Tag: security

Questions Related to security

You have entered www.google.com in the URL and page is redirected to www.yahoo.com. In this scenario you have been _________________.

  1. IP Spoofed

  2. DNS Spoofed

  3. Email Spoofed

  4. Packet Spoofed


Correct Option: B

AI Explanation

To answer this question, you need to understand the concept of DNS spoofing.

Option A) IP Spoofed - This option is incorrect because IP spoofing involves disguising the source IP address in a packet to hide the identity of the sender. It is not relevant to the scenario described in the question.

Option B) DNS Spoofed - This option is correct. DNS spoofing, also known as DNS cache poisoning, occurs when the DNS (Domain Name System) records are manipulated to redirect traffic from a legitimate website to a malicious or unauthorized website. In the given scenario, the redirection from www.google.com to www.yahoo.com indicates that the DNS records have been tampered with, resulting in the website being redirected.

Option C) Email Spoofed - This option is incorrect because email spoofing refers to the creation of email messages with a forged sender address to deceive the recipient. It is not relevant to the scenario described in the question.

Option D) Packet Spoofed - This option is incorrect because packet spoofing involves forging the source or destination address in an IP packet to deceive network devices. It is not relevant to the scenario described in the question.

The correct answer is B) DNS Spoofed. This option is correct because the redirection from www.google.com to www.yahoo.com indicates that the DNS records have been manipulated or spoofed.

  1. Include the authentication element.

  2. Include the authorization element.

  3. Include the identity element.

  4. Include the deny element.


Correct Option: B
  1. Cross site Scripting

  2. Injection flaws

  3. Privilege Escalation

  4. None of the above


Correct Option: C
  1. Server side Validation

  2. Client side Validation

  3. None of the above

  4. Both 1 and 2


Correct Option: B
  1. Privilege Escalations

  2. Path traversal Attack

  3. Cross Site Scripting

  4. Buffer overflow


Correct Option: B
  1. an ASCII file that contains an entry for each user

  2. File which is created and maintained by a server of activity performed by it.

  3. short python program that prints the list of all files inside the current directory

  4. File which is created and maintained by the operating system


Correct Option: B