
CYBER HUNT 2K25 ROUND 1
Authored by Santhoshkumar M
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?
ip tracker
emails
websites
web pages
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system in which of the following attack?
Clickjacking
Buffer-overflow
Phishing
MiTM
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following term refers to a group of hackers who are both white and black hat?
Yellow Hat hackers
White-Black Hat Hackers
Grey Hat hackers
Red Hat Hackers
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which one of the following can be considered as the class of computer threats?
Dos Attack
Phishing
Soliciting
Both B and C
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Identify which of the following can be considered instances of Open design.
DVD Player
CSS
Only B
Both A and B
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is considered an element of cyber security?
Network security
Operational security
Application security
All of the above
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which type of attack involves sending fake emails to steal information?
Trojan Attack
Phishing
Spoofing
Worm
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?