Filters
Question type

A botnet has a server that is controlled by hackers.

Correct Answer

verifed

verified

Correctly installed antivirus software will prevent all intrusions.

Correct Answer

verifed

verified

Spam accounts for approximately ______ of all email.


A) 40%
B) 50%
C) 60%
D) 70%

Correct Answer

verifed

verified

Which of the following sequence of events best describes an online intrusion?


A) Malware enters the device, and then opens a backdoor, which opens a communications link on the device that a hacker can exploit.
B) A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
C) A USB drive containing a trojan is inserted into a device, which opens a backdoor allowing a hacker access to the device.
D) None of the above.

Correct Answer

verifed

verified

A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.


A) address spoofing exploit
B) online intrusion
C) brute force attack
D) rogue antivirus

Correct Answer

verifed

verified

Hackers who gain control over several computers can organize them into a client-server network known as a(n) _______.

Correct Answer

verifed

verified

Any data entering a digital device could be malware.

Correct Answer

verifed

verified

________ refers to any computer program designed to surreptitiously enter a digital device.

Correct Answer

verifed

verified

Antivirus software's on-access scanning has a high probability of identifying zero-day exploits.

Correct Answer

verifed

verified

What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?


A) RAT
B) PUP
C) Evil Twin
D) Adware

Correct Answer

verifed

verified

If you are traveling and expect to access files on a computer that you've left at home, make sure the remote access utility is turned off.

Correct Answer

verifed

verified

Password managers store passwords in a(n) _________ file.

Correct Answer

verifed

verified

_____________ exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites.


A) Malware
B) Rootkit
C) Spear phishing
D) Keylogger

Correct Answer

verifed

verified

Which of the following would be considered spyware?


A) A keylogger
B) Firewall software
C) Antivirus software
D) All of the above

Correct Answer

verifed

verified

Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.


A) heuristic analysis
B) virus signature
C) side-loading
D) port scan

Correct Answer

verifed

verified

If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure.

Correct Answer

verifed

verified

The CAN-SPAM Act is considered an effective means of controlling the volume of spam on the Internet.

Correct Answer

verifed

verified

Password managers can generate unique passwords that have very good entropy.

Correct Answer

verifed

verified

A(n) __________ is a computer program that seems to perform one function while actually doing something else.

Correct Answer

verifed

verified

A social engineering scam called ___________ is when a victim is promised a large sum of money in exchange for the temporary use of a bank account.


A) advance fee fraud
B) pharming
C) address spoofing
D) Evil Twin

Correct Answer

verifed

verified

Showing 21 - 40 of 109

Related Exams

Show Answer