Question
a.
Remote Unauthorised access
b.
Inserting malware loaded USB to a system
c.
SQL Injection on SQL vulnerable site
d.
DDoS (Distributed Denial of Service) attack
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which of this is an example of physical hacking?
Similar Questions
Discover Related MCQs
Q. Which of them is not a wireless attack?
View solution
Q. An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
View solution
Q. Which method of hacking will record all your keystrokes?
View solution
Q. _________ are the special type of programs used for recording and tracking user’s keystroke.
View solution
Q. These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.
View solution
Q. Stuxnet is a _________
View solution
Q. ___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain.
View solution
Q. In general how many key elements constitute the entire security structure?
View solution
Q. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
View solution
Q. This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?
View solution
Q. CIA triad is also known as ________
View solution
Q. When you use the word _____ it means you are protecting your data from getting disclosed.
View solution
Q. ______ means the protection of data from modification by unknown users.
View solution
Q. When integrity is lacking in a security system, _________ occurs.
View solution
Q. _______ of information means, only authorised users are capable of accessing the information.
View solution
Q. Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
View solution
Q. This helps in identifying the origin of information and authentic user. This referred to here as __________
View solution
Q. Data ___________ is used to ensure confidentiality.
View solution
Q. Which of these is not a proper method of maintaining confidentiality?
View solution
Q. Data integrity gets compromised when _____ and _____ are taken control off.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!