Tricky Cyber Security Questions and Answers on “Attack Vectors – Phishing and its Types”.
1. ______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.
a) Phishing attack
b) DoS attack
c) Website attack
d) MiTM attack
Answer: a
Clarification: Phishing is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information. There are different types of phishing. Some of them redirect the user to different sites via emails & spyware.
2. In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.
a) URL Redirection
b) DoS
c) Phishing
d) MiTM attack
Answer: c
Clarification: Phishing is an internet scam done by hackers to provide classified information. In some of them, cyber-criminals redirect the users to different sites via emails, IMs, and ads.
3. Phishers often develop ______________ websites for tricking users & filling their personal data.
a) legitimate
b) illegitimate
c) genuine
d) official
Answer: b
Clarification: Phishing is a category of social engineering attack that is used to steal user data. Phishers often develop illegitimate websites for tricking users & filling their personal data.
4. Which of the following type of data, phishers cannot steal from its target victims?
a) bank details
b) phone number
c) passwords
d) apps installed in the mobile
Answer: d
Clarification: Phishers often develop illegitimate websites for tricking users & filling their personal data such as bank account details, phone number, address, username, and passwords etc.
5. Algorithm-Based Phishing was developed in the year __________
a) 1988
b) 1989
c) 1990
d) 1991
Answer: c
Clarification: Algorithm-Based Phishing was developed in the year 1990 where the first team of phishers developed an algorithm for generating random credit card numbers for getting an original card’s match.
6. ______________ was the first type of phishing where the phishers developed an algorithm for generating random credit card numbers.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
Answer: a
Clarification: Phishing is a category of social engineering attack. In Algorithm-Based Phishing, an algorithm for generating random credit card numbers for getting an original card’s match.
7. Email Phishing came into origin in the year __________
a) 1990
b) 2000
c) 2005
d) 2015
Answer: b
Clarification: Email Phishing came into origin in the year 2000 which is more tech-savvy. Here the email is created as if it has been sent from a legitimate source with a legitimate link to its official website.
8. _________________ type of phishing became very popular as if it has been sent from a legitimate source with a legitimate link to its official website.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
Answer: b
Clarification: In email phishing, the email is fashioned as if it has been sent from a legitimate source with a legitimate link to its official website. It came into origin in the year 2000.
9. _____________ refers to phishing performed over smart-phone by calling.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
Answer: d
Clarification: Phishers often develop illegitimate websites for tricking users & filling their personal data. Vishing refers to phishing performed over smart-phone by calling. As the phishing is done through voice so it is called vishing = voice + phishing.
10. _____________ = voice + phishing.
a) Algo-based phishing
b) Vishing
c) Domain Phishing
d) Email-based phishing
Answer: b
Clarification: Phishing occurs when a cyber-criminal masquerade as a trusted entity. Vishing refers to phishing performed where the phishing is done through voice hence called vishing = voice + phishing.
11. Victims of phishing are mostly ___________________
a) Tech enthusiast
b) Professional computer engineers
c) Lack of computer knowledge
d) Lack of management skill
Answer: c
Clarification: Phishers often develop illegitimate websites for tricking users & filling their personal data. Victims of such type of attacks are those users with lack of computer knowledge.
12. ___________________ is usually targeted by nature where the emails are exclusively designed to target any exact user.
a) Algo-based phishing
b) Vishing
c) Domain Phishing
d) Spear phishing
Answer: d
Clarification: In spear phishing, hackers usually targeted specifically where the emails are exclusively designed to target any particular user. It occurs when an attacker masquerades the victim a trusted party.
13. ____________ or smishing is one of the simplest types of phishing where the target victims may get a fake order detail with a cancellation link.
a) Algo-based phishing
b) SMS phishing
c) Domain Phishing
d) Spear phishing
Answer: b
Clarification: SMS phishing or Smishing is one of the simplest types of phishing where the target victims may get a fake order detail with a cancellation link or any other link that leads you to a malicious link.
14. ________________ phishing is that type of phishing where the construction of a fake webpage is done for targeting definite keywords & waiting for the searcher to land on the fake webpage.
a) Voice
b) SMS
c) Search engine
d) Email
Answer: c
Clarification: Search engine phishing is that type of phishing where the construction of a fake webpage is done for targeting definite keywords & waiting for the searcher to land on the fake webpage.
15. Which of the following is not an example or type of phishing?
a) Spear phishing
b) Deceptive phishing
c) Whaling
d) Monkey in the Middle
Answer: d
Clarification: Phishing is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information. There are different types of phishing. Some of them are Spear phishing, deceptive phishing, whaling, pharming, vishing.
16. Which of the following is not an example or type of phishing?
a) Tracking
b) Vishing
c) Smishing
d) Pharming
Answer: a
Clarification: A popular internet scam done by black hat hackers and crackers to grab confidential information by masquerading is the phishing technique. Smishing, email phishing, whaling, pharming, vishing are some popular types of phishing.