Filters
Question type

​A botnet has a server that is controlled by hackers.

A) True
B) False

Correct Answer

verifed

verified

​__________ are standalone programs that masquerade as useful utilities or applications

Correct Answer

verifed

verified

​RATs can be used to create a backdoor to a victim's device that  takes control of the device's camera.

A) True
B) False

Correct Answer

verifed

verified

​A(n) ______________  attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.


A) zero-day​
B) ​rootkit
C) ​brute force
D) ​dictionary

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

​Password _________ is a measure in bits of a password's unpredictability.

Correct Answer

verifed

verified

​A(n)_______ password is difficult to hack.

Correct Answer

verifed

verified

​ IMSI catchers are operated by cellular service companies.

A) True
B) False

Correct Answer

verifed

verified

​Hackers who gain control over several computers can organize them into a client-server network known as a(n)_______.

Correct Answer

verifed

verified

​A ___________  is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.


A) ​DDoS
B) ​TLS
C) ​PUP
D) ​RAT

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

D

​The most common types of PUPs and PUAs are toolbars and alternative browsers.

A) True
B) False

Correct Answer

verifed

verified

​There are various encryption methods, but __________ is the encryption standard currently used worldwide.


A) ​AES
B) ​DDoS
C) ​IMSI
D) ​TLS

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

​Passwords used as encryption ________ help to make hijacked data unusable.

Correct Answer

verifed

verified

​Hackers can use ports to communicate with devices in botnets.

A) True
B) False

Correct Answer

verifed

verified

True

​Any data entering a digital device could be malware.

A) True
B) False

Correct Answer

verifed

verified

​OS X devices include a utility that automatically encrypts data stored locally.

A) True
B) False

Correct Answer

verifed

verified

​Most mass-mailing databases are legitimately compiled from customer lists.

A) True
B) False

Correct Answer

verifed

verified

False

​Blacklist and header filtering is usually performed by email clients and Webmail services.

A) True
B) False

Correct Answer

verifed

verified

​Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols.


A) entropy​
B) ​massive
C) ​dictionary
D) ​brute force

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

​Microsoft uses a service called  Safe Browsing to alert users about sites to avoid.

A) True
B) False

Correct Answer

verifed

verified

​______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.


A) ​Evil Twin
B) ​Address spoofing
C) ​Social engineering
D) ​None of the above

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 1 - 20 of 106

Related Exams

Show Answer