Our Summary:
Phishing is a type of cyber attack that uses email, phone calls, social media, messaging services, and apps to trick targets into providing personal information or taking other actions that benefit the attacker. These attacks are often used to gain access to personal or corporate accounts, alter bank details, or install malware. The aim of a phisher is to convince the target to trust them, often by building a rapport over time, and to provide personal information such as credit card details, online banking credentials, and more. Phishing attacks are common and can be difficult to spot, with an estimated 1.4 million fake websites created each month.
1. Select the option that correctly completes the following.
Doctors : cardiologist ::
a) lotteries : victims
b) malware: victims
c) social media scam
*d) criminals : hackers
Based on the passage above, the correct option is "criminals : hackers". This analogy is based on the comparison of two different professions, with "criminals" representing one profession and "hackers" representing another. The passage states that hackers often use phishing scams to trick people into giving them personal information, and that these scams are often carried out by criminals. Therefore, the analogy "criminals : hackers" is appropriate because it compares two related professions
2. Select the appropriate option to complete the sentence.
This text is most likely to be published as a
a) news item
b) personal narrative
c) speech draft
*d) magazine article
This text is most likely to be published as a magazine article because it provides detailed information about a topic (phishing) and is written in a formal, informative style. It is not likely to be a news item because it does not provide current, timely information and does not have a news-like structure. It is not likely to be a personal narrative because it does not include personal experiences or stories. It is not likely to be a speech draft because it is written in paragraph form and does not have the structure of a speech.
3. Select the appropriate option to complete the sentence.
The purpose of the prolonged phishing game is to__________
a) develop believable profiles
b) research the victims
C) gain in-depth information
*d) establish faith
The purpose of the prolonged phishing game is to gain rapport with the victims. This is mentioned in the passage. This is because complex phishing schemes involve building a fake rapport with the victims over a long period of time, in order to convince them to provide sensitive information that they would only give to someone they trust. This information can include financial data, personal information, and corporate email credentials, among other things. Gaining this information is the main goal of the prolonged phishing game, through establishing trust.
4. What about the victims often works favourably for phishers using emails ?
a) They face language issues
*b) They remain very busy
c) They lack tech savviness
d) They have delayed access
The victims often work favourably for phishers using emails because they remain very busy and don't have the time to carefully analyze every message that lands in their inbox. This makes it easier for phishers to exploit them with their scams.
5,. Replace the underlined word with its correct meaning from the given options.
'Phishers scam people.'
a) loot *b) dupe c) harm d) betray
dupe is a synonym. Loot is to steal, dupe is to misguide.
LOGIC:
1. Which of the following logical relations is/are correct ?
a) Scamming is a superset of which phishing, vishing and smishing are mutually- exclusive subsets.
b) Scamming and phishing are mutually exclusive sets; vishing and smishing are subsets of phishing.
*c) Vishing and smishing are subsets of scamming.
d) None of the above.
Eventhough (a) looks good too, they can be mutually inclusive - there can be overlaps
A company has designed a bot to filter scam emails. The method used by the filter IS
to convert emails to a code using a proprietary software, and then to check the code
to see if it meets the following conditions. If the converted code meets each of the said
conditions, then it is filtered out as scam.
i. The code should not contain special characters (i.e. non-alphanumeric
characters)
ii.
The code should not contain any character appearing twice consecutively
iii. The code should not contain any character appearing thrice consecutively
iv.
The code should not contain any string that contains a numeric character
followed by an alphabetical character
2. Which of the following emails (converted to code) is scam according to the filter ?
a) 55923423 *b) ersfjtncjlx c) 243434p123 *d) 3454xxx
All the other options violate one condition. a has double 55's, c has a number after a letter, and d has xxx.
3. Which of the following emails (converted to code) is scam according to the filter
a) Thisemailisscam
b) Thisemailisnotscam.
c) Thicemaillikelvisscam
*d) None of the above
There is a "." or a special character in b. While, A and C have ss's repeating.
4. Which of the following statements is correct about the condition used by the filter
*Condition 2 is redundant since 3 will also use the same condition
5. Can this bot be used to filter phishing emails ?
a) This bot will necessarily filter some (but not all) phishing emails.
*b) This bot may filter only some (but not all) phishing emails.
c) This bot will not filter any phishing emails.
d) This bot will filter all phishing emails.
a,c and d are all extreme options and there is no guarantee that it will.
Note - official answer is d and that is not inferrable at all.
6. A scammer has figured out a way to manipulate the working of the bot. However,
he has not yet figured out the manner in which the bot categorizes email as scam or
not-scam. The loophole works by using a certain "macro" in an email. The "macro"
transforms the code of the email into a new code using the following sequential
steps: first, letters t- Z are transformed into numbers 1 - 7, respectively; second,
numbers 1 - 9 are transformed into letters a - i, respectively; and third, number 0
is transformed into the letter J ,* Which of the following can be codes generated by
the "macro" ?
a) Abcgiijg2s
b) Abcgiijgzs
*c) Abc0iijgs
d) Abcoiiigs
technically all options are wrong since s can't be a part of the macro and ii's can't happen. However, if we remove the S (considering it is a typo), C has a 0, and none of the letters transform into 0. 0 can transform into J but not the other way around =)
The official answer is d. None of the other answers follow, since two characters can't repeat. BUT c is the best answer if we are to eliminate this condition
7. The company that created the bot reverse-engineered the scheme of the scammer.
The company wants to use the following steps to transform the "macro"-generated
code into the original code.
i. Transform numbers 1 - 7 to letters t - z, respectively
ii. Transform letters a - i to numbers 1 - 9, respectively
iii. Transform letter J to number 0
What is the order in which these steps should be undertaken to fulfil the company's
aim ?
a) (i) followed by (ii) followed by (iii)
b) (ii) followed by (ii) followed by (i)
c) (ii) followed by (i) followed by (ii)
*d) These steps, in whichever order, cannot achieve the company's aim
- we think there will always be a lopphole since there is no overlap in general. But we'll work this out and update this space SHORTLY!!!