in Education by
___________ will give you an USB which will contain ___________ that will take control of your system in the background. (a) Attackers, Trojans (b) White hat hackers, antivirus (c) White hat hackers, Trojans (d) Attackers, antivirus The question was posed to me in an interview. I'd like to ask this question from How Security Breach Takes Place topic in division Security Ethics, Security Breach Scenarios & Corporate Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct answer is (a) Attackers, Trojans Best explanation: To do a security breaching in your system, your friend or anyone whom you deal with may come up with a USB drive and will give you to take from you some data. But that USB drive may contain Trojan that will get to your computer once triggered. So try using updated antivirus in your system.

Related questions

0 votes
    ________________ are piece of programs or scripts that allow hackers to take control over any system. (a) Exploits (b ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    An attacker, who is an employee of your firm may ___________ to know your system password. (a) do peeping (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Adware will not come to your system if you are using Chrome. (a) True (b) False The question was ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    By gaining access to the Trojaned system the attacker can stage different types of attack using that ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    A/an ___________ is a program that steals your logins & passwords for instant messaging applications. (a) ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
0 votes
    Trojan-Spy programs can keep an eye on how you are using your system. (a) True (b) False This ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
...