This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Attack Vectors – Phishing and its Types”.
1. ______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.
a) Phishing attack
b) DoS attack
c) Website attack
d) MiTM attack
View Answer
Explanation: Phishing is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information. There are different types of phishing. Some of them redirect the user to different sites via emails & spyware.
2. In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.
a) URL Redirection
b) DoS
c) Phishing
d) MiTM attack
View Answer
Explanation: Phishing is an internet scam done by hackers to provide classified information. In some of them, cyber-criminals redirect the users to different sites via emails, IMs, and ads.
3. Phishers often develop ______________ websites for tricking users & filling their personal data.
a) legitimate
b) illegitimate
c) genuine
d) official
View Answer
Explanation: Phishing is a category of social engineering attack that is used to steal user data. Phishers often develop illegitimate websites for tricking users & filling their personal data.
4. Which of the following type of data, phishers cannot steal from its target victims?
a) bank details
b) phone number
c) passwords
d) apps installed in the mobile
View Answer
Explanation: Phishers often develop illegitimate websites for tricking users & filling their personal data such as bank account details, phone number, address, username, and passwords etc.
5. Algorithm-Based Phishing was developed in the year __________
a) 1988
b) 1989
c) 1990
d) 1991
View Answer
Explanation: Algorithm-Based Phishing was developed in the year 1990 where the first team of phishers developed an algorithm for generating random credit card numbers for getting an original card’s match.
6. ______________ was the first type of phishing where the phishers developed an algorithm for generating random credit card numbers.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
View Answer
Explanation: Phishing is a category of social engineering attack. In Algorithm-Based Phishing, an algorithm for generating random credit card numbers for getting an original card’s match.
7. Email Phishing came into origin in the year __________
a) 1990
b) 2000
c) 2005
d) 2015
View Answer
Explanation: Email Phishing came into origin in the year 2000 which is more tech-savvy. Here the email is created as if it has been sent from a legitimate source with a legitimate link to its official website.
8. _________________ type of phishing became very popular as if it has been sent from a legitimate source with a legitimate link to its official website.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
View Answer
Explanation: In email phishing, the email is fashioned as if it has been sent from a legitimate source with a legitimate link to its official website. It came into origin in the year 2000.
9. _____________ refers to phishing performed over smart-phone by calling.
a) Algo-based phishing
b) Email-based phishing
c) Domain Phishing
d) Vishing
View Answer
Explanation: Phishers often develop illegitimate websites for tricking users & filling their personal data. Vishing refers to phishing performed over smart-phone by calling. As the phishing is done through voice so it is called vishing = voice + phishing.
10. _____________ = voice + phishing.
a) Algo-based phishing
b) Vishing
c) Domain Phishing
d) Email-based phishing
View Answer
Explanation: Phishing occurs when a cyber-criminal masquerade as a trusted entity. Vishing refers to phishing performed where the phishing is done through voice hence called vishing = voice + phishing.
11. Victims of phishing are mostly ___________________
a) Tech enthusiast
b) Professional computer engineers
c) Lack of computer knowledge
d) Lack of management skill
View Answer
Explanation: Phishers often develop illegitimate websites for tricking users & filling their personal data. Victims of such type of attacks are those users with lack of computer knowledge.
12. ___________________ is usually targeted by nature where the emails are exclusively designed to target any exact user.
a) Algo-based phishing
b) Vishing
c) Domain Phishing
d) Spear phishing
View Answer
Explanation: In spear phishing, hackers usually targeted specifically where the emails are exclusively designed to target any particular user. It occurs when an attacker masquerades the victim a trusted party.
13. ____________ or smishing is one of the simplest types of phishing where the target victims may get a fake order detail with a cancellation link.
a) Algo-based phishing
b) SMS phishing
c) Domain Phishing
d) Spear phishing
View Answer
Explanation: SMS phishing or Smishing is one of the simplest types of phishing where the target victims may get a fake order detail with a cancellation link or any other link that leads you to a malicious link.
14. ________________ phishing is that type of phishing where the construction of a fake webpage is done for targeting definite keywords & waiting for the searcher to land on the fake webpage.
a) Voice
b) SMS
c) Search engine
d) Email
View Answer
Explanation: Search engine phishing is that type of phishing where the construction of a fake webpage is done for targeting definite keywords & waiting for the searcher to land on the fake webpage.
15. Which of the following is not an example or type of phishing?
a) Spear phishing
b) Deceptive phishing
c) Whaling
d) Monkey in the Middle
View Answer
Explanation: Phishing is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information. There are different types of phishing. Some of them are Spear phishing, deceptive phishing, whaling, pharming, vishing.
16. Which of the following is not an example or type of phishing?
a) Tracking
b) Vishing
c) Smishing
d) Pharming
View Answer
Explanation: A popular internet scam done by black hat hackers and crackers to grab confidential information by masquerading is the phishing technique. Smishing, email phishing, whaling, pharming, vishing are some popular types of phishing.
Sanfoundry Global Education & Learning Series – Cyber Security.
To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.
- Practice Programming MCQs
- Practice Computer Science MCQs
- Check Computer Science Books
- Apply for Computer Science Internship
- Practice Cryptography & Network Security MCQ