Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) 40%
B) 50%
C) 60%
D) 70%
Correct Answer
verified
Multiple Choice
A) Malware enters the device, and then opens a backdoor, which opens a communications link on the device that a hacker can exploit.
B) A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
C) A USB drive containing a trojan is inserted into a device, which opens a backdoor allowing a hacker access to the device.
D) None of the above.
Correct Answer
verified
Multiple Choice
A) address spoofing exploit
B) online intrusion
C) brute force attack
D) rogue antivirus
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) RAT
B) PUP
C) Evil Twin
D) Adware
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Malware
B) Rootkit
C) Spear phishing
D) Keylogger
Correct Answer
verified
Multiple Choice
A) A keylogger
B) Firewall software
C) Antivirus software
D) All of the above
Correct Answer
verified
Multiple Choice
A) heuristic analysis
B) virus signature
C) side-loading
D) port scan
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) advance fee fraud
B) pharming
C) address spoofing
D) Evil Twin
Correct Answer
verified
Showing 21 - 40 of 109