Header Ads Widget

Responsive Advertisement

Computer System Security Week 2 quiz Solution [Cyber Security course on Prutor.ai]

Here you will get all the assignment and quiz solutions of Computer System Security Course by prutor.ai under the category Cyber Security. Prutor is an online smart tutoring platform which provides various MOOC courses for student and organised by by IIT Kharagpur. At the end of each course student gets a certificate for sucessfull  completion of each course but throughout the course students have to pass all the weekly assignments and quizes.

[1] The storm botnet was used for _____________.

  • (a) Phishing
  • (b) Spamming
  • (c) Hacking
  • (d) None of the above

Answer(b) Spamming


[2] What is a typical cost of launching Denial of Service attack on a website?

  • (a) $20/hr
  • (b) $100/day
  • (c) $300/month
  • (d) Both A and B

Answer (d) Both A and B


[3] Which of the following is correct for silent banker?

  • (a) It is a trojan horse
  • (b) It records keystrokes, captures screens and steals confidential banking credentials and sends them to a remote attacker
  • (c) Both A and B
  • (d) None of the above

Answer(c) Both A and B


[4]  What is Stuxnet?

  • (a) A trojan horse
  • (b) A malicious computer worm
  • (c) A botnet
  • (d) A ransomware

Answer (b) A malicious computer worm


[5] Which of the following it was incorrect for Target company attack?

  • (a) It is an example of server-side attack
  • (b) More than 140 million credit card information was stolen in the attack
  • (c) The attack happened in 2011
  • (d) None of the above

Answer (c) The attack happened in 2011


[6] What is meant by marketplace for vulnerability?

  • (a) A market vulnerable to attacks
  • (b) A market consisting of vulnerable consumers
  • (c) A market to sell and purchase vulnerabilities
  • (d) All of the above

Answer (C) A market to sell and purchase vulnerabilities


[7] Identify the correct bug bounty program name.

  • (a) Google Vulnerability Program
  • (b) Microsoft Bug Bounty Program
  • (c) Mozilla Bounty Program
  • (d) Pwn2Own competition

Answer (d) Pwn2Own competition


[8] What is a typical reward amount for Pwn2Own competition?

  • (a) $15000
  • (b) $1500
  • (c) $150
  • (d) $15

Answer (a) $15000


[9] What is a price for selling windows OS vulnerability in the black market?

  • (a) $60K – $100K
  • (b) $60k – $120K
  • (c) $6000 – $12000
  • (d) None of the above

Answer (b) $60k – $120K


[10] _________ are attempts by individuals to obtain confidential information from you by falsifying their identity.

  • (a) Computer viruses
  • (b) Phishing scams
  • (c) Phishing trips
  • (d) Spyware scams

Answer (b) Phishing scams


[11] Which of the following is correct for MITM?

  • (a) It stands for Man-In-The-Middle attack
  • (b) It happens when a communication between the two systems is intercepted by an outside entity
  • (c) It can happen in any form of online communication, such as email, social media, web surfing, etc
  • (d) All of the above

Answer (d) All of the above


[12] Which of the following describes monitoring software installed without your consent?

  • (a) Malware
  • (b) Adware
  • (c) Spyware
  • (d) Ransomware

Answer (c) Spyware


[13] Which type of cyber-attack is commonly performed through emails?

  • (a) Trojans
  • (b) Worms
  • (c) Ransomware
  • (d) Phishing

Answer (d) Phishing


[14] What is the price for selling Firefox or Safari browser vulnerability in the black market?

  • (a) $60K – $100K
  • (b) $60k – $120K
  • (c) $60K – $150K
  • (d) $60000 – $15000

Answer (c) $60K – $150K


[15] If you share too much information on social media, what may you by at risk of?

  • (a) Identity Theft
  • (b) Ransomware
  • (c) Malware
  • (d) Adware

Answer (a) Identity Theft


So that is the solution of Computer System Security 2nd Week Solution and all the answers are correct.

Post a Comment

0 Comments