CN&S P

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

8. In which of following step, information of the organization is collected?

a) Vulnerability Researching b) Scanning


c) Reconnaissance d) None
Explanation: Foot printing (also known as reconnaissance) is the technique used for gathering information
about computer systems and the entities they belong to. ...
9. Which of the following is used to send large numbers of unwanted emails?
a) Trojan Horse b) Zombie
c) Logic Bomb d) Spammer
10. Which of following attack does send fake SYN packets to target system?
a) DOS b) Sniffing
c) Trapdoor d) None
11. __________ will not allow unauthorized modification of information?
a) Integrity b) Availability
c) Confidentiality d) None
12. Which of the following will not allow unauthorized information access?
a) Authentication b) Availability
c) Confidentiality d) None

You might also like