Tag: security

Questions Related to security

You have entered www.google.com in the URL and page is redirected to www.yahoo.com. In this scenario you have been _________________.

  1. IP Spoofed

  2. DNS Spoofed

  3. Email Spoofed

  4. Packet Spoofed


Correct Option: B

Hackers often gain entry to a network be pretending to be at a legitimate computer.

  1. Phishing

  2. Forging

  3. ID Theft

  4. IP Spoofing


Correct Option: D

AI Explanation

To answer this question, you need to understand the concept of how hackers gain entry to a network by pretending to be at a legitimate computer.

Option A) Phishing - This option is incorrect because phishing is a method where hackers trick individuals into revealing sensitive information, such as usernames, passwords, or credit card details, by pretending to be a trustworthy entity through email, phone calls, or fake websites.

Option B) Forging - This option is incorrect because forging typically refers to creating counterfeit documents or imitating someone's signature. It is not directly related to hackers gaining entry to a network by pretending to be at a legitimate computer.

Option C) ID Theft - This option is incorrect because identity theft involves stealing someone's personal information, such as their name, Social Security number, or credit card details, for fraudulent purposes. It does not directly relate to hackers pretending to be at a legitimate computer to gain entry to a network.

Option D) IP Spoofing - This option is correct because IP spoofing is a technique used by hackers to forge or fake the source IP address of a packet to make it appear as if it is coming from a legitimate computer on the network. By doing this, hackers can bypass network security measures and gain unauthorized access to the network.

The correct answer is D) IP Spoofing. This option is correct because it accurately describes the method that hackers use to gain entry to a network by pretending to be at a legitimate computer.

  1. Include the authentication element.

  2. Include the authorization element.

  3. Include the identity element.

  4. Include the deny element.


Correct Option: B
  1. Cross site Scripting

  2. Injection flaws

  3. Privilege Escalation

  4. None of the above


Correct Option: C
  1. Server side Validation

  2. Client side Validation

  3. None of the above

  4. Both 1 and 2


Correct Option: B
  1. Privilege Escalations

  2. Path traversal Attack

  3. Cross Site Scripting

  4. Buffer overflow


Correct Option: B
  1. an ASCII file that contains an entry for each user

  2. File which is created and maintained by a server of activity performed by it.

  3. short python program that prints the list of all files inside the current directory

  4. File which is created and maintained by the operating system


Correct Option: B