Comprehension

The questions are to be answered on the basis of what is stated or implied in the passage. Choose the most appropriate response that accurately and completely answer the question.
What is phishing ?
Phishing is one of the easiest forms of cyberattack for criminals to carry out, and one of the easiest to fall for. It’s also one that can provide everything hackers need to ransack their targets’ personal and work accounts.
Usually carried out over email – although the phishing scam has now spread beyond suspicious emails to phone calls (so-called ‘vishing’) social media, messaging services (aka ‘smishing’) and apps – a basic phishing attack attempts to trick the target into doing what the scammer wants. That might be handing over passwords to make it easier to hack a company, or altering bank details so that payments go to fraudsters instead of the correct account.
Phishing is also a popular method for cyber attackers to deliver malware, by encouraging victims to download a document or visit a link that will secretly install the malicious payload in attacks that could be distributing trojan malware, ransomware or all manner of damaging and disruptive attacks. The aim and the precise mechanics of the scams vary : for example, victims might be tricked into clicking a link through to a fake web page with the aim of persuading the user to enter personal information – it’s estimated that an average of 1.4 million of these websites are created every month.
More complex phishing schemes can involve a long game, with hackers using fake social media profiles, emails and more to build up a rapport with the victim over months or even years in cases where specific individuals are targeted for data that they would only ever hand over to people they trust.
That data can range from personal or corporate email address and password, to financial data such as credit card details or online banking credentials or even personal data such as date of birth, address and a social security number.
How does a phishing attack work ?
A basic phishing attack attempts to trick a user into entering personal details or other confidential information, and email is the most common method of performing these attacks.
The sheer number of emails sent every single day means that it’s an obvious attack vector for cyber criminals. It’s estimated that 3.7 billion people send around 269 billion emails every single day.
Researchers at Symantec suggest that almost one in every 2,000 of these emails is a phishing email, meaning around 135 million phishing attacks are attempted every day.
Most people simply don’t have the time to carefully analyse every message that lands in their inbox – and it’s this that phishers look to exploit in a number of ways.
Scams vary in their targets – some are aiming at unwary consumers. Here, their email subject line will be designed to catch the victim’s eye – common phishing campaign techniques include offers of prizes won in fake competitions such as lotteries or contests by retailers offering a ‘winning voucher’.
In this example, in order to ‘win’ the prize, the victims are asked to enter their details such as name, date of birth, address and bank details in order to claim. Obviously, there’s no prize and all they’ve done is put their personal details into the hands of hackers.

Question: 1

Select the option that correctly completes the following. Doctors : cardiologist :: _______ .

  • lotteries : victims
  • malware : victims
  • social media : scam
  • criminals : hackers
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is D

Solution and Explanation

The correct option is (D): criminals : hackers.
Was this answer helpful?
0
0
Question: 2

Select the appropriate option to complete the sentence. This text is most likely to be published as a ______ .

  • news item
  • personal narrative
  • speech draft
  • magazine article
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is D

Solution and Explanation

The correct option is (D): magazine article.
Was this answer helpful?
0
0
Question: 3

Select the appropriate option to complete the sentence. The purpose of the prolonged phishing game is to _______ .

  • develop believable profiles
  • research the victims
  • gain in-depth information
  • establish faith
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is D

Solution and Explanation

The correct option is (D): establish faith.
Was this answer helpful?
0
0
Question: 4

What about the victims often works favourably for phishers using emails ?

  • They face language issues
  • They remain very busy
  • They lack tech savviness
  • They have delayed access
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is B

Solution and Explanation

The correct option is (B): They remain very busy.
Was this answer helpful?
0
0
Question: 5

Replace the underlined word with its correct meaning from the given options.
‘Phishers scam people.’

  • loot
  • dupe
  • harm
  • betray
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is B

Solution and Explanation

The correct option is (B): dupe.
Was this answer helpful?
0
0
Question: 6

Which of the following logical relations is/are correct ?

  • Scamming is a superset of which phishing, vishing and smishing are mutuallyexclusive subsets.
  • Scamming and phishing are mutually exclusive sets; vishing and smishing are subsets of phishing.
  • Vishing and smishing are subsets of scamming.
  • None of the above.
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is C

Solution and Explanation

The correct option is (C): Vishing and smishing are subsets of scamming..
Was this answer helpful?
0
0
Question: 7

A company has designed a bot to filter scam emails. The method used by the filter is to convert emails to a code using a proprietary software, and then to check the code to see if it meets the following conditions. If the converted code meets each of the said conditions, then it is filtered out as scam.
  1. The code should not contain special characters (i.e. non-alphanumeric characters)
  2. The code should not contain any character appearing twice consecutively
  3. The code should not contain any character appearing thrice consecutively
  4. The code should not contain any string that contains a numeric character followed by an alphabetical character
Which of the following emails (converted to code) is scam according to the filter ?

