in Education by
Which of the following is a micro-virus that can bring down the confidentiality of an email (specifically)? (a) Zeus (b) Stuxnet (c) Reaper Exploit (d) Friday the 13 This question was addressed to me during an online exam. My question is taken from Email Security in chapter Cyber Security Types of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf, Cyber Security questions and solutions, Cyber Security mcq Test , Interview Cyber Security questions, Data Science Questions for Interview, Cyber Security MCQ (Multiple Choice Questions),Core Cyber Security Questions, Core Cyber Security MCQ,core Cyber Security interview questions for experiencedcore Cyber Security interview questions for 3 years experience,Cyber Security programming questions,core Cyber Security interview questions for freshers,Data Science interview questions and answers for freshers, Cyber Security programming questions and answers pdf, Cyber Security interview questions for beginnersCyber Security-Tutorial-for-Beginners,What-is-Cyber Security?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications

1 Answer

0 votes
by
 
Best answer
Right answer is (c) Reaper Exploit For explanation I would say: Reaper exploit is a micro-virus that can compromise the email security as it works in the background and sends a copy of reply or forwarded the email to its creator or sender.

Related questions

0 votes
    Use of _______________ can bring external files and worms and virus along with it to the internal systems. (a) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails. (a) ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of these is not a proper method of maintaining confidentiality? (a) Biometric verification (b) ID and password ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental? (a) They help ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Data ___________ is used to ensure confidentiality. (a) Encryption (b) Locking (c) Deleting (d) Backup This ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an email related hacking tool? (a) Email Finder Pro (b) Sendinc (c) ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of them is not an ideal way of spreading the virus? (a) Infected website (b) Emails (c) ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    _________ are a specific section of any virus or malware that performs illicit activities in a system. (a) Malicious ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ___________________ are some very frequent updates that come for every anti-virus. (a) Patch update (b) Data update ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a type of virus? (a) Boot sector (b) Polymorphic (c) Multipartite (d) ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of them is an example of grabbing email information? (a) Cookie stealing (b) Reverse engineering (c) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
...