Cyber Security Questions and Answers – Attack Vectors – Botnets

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Attack Vectors – Botnets”.

1. A ___________ consists of at least one bot server or controller and one or more client-bots.
a) Virus
b) Trojan
c) Botnet
d) Adware
View Answer

Answer: c
Explanation: The botnet comprises one bot server or controller and one or more client-bots. Botnets are managed by bot-herders. They have become major threats to security as they are getting popular in the cyber-crime world.

2. Botnets are managed by ______________
a) Bot-holders
b) Bot-herders
c) Bot-trainers
d) Bot-creators
View Answer

Answer: b
Explanation: A botnet consists of at least one bot server or controller and one or more client-bots. Botnets are managed by bot-herders. The exact term is bot herders.

3. A _____________ is a number of Internet-connected systems, where each of them is running one or more bots.
a) Trojan
b) Virus
c) Worms
d) Botnet
View Answer

Answer: d
Explanation: A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets are managed by bot-herders. These botnets have become foremost threats to cyber-security.
advertisement
advertisement

4. _____________ are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection.
a) Trojan
b) Virus
c) Botnet
d) Worms
View Answer

Answer: c
Explanation: Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection.

5. Botnets are not used for ______________
a) Perform DDoS
b) Steal bulk amount of sensitive data
c) Spamming
d) Encrypting for ransom
View Answer

Answer: d
Explanation: Botnets usually are not used for encrypting files for ransom. Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection.

6. The owner of botnets can control the botnet using ___________________ software.
a) trojans
b) command and control
c) servers
d) infected servers
View Answer

Answer: b
Explanation: A botnet owner can govern and manage the botnet through command & programs. Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection.

7. The full form of C&C is ____________
a) command and control
b) copy and cut
c) command and capture
d) copy and control
View Answer

Answer: a
Explanation: The owner of botnets can control the botnet using command & control (C&C) software. Botnets are implemented to carry out distributed DDoS attacks, steal data, send spam messages & permits the hacker to access various devices & its connection.
advertisement

8. The word “botnet” is a blend of the words _____________ & ___________
a) robot, network
b) rocket, network
c) bot, network
d) bot, internet
View Answer

Answer: a
Explanation: The word “botnet” is a blend of the words robot & network. Botnets usually are not used for encrypting files for ransom. They are implemented to carry out distributed DDoS attacks, steal data, send spam messages and compromise various services & its connection.

9. Botnets are not the logical connection of which of the following?
a) Smart-phones
b) IoT devices
c) Computer systems
d) Modems
View Answer

Answer: d
Explanation: Botnets are logical connections of smart-phones, IoT devices, computer systems etc. They are strong enough to carry out distributed denial of service attacks & permit hackers to access various devices & its connection.
advertisement

10. Infected computers and other systems within the botnet are called __________
a) killers
b) vampires
c) zombies
d) gargoyles
View Answer

Answer: c
Explanation: Attackers use the botnet for connecting of smart-phones, IoT devices, computer systems etc. These infected computers and other systems within the botnet connection are called zombies or zombie computers.

11. The bot program allows the bot-herders to perform all operations from a ___________ location.
a) local
b) open
c) corporate
d) remote
View Answer

Answer: d
Explanation: Infected computers and other systems within the botnet are called zombies systems which are controlled by bot programs that allow the bot-herders to perform all operations from a remote location.

12. Nowadays, most botnets rely on existing _______________ networks for communication.
a) server-to-server
b) peer-to-peer
c) client-to-server
d) host-to-server
View Answer

Answer: b
Explanation: Botnets are compromised connectivity of systems like smart-phones, IoT devices, computer systems etc. Now-a-days, most botnets rely on existing peer-to-peer networks for communication.

13. Which of the following is not an example of a botnet program?
a) Zeus
b) GameOver
c) ZeroAccess
d) MyDoom
View Answer

Answer: d
Explanation: Examples of some popular botnets are gameover, ZeroAccess, and Zeus. The infect computers & other systems and turned them into zombies which are also called zombies systems.

14. Which of the following is an example of Botnet?
a) Zeus
b) ILOVEYOU
c) Storm Worm
d) MyDoom
View Answer

Answer: a
Explanation: Botnets are can compromise any system and turn them into zombie computers. GameOver, Zeus etc. are examples of some popular botnets programs.

15. Which of the following is an example of a Botnet program?
a) Slammer
b) GameOver
c) Stuxnet
d) Anna Kournikova
View Answer

Answer: b
Explanation: Botnets create logical connections with internet connected devices like smart-phones, IoT devices, computer systems etc. Examples of some popular botnets are GameOver, ZeroAccess, & Zeus.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.