

This attack can cause a system or application crash and can lead to malicious entry-point.ħ. When there is an excessive amount of data flow, which the system cannot handle, _ attack takes place.Įxplanation: The Buffer overflow attack takes place when an excessive amount of data occurs in the buffer, which it cannot handle and lead to data being over-flow into its adjoined storage. This can hamper the reputation of a site and the attacker may place any private data or personal credentials.Ħ. What is “this” attack referred to here?Įxplanation: XSS attack can be infused by putting the malicious code (which gets automatically run) in any comment section or feedback section of any webpage (usually a blogging page). This attack can be deployed by infusing a malicious code in a website’s comment section. This allows the attacker to run malicious code and take access to the database of that server.Įxplanation: Cross Site Scripting is another popular web application attack type that can hamper the reputation of any site.ĥ. _ is a code injecting method used for attacking the database of a system / website.Įxplanation: SQLi (Structured Query Language Injection) is a popular attack where SQL code is targeted or injected for breaking the web application having SQL vulnerabilities.

Who deploy Malwares to a system or network?Ī) Criminal organizations, Black hat hackers, malware developers, cyber-terroristsī) Criminal organizations, White hat hackers, malware developers, cyber-terroristsĬ) Criminal organizations, Black hat hackers, software developers, cyber-terroristsĭ) Criminal organizations, gray hat hackers, Malware developers, Penetration testersĮxplanation: Criminal-minded organizations, groups and individuals cyber-terrorist groups, Black hat hackers, malware developers etc are those who can deploy malwares to any target system or network in order to deface that system.ģ. Examples of some common malware are Virus, Trojans, Ransomware, spyware, worms, rootkits etc.Ģ. Explanation: Different types of harmful software and programs that can pose threats to a system, network or anything related to cyberspace are termed as Malware.
