Disclaimer for ReGyan
If you require any more information or you have any problem regarding Copyright or have any questions about our site’s disclaimer, please feel free to contact us by email at hello@regyan.com.
Disclaimers for ReGyan
All the information on this website is published in good faith and for general information and educational purpose only. ReGyan does not make any warranties about the completeness, reliability, and accuracy of this information. Any action you take upon the information you find on this website (regyan.com), is strictly at your own risk. will not be liable for any losses and/or damages in connection with the use of our website.
Computer System Security 2nd Week Solution is given below.
Also See:- Computer System Security 7th Week Solution
[1] The storm botnet was used for _____________.
- (a) Phishing
- (b) Spamming
- (c) Hacking
- (d) None of the above
Answer(b) Spamming
Must watch:- Youtube Channel
[2] What is a typical cost of launching Denial of Service attack on a website?
- (a) $20/hr
- (b) $100/day
- (c) $300/month
- (d) Both A and B
Answer (d) Both A and B
[3] Which of the following is correct for silent banker?
- (a) It is a trojan horse
- (b) It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
- (c) Both A and B
- (d) None of the above
Answer(c) Both A and B
[4] What is Stuxnet?
- (a) A trojan horse
- (b) A malicious computer worm
- (c) A botnet
- (d) A ransomware
Answer (b) A malicious computer worm
[5] Which of the following it was incorrect for Target company attack?
- (a) It is an example of server-side attack
- (b) More than 140 million credit card information was stolen in the attack
- (c) The attack happened in 2011
- (d) None of the above
Answer (c) The attack happened in 2011
[6] What is meant by marketplace for vulnerability?
- (a) A market vulnerable to attacks
- (b) A market consisting of vulnerable consumers
- (c) A market to sell and purchase vulnerabilities
- (d) All of the above
Answer (C) A market to sell and purchase vulnerabilities
[7] Identify the correct bug bounty program name.
- (a) Google Vulnerability Program
- (b) Microsoft Bug Bounty Program
- (c) Mozilla Bounty Program
- (d) Pwn2Own competition
Answer (d) Pwn2Own competition
[8] What is a typical reward amount for Pwn2Own competition?
- (a) $15000
- (b) $1500
- (c) $150
- (d) $15
Answer (a) $15000
Also, See: Computer System Security 1st Week Solution
[9] What is a price for selling windows OS vulnerability in the black market?
- (a) $60K – $100K
- (b) $60k – $120K
- (c) $6000 – $12000
- (d) None of the above
Answer (b) $60k – $120K
[10] _________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
- (a) Computer viruses
- (b) Phishing scams
- (c) Phishing trips
- (d) Spyware scams
Answer (b) Phishing scams
[11] Which of the following is correct for MITM?
- (a) It stands for Man-In-The-Middle attack
- (b) It happens when a communication between the two systems is intercepted by an outside entity
- (c) It can happen in any form of online communication, such as email, social media, web surfing, etc
- (d) All of the above
Answer (d) All of the above
[12] Which of the following describes monitoring software installed without your consent?
- (a) Malware
- (b) Adware
- (c) Spyware
- (d) Ransomware
Answer (c) Spyware
Must See:- Google Recruitment 2020 Apply for Software and Other
[13] Which type of cyber-attack is commonly performed through emails?
- (a) Trojans
- (b) Worms
- (c) Ransomware
- (d) Phishing
Answer (d) Phishing
[14] What is the price for selling Firefox or Safari browser vulnerability in the black market?
- (a) $60K – $100K
- (b) $60k – $120K
- (c) $60K – $150K
- (d) $60000 – $15000
Answer (c) $60K – $150K
[15] If you share too much information on social media, what may you by at risk of?
- (a) Identity Theft
- (b) Ransomware
- (c) Malware
- (d) Adware
Answer (a) Identity Theft
So that is the solution of Computer System Security 2nd Week Solution and all the answers are correct.