A) A Trojan horse
B) Ransomware
C) Spyware
D) A virus
E) An evil twin
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Sasser
B) Zeus
C) Cryptolocker
D) ILOVEYOU
E) Conficker
Correct Answer
verified
Multiple Choice
A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs.
B) Radio frequency bands are easy to scan.
C) An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network.
D) Intruders can force a user's NIC to associate with a rogue access point.
E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
Correct Answer
verified
Multiple Choice
A) spoofing.
B) cybervandalism.
C) cyberwarfare.
D) phishing.
E) pharming.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Theft of trade secrets
B) Intentionally attempting to intercept electronic communication
C) Unauthorized copying of software
D) Breaching the confidentiality of protected computerized data
E) Schemes to defraud
Correct Answer
verified
Multiple Choice
A) Stateful inspections
B) Intrusion detection systems
C) Application proxy filtering technologies
D) Packet filtering technologies
E) Firewalls
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) phishing.
B) denial-of-service attacks.
C) cyberwarfare.
D) cyberterrorism.
E) evil twins.
Correct Answer
verified
Multiple Choice
A) NICs
B) Mac addresses
C) URLs
D) UTMs
E) SSIDs
Correct Answer
verified
Multiple Choice
A) Knowingly accessing a protected computer to commit fraud
B) Accessing a computer system without authority
C) Illegally accessing stored electronic communication
D) Threatening to cause damage to a protected computer
E) Breaching the confidentiality of protected computerized data
Correct Answer
verified
Multiple Choice
A) TCP/IP and SSL.
B) S-HTTP and CA.
C) HTTP and TCP/IP.
D) S-HTTP and SHTML.
E) SSL,TLS,and S-HTTP.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) Spyware
B) A Trojan horse
C) A keylogger
D) A worm
E) A sniffer
Correct Answer
verified
Multiple Choice
A) Security
B) Controls
C) Benchmarking
D) Algorithms
E) Identity management
Correct Answer
verified
Multiple Choice
A) Computer log containing recent system errors
B) A file deleted from a hard disk
C) A file that contains an application's user settings
D) A set of raw data from an environmental sensor
E) Data that has been recorded over
Correct Answer
verified
Showing 81 - 100 of 100
Related Exams