DNS spoofing, also known as DNS cache poisoning, occurs when the DNS (Domain Name System) records are manipulated to redirect traffic from a legitimate website to a malicious or unauthorized website. In the given scenario, the redirection from www.google.com to www.yahoo.com indicates that the DNS records have been tampered with, resulting in the website being redirected.

Option C) Email Spoofed - This option is incorrect because email spoofing refers to the creation of email messages with a forged sender address to deceive the recipient. It is not relevant to the scenario described in the question.

Option D) Packet Spoofed - This option is incorrect because packet spoofing involves forging the source or destination address in an IP packet to deceive network devices. It is not relevant to the scenario described in the question.

The correct answer is B) DNS Spoofed. This option is correct because the redirection from www.google.com to www.yahoo.com indicates that the DNS records have been manipulated or spoofed.

Kevin and his friends are going through a local IT firm's garbage. Which of the following best describes this activity?

  1. Reconnaissance

  2. Intelligence Gathering

  3. Social Engineering

  4. Dumpster Diving


Correct Option: D

AI Explanation

To answer this question, you need to understand the concept of dumpster diving.

Option A) Reconnaissance - This option is incorrect. Reconnaissance refers to the process of collecting information about a target or location, typically through observation or surveillance. It is not specifically related to going through garbage.

Option B) Intelligence Gathering - This option is incorrect. Intelligence gathering involves collecting information through various sources and methods, such as surveillance, interviews, or analysis. It is a broader term that includes activities beyond going through garbage.

Option C) Social Engineering - This option is incorrect. Social engineering refers to the manipulation of individuals to gain unauthorized access or information. It typically involves psychological manipulation rather than physically going through garbage.

Option D) Dumpster Diving - This option is correct. Dumpster diving is the act of searching through trash or garbage, usually in search of discarded items or information. In this scenario, Kevin and his friends are going through a local IT firm's garbage, which aligns with the activity of dumpster diving.

The correct answer is D) Dumpster Diving.

- Hide questions