Hacktivists use hacking techniques to raise awareness, protest against injustices, or support specific movements by targeting organizations, governments, or corporations they oppose.
Common hacktivist activities include:
Q: What are the forms of password cracking techniques?
Attacksyllable
AttackBrut Forcing
AttackHybrid
All the above
[ Option D ]
Password Cracking is the process of attempting to discover or recover a password to gain unauthorized or authorized access to a system, account, or network. It is performed either to recover forgotten passwords or, more maliciously, to break into systems by guessing the correct password.
Attackers use various automated tools and techniques to systematically guess or decrypt passwords by exploiting weak or commonly used ones.
Q: _________ is malicious software that alters the regular functionality of an OS, takes full control on the targeted system and acts as the system administrator on the victim’s system.
Spyware
Virus
Rootkit
Trojan Horse
[ Option C ]
A Rootkit is a type of Malicious Software (Malware) designed to gain unauthorized administrator-level control over an operating system. Once installed, it alters the normal functioning of the OS, allowing the attacker to take full control of the system and act as its administrator.
Rootkits are especially dangerous because they actively hide themselves, making detection and removal very difficult.
Malware Type | Description |
---|---|
Virus | Infects files and programs, spreads when infected files are shared or executed. |
Worm | Self-replicating malware that spreads across networks without user action. |
Trojan Horse | Appears as legitimate (genuine) software but secretly creates backdoors or installs malware. |
Rootkit | Hides deep in the OS, modifies system functions, and gives attackers administrator control. |
Spyware | Monitors user activities, stealing data such as browsing history, keystrokes, and credentials. |
Ransomware | Encrypts files and demands payment for the decryption key. |
Adware | Displays intrusive advertisements, often bundled with free software. |
Keylogger | Records user keystrokes to steal sensitive information like passwords and credit card details. |
Thank you so much for taking the time to read my Computer Science MCQs section carefully. Your support and interest mean a lot, and I truly appreciate you being part of this journey. Stay connected for more insights and updates! If you'd like to explore more tutorials and insights, check out my YouTube channel.
Don’t forget to subscribe and stay connected for future updates.