in Education by
Which of the following is not done by cyber criminals? (a) Unauthorized account access (b) Mass attack using Trojans as botnets (c) Email spoofing and spamming (d) Report vulnerability in any system The question was posed to me in an online quiz. This intriguing question comes from Cyber Laws and IT laws topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct option is (d) Report vulnerability in any system The explanation: Cyber-criminals are involved in activities like accessing online accounts in unauthorized manner; use Trojans to attack large systems, sending spoofed emails. But cyber-criminals do not report any bug is found in a system, rather they exploit the bug for their profit.

Related questions

0 votes
    Which of these is not a step followed by cyber-criminals in data breaching? (a) Research and info-gathering (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    What types of data are stolen by cyber-criminals in most of the cases? (a) Data that will pay once sold (b ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    _____________ is a malicious method used by cyber-criminals to trick a user into clicking on something different from what ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Cyber-laws are incorporated for punishing all criminals only. (a) True (b) False I had been asked this question ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Every employee of the firm must need to have some basic knowledge of cyber-security and types of hacking and how ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a type of cyber crime? (a) Data theft (b) Forgery (c) Damage to data and ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a type of peer-to-peer cyber-crime? (a) Phishing (b) Injecting Trojans to a ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an example of a computer as weapon cyber-crime? (a) Credit card fraudulent (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following activity is not done by spyware? (a) sell internet usage data (b) capture credit ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following activity is not done by spyware? (a) Monitors your internet activity (b) Track user ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
...