Fill in the Blanks: FB 002

Home   Notes  Forum  News  SC  Tips

  
Fill in all the gaps with the best alternative among the given four options. After filling up all the gaps press on "Check" to check your answers.

The options are :
Q1. a. spoofing   b. phishing   c. fiddling   d. daunting

Q2. a. repulsion   b. tout   c. deter   d. lure

Q3. a. uncloaked   b. disguised   c. furtive   d. covert

Q4. a. prowl   b. giddy   c. larceny   d. heist

Q5. a. scattered   b. gathered   c. accumulated   d. hoard

Q6. a. regurgitate   b. swallow   c. expel   d. slurp

Q7. a. bunting   b. jabing   c. poking   d. shoving

Q8. a. chalky   b. ivory   c. piceous   d. murky

Q9. a. aches   b. alleviation   c. pangs   d. lacerations

Q10. a. gripping   b. grousing   c. appreciating   d. grumbling




Swedish bank Nordea was the target of one of the largest online heists. The bank lost between 7 to 8 million Swedish kronor (a little over $1.1 million USD) in a Q1. scam that had been taking place over the last 15 months.
Officials say the "bank robbers" used phishing emails to Q2. bank customers into opening emails with attachments entitled "raking.zip" or "raking.exe." The attachments were Q3. as anti-spam software, but contained a Trojan which security companies called "haxdoor.ki."

Close to 250 Nordea customers were taken by the fraud. It was also said that attacked customers did not have anti-virus software on their computers. Security officials claim Russian organized criminals are responsible for the Q4. , with no less than 121 people suspected to be involved. Even more damning, Swedish police traced computer servers first in the U.S. and then to Russia.

"Haxdoor.ki" is typically know to install keyloggers to record keystrokes, then hides itself using a rootkit. When users attempted to activate their Nordea accounts online, the Trojan automatically responded by bringing the customer to a fake bank homepage.

When the customers entered their personal information, including bank numbers and passwords, the website would load to an error page claiming that the site was having technical difficulties. The criminals then used the Q5. information on the real bank page and withdrew funds from customer accounts.

Passage2
An Australian diver who was partly Q6. head first by a 10ft shark today has described how he survived the attack by Q7. the creature in the head.
Eric Nerhus was diving for abalone shellfish off Cape Howe, around 250 miles south of Sydney on Australia's east coast, when the shark - thought to have been a great white - appeared from Q8. waters and attacked him.
"He stated that he was head first into the shark," a spokeswoman for Snowy Hydro SouthCare rescue service told Reuters after the 41-year-old diver was airlifted to hospital suffering from blood loss and shock.
"When he came to us, he was conscious and alert but had a broken nose and Q9. to both sides of his torso and chest - bite marks all the way around," the spokeswoman added.
Visibility was so poor that Mr Nerhus had not seen the shark approaching, and only realised he was being attacked when he felt the bite and started being shaken, he told fellow divers.
The shark bit him around the head first, crushing his mask and breaking his nose, his co-worker and friend Dennis Luobikis told Reuters. "He was actually bitten by the head ... the shark swallowed his head," Mr Luobikis said, adding that the shark then took a second bite, Q10. its jaw around the diver's torso. , with no less than 121 people suspected to be involved. Even more damning, Swedish police traced computer servers first in the U.S. and then to Russia.