

MCQOPTIONS
Saved Bookmarks
This section includes 19 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Nowadays, most botnets rely on existing _______________ networks for communication. |
A. | server-to-server |
B. | peer-to-peer |
C. | client-to-server |
D. | host-to-server |
Answer» C. client-to-server | |
2. |
The bot program allows the bot-herders to perform all operations from a ___________ location. |
A. | local |
B. | open |
C. | corporate |
D. | remote |
Answer» E. | |
3. |
Infected computers and other systems within the botnet are called __________ |
A. | killers |
B. | vampires |
C. | zombies |
D. | gargoyles |
Answer» D. gargoyles | |
4. |
The word “botnet” is a blend of the words _____________ & ___________ |
A. | robot, network |
B. | rocket, network |
C. | bot, network |
D. | bot, internet |
Answer» B. rocket, network | |
5. |
INFECTED_COMPUTERS_AND_OTHER_SYSTEMS_WITHIN_THE_BOTNET_ARE_CALLED___________?$ |
A. | killers |
B. | vampires |
C. | zombies |
D. | gargoyles |
Answer» D. gargoyles | |
6. |
Nowadays, most botnets rely on existing _______________ networks for communication.$ |
A. | server-to-server |
B. | peer-to-peer |
C. | client-to-server |
D. | host-to-server |
Answer» C. client-to-server | |
7. |
The bot program allows the bot-herders to perform all operations from a ___________ location.$ |
A. | local |
B. | open |
C. | corporate |
D. | remote |
Answer» E. | |
8. |
Which of the following is an example of a Botnet program? |
A. | Slammer |
B. | GameOver |
C. | Stuxnet |
D. | Anna Kournikova |
Answer» C. Stuxnet | |
9. |
Which of the following is an example of Botnet? |
A. | Zeus |
B. | ILOVEYOU |
C. | Storm Worm |
D. | MyDoom |
Answer» B. ILOVEYOU | |
10. |
Which of the following is not an example of a botnet program? |
A. | Zeus |
B. | GameOver |
C. | ZeroAccess |
D. | MyDoom |
Answer» E. | |
11. |
Botnets are not the logical connection of which of the following? |
A. | Smart-phones |
B. | IoT devices |
C. | Computer systems |
D. | Modems |
Answer» E. | |
12. |
The word “botnet” is a blend of the words _____________ & ___________$ |
A. | robot, network |
B. | rocket, network |
C. | bot, network |
D. | bot, internet |
Answer» B. rocket, network | |
13. |
The full form of C&C is ____________ |
A. | command and control |
B. | copy and cut |
C. | command and capture |
D. | copy and control |
Answer» B. copy and cut | |
14. |
The owner of botnets can control the botnet using ___________________ software. |
A. | trojans |
B. | command and control |
C. | servers |
D. | infected servers |
Answer» C. servers | |
15. |
Botnets are not used for ______________ |
A. | Perform DDoS |
B. | Steal bulk amount of sensitive data |
C. | Spamming |
D. | Encrypting for ransom |
Answer» E. | |
16. |
_____________ are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection. |
A. | Trojan |
B. | Virus |
C. | Botnet |
D. | Worms |
Answer» D. Worms | |
17. |
A _____________ is a number of Internet-connected systems, where each of them is running one or more bots. |
A. | Trojan |
B. | Virus |
C. | Worms |
D. | Botnet |
Answer» E. | |
18. |
Botnets are managed by ______________ |
A. | Bot-holders |
B. | Bot-herders |
C. | Bot-trainers |
D. | Bot-creators |
Answer» C. Bot-trainers | |
19. |
A ___________ consists of at least one bot server or controller and one or more client-bots. |
A. | Virus |
B. | Trojan |
C. | Botnet |
D. | Adware |
Answer» D. Adware | |