Filters
Question type

Hackers can use ports to communicate with devices in botnets.

A) True
B) False

Correct Answer

verifed

verified

Once you have installed antivirus software, you don't typically need to keep it running full time in the background.

A) True
B) False

Correct Answer

verifed

verified

An original message or file that has not yet been encrypted is referred to as ciphertext.

A) True
B) False

Correct Answer

verifed

verified

The most common types of PUPs and PUAs are toolbars and alternative browsers.

A) True
B) False

Correct Answer

verifed

verified

__________ changes an originating address or a destination address to redirect the flow of data between two parties.


A) Social engineering
B) IMSI catching
C) Address spoofing
D) All of the above

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?


A) Network router
B) Personal firewall
C) Hardware that uses NAT (network address translation)
D) All of the above

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

All Android devices automatically encrypt data stored on the device when a user activates the login password.

A) True
B) False

Correct Answer

verifed

verified

This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers.


A) Authentication
B) Encryption
C) Ciphertext
D) Decryption

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Password entropy is a measure in _____ of a password's unpredictability.

Correct Answer

verifed

verified

Antivirus software cannot be expected to block threats that do not arrive in the form of malware.

A) True
B) False

Correct Answer

verifed

verified

Brute force attacks methodically try every possible password until the correct one is found.

A) True
B) False

Correct Answer

verifed

verified

A computer _______ is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim's device.

Correct Answer

verifed

verified

________ is a mass-mailing scam that masquerades as a message from a legitimate source.

Correct Answer

verifed

verified

___________ locks a device and then requests payment for an unlocking code.

Correct Answer

verifed

verified

A network utility called ______________ produces a detailed list of open ports on a device.

Correct Answer

verifed

verified

A ______________ exploit usually begins with a virus warning and an offer to disinfect the infected device.


A) rogue antivirus
B) virus hoax
C) RAT
D) backdoor

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

MITM (man-in-the-middle) attacks include which of the following?


A) Address spoofing
B) IMSI catchers
C) Evil Twins
D) All of the above

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

____________ is a term for a person who devises and carries out a scam in order to accomplish a goal.


A) Man-in-the-middle
B) RAT
C) Internet worm
D) None of the above

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

A social engineering scam called ___________ is when a victim is promised a large sum of money in exchange for the temporary use of a bank account.


A) advance fee fraud
B) pharming
C) address spoofing
D) Evil Twin

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Spam accounts for approximately ______ of all email.


A) 40%
B) 50%
C) 60%
D) 70%

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 109

Related Exams

Show Answer