Filters
Question type

​A(n) ________________  takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.


A) ​address spoofing
B) ​online intrusion
C) ​brute force attack
D) ​zero-day attack

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

​_____________ software shields certain applications against behaviors commonly exhibited by intrusions.


A) ​Malware
B) ​Anti-exploit
C) ​Antivirus
D) ​Virus signature

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

​________ is a 64-bit number that uniquely identifies a cellular device.

Correct Answer

verifed

verified

​Any software that secretly gathers personal information without the victim's knowledge is classified as __________.

Correct Answer

verifed

verified

​Android devices automatically encrypt data stored on the device when a user activates the login password.

A) True
B) False

Correct Answer

verifed

verified

​_________ redirects Web site traffic to fraudulent Web sites.

Correct Answer

verifed

verified

​A(n) __________  pings a packet of data to a port in order to see if that port is open or not.


A) ​rootkit
B) ​port scan
C) ​virus signature
D) ​heuristic analysis

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

​What is the process called when an app from a source other than an official app store is installed on a device?


A) ​Side-loading
B) ​Rootkit
C) ​Code injection
D) ​Dropper

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

A

​Spam accounts for approximately ______ of all email.


A) ​40%
B) ​50%
C) ​60%
D) ​70%

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

D

​Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.


A) ​heuristic analysis
B) ​virus signature
C) ​side-loading
D) ​port scan

E) None of the above
F) All of the above

Correct Answer

verifed

verified

​A botnet has a server that is controlled by hackers.

A) True
B) False

Correct Answer

verifed

verified

​Once you have installed antivirus software, you don't typically need to keep it running full time in the background

A) True
B) False

Correct Answer

verifed

verified

False

​If you use a password manager, what do you as the user need to remember?


A) ​Your passwords for individual sites.
B) ​The master password.
C) ​Form data including credit card numbers.
D) ​All of the above

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

​Most mass-mailing databases are legitimately compiled from customer lists.

A) True
B) False

Correct Answer

verifed

verified

​Conventional wisdom tells us that strong passwords are at least _____ characters in length and include one or more uppercase letters, numbers, and symbols.

Correct Answer

verifed

verified

​A(n) ______________  attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.


A) zero-day​
B) ​rootkit
C) ​brute force
D) ​dictionary

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

​Social engineering attacks prey on human vulnerabilities.

A) True
B) False

Correct Answer

verifed

verified

​In addition to replicating itself, a virus self-distributing.

A) True
B) False

Correct Answer

verifed

verified

​________ is an email scam that masquerades as a message from a legitimate source.

Correct Answer

verifed

verified

​The current method of encrypting communication between a client and a server depends on a security protocol called _______.


A) ​RAT
B) ​TLS
C) ​PUP
D) ​AES

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Showing 1 - 20 of 106

Related Exams

Show Answer