in Education by
Which of this is an example of physical hacking? (a) Remote Unauthorised access (b) Inserting malware loaded USB to a system (c) SQL Injection on SQL vulnerable site (d) DDoS (Distributed Denial of Service) attack I have been asked this question during an online interview. I'd like to ask this question from Cyber Attacks Types topic in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct choice is (b) Inserting malware loaded USB to a system The explanation: If a suspicious gain access to server room or into any confidential area with a malicious pen-drive loaded with malware which will get triggered automatically once inserted to USB port of any employee’s PC; such attacks come under physical hacking, because that person in gaining unauthorized physical access to any room or organization first, then managed to get an employee’s PC also, all done physically – hence breaching physical security.

Related questions

0 votes
    Which of them is not an example of physical hacking? (a) Walk-in using piggybacking (b) Sneak-in (c) Break- ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a physical security measure to protect against physical hacking? (a) Add front desk ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Physical Theft ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following is an example of physical layer vulnerability? (a) MAC Address Spoofing (b) Route spoofing ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of them is not an example of physical data leakage? (a) dumpster diving (b) shoulder surfing (c) printers ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of them is an example of physical data leakage? (a) Dumpster diving (b) MiTM (c) DDoS (d) Phishing ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an example of web application hacking? (a) Defacing websites (b) Stealing ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an example of web application hacking? (a) DNS Attack (b) Dumpster diving ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an example of web application hacking technique? (a) LDAP injection (b) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    ________ is the ability of an individual to gain physical access to an authorized area. (a) Network accessing (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    _________ is an act of hacking by the means of which a political or social message is conveyed. (a) Hacktivism ( ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an email related hacking tool? (a) Email Finder Pro (b) Sendinc (c) ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an appropriate way of targeting a mobile phone for hacking? (a) Target ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
...