8. In which of following step, information of the organization is collected?
a) Vulnerability Researching b) Scanning
c) Reconnaissance d) None Explanation: Foot printing (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. ... 9. Which of the following is used to send large numbers of unwanted emails? a) Trojan Horse b) Zombie c) Logic Bomb d) Spammer 10. Which of following attack does send fake SYN packets to target system? a) DOS b) Sniffing c) Trapdoor d) None 11. __________ will not allow unauthorized modification of information? a) Integrity b) Availability c) Confidentiality d) None 12. Which of the following will not allow unauthorized information access? a) Authentication b) Availability c) Confidentiality d) None