  • 55923423
  • ersfjtncjlx
  • 243434p123
  • 3454xxx
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is B

Solution and Explanation

The correct option is (B): ersfjtncjlx.
Was this answer helpful?
0
0
Question: 8

A company has designed a bot to filter scam emails. The method used by the filter is to convert emails to a code using a proprietary software, and then to check the code to see if it meets the following conditions. If the converted code meets each of the said conditions, then it is filtered out as scam.
  1. The code should not contain special characters (i.e. non-alphanumeric characters)
  2. The code should not contain any character appearing twice consecutively
  3. The code should not contain any character appearing thrice consecutively
  4. The code should not contain any string that contains a numeric character followed by an alphabetical character
Which of the following emails (converted to code) is scam according to the filter ?

  • Thisemailisscam
  • Thisemailisnotscam
  • Thisemaillikelyisscam
  • None of the above
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is D

Solution and Explanation

The correct option is (D): None of the above.
Was this answer helpful?
0
0
Question: 9

A company has designed a bot to filter scam emails. The method used by the filter is to convert emails to a code using a proprietary software, and then to check the code to see if it meets the following conditions. If the converted code meets each of the said conditions, then it is filtered out as scam.
  1. The code should not contain special characters (i.e. non-alphanumeric characters)
  2. The code should not contain any character appearing twice consecutively
  3. The code should not contain any character appearing thrice consecutively
  4. The code should not contain any string that contains a numeric character followed by an alphabetical character
Which of the following statements is correct about the conditions used in the filter?

  • Condition (ii) is redundant in light of Condition (iii)
  • Condition (iii) is redundant in light of Condition (ii)
  • Condition (i) is redundant because no codes have special characters in them in any event
  • Both (a) and (b)
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is B

Solution and Explanation

The correct option is (B): Condition (iii) is redundant in light of Condition (ii).
Was this answer helpful?
0
0
Question: 10

A company has designed a bot to filter scam emails. The method used by the filter is to convert emails to a code using a proprietary software, and then to check the code to see if it meets the following conditions. If the converted code meets each of the said conditions, then it is filtered out as scam.
  1. The code should not contain special characters (i.e. non-alphanumeric characters)
  2. The code should not contain any character appearing twice consecutively
  3. The code should not contain any character appearing thrice consecutively
  4. The code should not contain any string that contains a numeric character followed by an alphabetical character
Can this bot be used to filter phishing emails ?

  • This bot will necessarily filter some (but not all) phishing emails.
  • This bot may filter only some (but not all) phishing emails.
  • This bot will not filter any phishing emails.
  • This bot will filter all phishing emails.
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is D

Solution and Explanation

The correct option is (D): This bot will filter all phishing emails..
Was this answer helpful?
0
0
Question: 11

A company has designed a bot to filter scam emails. The method used by the filter is to convert emails to a code using a proprietary software, and then to check the code to see if it meets the following conditions. If the converted code meets each of the said conditions, then it is filtered out as scam.
  1. The code should not contain special characters (i.e. non-alphanumeric characters)
  2. The code should not contain any character appearing twice consecutively
  3. The code should not contain any character appearing thrice consecutively
  4. The code should not contain any string that contains a numeric character followed by an alphabetical character
A scammer has figured out a way to manipulate the working of the bot. However, he has not yet figured out the manner in which the bot categorizes email as scam or not-scam. The loophole works by using a certain “macro” in an email. The “macro” transforms the code of the email into a new code using the following sequential steps: first, letters t – z are transformed into numbers 1 – 7, respectively; second, numbers 1 – 9 are transformed into letters a – i, respectively; and third, number 0 is transformed into the letter j. Which of the following can be codes generated by the “macro” ?

  • Abcgiijg2s
  • Abcgiijgzs
  • Abc0iijgs
  • Abcoiijgs
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is D

Solution and Explanation

The correct option is (D): Abcoiijgs.
Was this answer helpful?
0
0
Question: 12

A company has designed a bot to filter scam emails. The method used by the filter is to convert emails to a code using a proprietary software, and then to check the code to see if it meets the following conditions. If the converted code meets each of the said conditions, then it is filtered out as scam.
  1. The code should not contain special characters (i.e. non-alphanumeric characters)
  2. The code should not contain any character appearing twice consecutively
  3. The code should not contain any character appearing thrice consecutively
  4. The code should not contain any string that contains a numeric character followed by an alphabetical character
The company that created the bot reverse-engineered the scheme of the scammer. The company wants to use the following steps to transform the “macro”-generated code into the original code.
  1. Transform numbers 1 – 7 to letters t – z, respectively
  2. Transform letters a – i to numbers 1 – 9, respectively
  3. Transform letter j to number 0
What is the order in which these steps should be undertaken to fulfil the company’s aim ?

  • (i) followed by (ii) followed by (iii)
  • (iii) followed by (ii) followed by (i)
  • (ii) followed by (i) followed by (iii)
  • These steps, in whichever order, cannot achieve the company’s aim
Hide Solution
collegedunia
Verified By Collegedunia

The Correct Option is D

Solution and Explanation

The correct option is (D): These steps, in whichever order, cannot achieve the company’s aim.
Was this answer helpful?
0
0

Top Questions on Vocabulary

View More Questions