Tag: security

Questions Related to security

You have entered www.google.com in the URL and page is redirected to www.yahoo.com. In this scenario you have been _________________.

  1. IP Spoofed

  2. DNS Spoofed

  3. Email Spoofed

  4. Packet Spoofed


Correct Option: B

Kevin and his friends are going through a local IT firm's garbage. Which of the following best describes this activity?

  1. Reconnaissance

  2. Intelligence Gathering

  3. Social Engineering

  4. Dumpster Diving


Correct Option: D

AI Explanation

To answer this question, you need to understand the concept of dumpster diving.

Option A) Reconnaissance - This option is incorrect. Reconnaissance refers to the process of collecting information about a target or location, typically through observation or surveillance. It is not specifically related to going through garbage.

Option B) Intelligence Gathering - This option is incorrect. Intelligence gathering involves collecting information through various sources and methods, such as surveillance, interviews, or analysis. It is a broader term that includes activities beyond going through garbage.

Option C) Social Engineering - This option is incorrect. Social engineering refers to the manipulation of individuals to gain unauthorized access or information. It typically involves psychological manipulation rather than physically going through garbage.

Option D) Dumpster Diving - This option is correct. Dumpster diving is the act of searching through trash or garbage, usually in search of discarded items or information. In this scenario, Kevin and his friends are going through a local IT firm's garbage, which aligns with the activity of dumpster diving.

The correct answer is D) Dumpster Diving.

  1. Include the authentication element.

  2. Include the authorization element.

  3. Include the identity element.

  4. Include the deny element.


Correct Option: B
  1. Cross site Scripting

  2. Injection flaws

  3. Privilege Escalation

  4. None of the above


Correct Option: C
  1. Server side Validation

  2. Client side Validation

  3. None of the above

  4. Both 1 and 2


Correct Option: B
  1. Privilege Escalations

  2. Path traversal Attack

  3. Cross Site Scripting

  4. Buffer overflow


Correct Option: B
  1. an ASCII file that contains an entry for each user

  2. File which is created and maintained by a server of activity performed by it.

  3. short python program that prints the list of all files inside the current directory

  4. File which is created and maintained by the operating system


Correct Option: B