13. Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?

A. Pharming
C. Mimicking
B. Website-Duplication
D. Spamming
14. A Proxy server is used for which of the following?
A. To provide security against unauthorized users
B. To process client requests for web pages
C. To process client requests for database access
D. To provide TCP/IP
15. Passwords enable users to
A. get into the system quickly
B. make efficient use of time
C. retain confidentiality of files
D. simplify file structures
16. Which will not harm computer resources?
A. Firewall
C. Trojan horse
B. Virus
D. None of the above
17. A program designed to destroy data on your computer which can travel to "infect" other computers is called a
A. Disease
C. Hurricane
B. Torpedo
D. virus
A are legitimate programs that allow unauthorized access
18. Trojan-Horse programs
B. are hacker programs that do not show up on the system
C. really do not usually work
D. are usually immediately discovered
19. What is a backup"
A Restoring the information backup
B. An exact copy of a system's information
C. The ability to get a system up and running in the event of a system crash or failure
D. All of these

1 answer

Here are the answers to your questions:

  1. A. Pharming
    Pharming refers to the hacking approach where attackers redirect users from legitimate websites to fraudulent ones to steal sensitive information.

  2. B. To process client requests for web pages
    A proxy server acts as an intermediary between a client and the internet, primarily processing client requests for web pages and handling data transfer.

  3. C. retain confidentiality of files
    Passwords are primarily used to protect sensitive information and maintain confidentiality.

  4. A. Firewall
    A firewall is designed to protect computer resources from unauthorized access and does not harm computer systems.

  5. D. virus
    A virus is a type of malicious software designed to replicate itself and interfere with the operation of computers and networks, often destroying data in the process.

  6. A. are legitimate programs that allow unauthorized access
    Trojan horse programs pose as legitimate software but can provide unauthorized access to systems.

  7. D. All of these
    A backup generally refers to an exact copy of a system's information, which aids in restoring data and getting a system operational after a failure.

Feel free to ask if you need further clarification on any of these topics!