Which of the following can be used to block unauthorized access while allowing authorized communication on a device or network? |
Network router Personal Firewall Hardware that uses a NAT |
What is the process called when an app from a source other than an official app store is installed on a device? |
Side-loading |
______Can be used to flood a web site with so much traffic that it can no longer provide its intended service. |
DDoS Botnets Commands from a botmaster |
Which of the following is not a characteristic of a weak password? |
Eight characters in length and include one or more uppercase letters, numbers, and symbols |
The best defense against malware is ________ |
Antivirus software |
A ______ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communicate link to a hacker |
RAT |
______Software shields certain applications against behaviors commonly exhibited by intrusions. |
Anti-Exploit |
______Is a deceptive practice that exploits human psychology by introducing victims to interact with a digital device in a way that is not in their best interest. |
Social Engineering |
Spam accounts fro approximately ____ of all email. |
70% |
_____Is a service offered by Google that checks URLs against a list of suspicious Web site URLs. |
Smart Screen Filter |
If you feel more secure with a totally random and unique password for each of your logins, then a (n) ________ is an excellent option |
Password Manager |
What is the term used to decribe unwatned software that installs along with the application software that you originally downloaded and installed? |
PUP |
A(n) ______ is a device or software that is designed to block unauthorized access while allowing authorized communications. |
Firewall |
A(n) _____Takes place when an unauthorized person gains access to a digital device by using an internet connection and exploiting vulnerablilities in hardwared or software. |
Online intrusion |
A virus _____ usually arrives as an email message that contains warnings about a supposedly new virus |
Hoax |
An ________ Attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code. |
Zero-Day |
A ____ Exploits usually begins with a virus warning and an offer to disinfect the infected device. |
Rogue antivirus |
A computer _____ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device. |
Virus |
Which type of device is the top target for ransomeware? |
Smartphones |
To establish a(n) ____, Hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection. |
Evil Twin |
There are various encryption methods, but _____ is the Encryption standard currently used worldwide. |
AES |
______ Is a term for a person who devises and carried out a scam in order to accomplish a goal. |
D. None of the above |
_____Changes an originating address or destination address to redirect the flow of data between two parties. |
Address spoofing |
Trojans depend on ______ to spread. |
Social engineering |
Which of the following is not a type of spam filter? |
Entropy |
Which of the following is not an example of authentication protocol? |
Password PINs Fingerprint scanner |
A cryptographic _____ Is a procedure for encryption or decryption. |
Algorithm |
_______ is the process of modifying an excutable file or data stream by adding additional commands. |
Code Injection |
MITM attacks include which of the following? |
Address spoofing IMSI catchers Evil Twins |
If you use a password manager, What do you as the user need to remember? |
The Master Password |
A(n) ______ Pings a packet of data to port in order to see if that port is open or not. |
Port Scan |
A password manager can store passwords in a encrypted file located at which of the following storage locations? |
Local storage Cloud storage USB storage |
A social engeneering scam called _____ is when a victim is promised a large sum of money in exchange for bank account number from which a small advance free is withdrawn. |
Advance free fraud |
Which of the following is not characteristic of a computer worm? |
Spread through a process called side-loading |
Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols. |
Brute Force |
When antivirus software detects malware, which of the following would not be a course of action you could take? |
Conduct a heuristic analysis |
Which of the following would be considered spyware? |
Keylogger |
Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers. |
Encryption |
Antivirus software can use techniques called _____ to detect malware by analyzing the characteristis and behavior of suspicious files. |
Heuristic analysis |
The current method of encrypting communication between a client and a server depends on a security protocol called_____. |
TLS |
The single most effective security measure for digital devices is to password protect access to them. |
T |
Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software. |
F |
Most mass-mailing databases are legitimately compiled from customer lists. |
F |
Antivirus software cannot be expected to block threats that do not arrive in the form of malware. |
T |
Spam sent by scammers often uses spoofed email addresses. |
T |
Similar to a worm, a trojan is not designed to spread itself to other devices. |
F |
Most trojans are not designed to replicate themselves. |
T |
Most ISPs and email services do not use filtering techniques to block spam. |
F |
The CAN-SPAM Act is considered an effective means of controlling the volume of spam on the internet. |
F |
Microsoft uses a service called Safe Browsing to alert users about sites to avoid. |
F |
Chapter 7 Computers
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price