Tag: security

Questions Related to security

It is 802.11 network detector, packet sniffer, and intrusion detection system which work passively.

  1. Kismet

  2. Nmap

  3. Crackspider

  4. John the Ripper


Correct Option: A
  1. Keylogging

  2. Backdoor

  3. Phishing

  4. Masquerading


Correct Option: C
Explanation:

To solve this question, the user needs to be familiar with different hacking techniques. The user must identify the technique used by the hacker to obtain sensitive information from a victim.

The correct answer is:

C. Phishing

Explanation:

Phishing is a technique used by hackers to create a fake website or email to look like an original one to trick the victims into providing sensitive information, such as passwords, credit card numbers, or social security numbers. The fake website or email will usually contain a link to the original website, but when the victim clicks on the link, they will be directed to the fake website where the hacker can obtain their sensitive information.

Option A, Keylogging, is a technique used to record the keystrokes of a victim to obtain their login credentials.

Option B, Backdoor, is a technique used to create a hidden entry point to a computer system to gain access to it later.

Option D, Masquerading, is a general term that refers to any technique used to disguise oneself or one's activities.

Therefore, the correct answer is C. Phishing.

  1. AES

  2. DES

  3. RSA

  4. MARS


Correct Option: B