MCQOPTIONS
Saved Bookmarks
This section includes 19 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Nowadays, most botnets rely on existing _______________ networks for communication. |
| A. | server-to-server |
| B. | peer-to-peer |
| C. | client-to-server |
| D. | host-to-server |
| Answer» C. client-to-server | |
| 2. |
The bot program allows the bot-herders to perform all operations from a ___________ location. |
| A. | local |
| B. | open |
| C. | corporate |
| D. | remote |
| Answer» E. | |
| 3. |
Infected computers and other systems within the botnet are called __________ |
| A. | killers |
| B. | vampires |
| C. | zombies |
| D. | gargoyles |
| Answer» D. gargoyles | |
| 4. |
The word “botnet” is a blend of the words _____________ & ___________ |
| A. | robot, network |
| B. | rocket, network |
| C. | bot, network |
| D. | bot, internet |
| Answer» B. rocket, network | |
| 5. |
INFECTED_COMPUTERS_AND_OTHER_SYSTEMS_WITHIN_THE_BOTNET_ARE_CALLED___________?$ |
| A. | killers |
| B. | vampires |
| C. | zombies |
| D. | gargoyles |
| Answer» D. gargoyles | |
| 6. |
Nowadays, most botnets rely on existing _______________ networks for communication.$ |
| A. | server-to-server |
| B. | peer-to-peer |
| C. | client-to-server |
| D. | host-to-server |
| Answer» C. client-to-server | |
| 7. |
The bot program allows the bot-herders to perform all operations from a ___________ location.$ |
| A. | local |
| B. | open |
| C. | corporate |
| D. | remote |
| Answer» E. | |
| 8. |
Which of the following is an example of a Botnet program? |
| A. | Slammer |
| B. | GameOver |
| C. | Stuxnet |
| D. | Anna Kournikova |
| Answer» C. Stuxnet | |
| 9. |
Which of the following is an example of Botnet? |
| A. | Zeus |
| B. | ILOVEYOU |
| C. | Storm Worm |
| D. | MyDoom |
| Answer» B. ILOVEYOU | |
| 10. |
Which of the following is not an example of a botnet program? |
| A. | Zeus |
| B. | GameOver |
| C. | ZeroAccess |
| D. | MyDoom |
| Answer» E. | |
| 11. |
Botnets are not the logical connection of which of the following? |
| A. | Smart-phones |
| B. | IoT devices |
| C. | Computer systems |
| D. | Modems |
| Answer» E. | |
| 12. |
The word “botnet” is a blend of the words _____________ & ___________$ |
| A. | robot, network |
| B. | rocket, network |
| C. | bot, network |
| D. | bot, internet |
| Answer» B. rocket, network | |
| 13. |
The full form of C&C is ____________ |
| A. | command and control |
| B. | copy and cut |
| C. | command and capture |
| D. | copy and control |
| Answer» B. copy and cut | |
| 14. |
The owner of botnets can control the botnet using ___________________ software. |
| A. | trojans |
| B. | command and control |
| C. | servers |
| D. | infected servers |
| Answer» C. servers | |
| 15. |
Botnets are not used for ______________ |
| A. | Perform DDoS |
| B. | Steal bulk amount of sensitive data |
| C. | Spamming |
| D. | Encrypting for ransom |
| Answer» E. | |
| 16. |
_____________ are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection. |
| A. | Trojan |
| B. | Virus |
| C. | Botnet |
| D. | Worms |
| Answer» D. Worms | |
| 17. |
A _____________ is a number of Internet-connected systems, where each of them is running one or more bots. |
| A. | Trojan |
| B. | Virus |
| C. | Worms |
| D. | Botnet |
| Answer» E. | |
| 18. |
Botnets are managed by ______________ |
| A. | Bot-holders |
| B. | Bot-herders |
| C. | Bot-trainers |
| D. | Bot-creators |
| Answer» C. Bot-trainers | |
| 19. |
A ___________ consists of at least one bot server or controller and one or more client-bots. |
| A. | Virus |
| B. | Trojan |
| C. | Botnet |
| D. | Adware |
| Answer» D. Adware | |