Types of Cyber Attacks — Prelims Questions
Consider the following statements about cyber attacks: 1. Zero-day exploits target known vulnerabilities for which patches are available 2. Advanced Persistent Threats (APTs) are characterized by short-term, high-impact attacks 3. Social engineering attacks primarily exploit human psychology rather than technical vulnerabilities 4. DDoS attacks can be mitigated through network traffic filtering and load balancing Which of the statements given above are correct?
Which of the following cyber attack types would most likely be used in a state-sponsored campaign targeting critical infrastructure? 1. SQL Injection attacks on government databases 2. Phishing campaigns against key personnel 3. Zero-day exploits in industrial control systems 4. DDoS attacks during national events 5. Insider recruitment for long-term access
Under the Information Technology Act 2000, which section specifically addresses unauthorized access to protected computer systems?
Consider the following cyber attack scenarios: 1. An employee receives an email appearing to be from the CEO requesting urgent wire transfer 2. Attackers flood a government website with traffic during election results 3. Malicious code is injected into a web application's database query 4. A USB device found in a parking lot installs malware when connected Which of these represent social engineering attacks?
Which of the following best describes the primary difference between Advanced Persistent Threats (APTs) and conventional cyber attacks?