Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) keylogger
B) encryption key
C) password manager
D) personal firewall
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit.
B) A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
C) A USB drive containing a trojan is inserted into a device which opens a backdoor, allowing a hacker access to the device.
D) None of the above
Correct Answer
verified
Multiple Choice
A) Eight characters in length and include one or more uppercase letters, numbers, and symbols.
B) Uses default passwords such as password, admin, system, and guest.
C) Any sequence that includes a user name.
D) Use of words from a dictionary.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) encryption
B) entropy
C) antivirus software
D) all of the above
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) RAT
B) TLS
C) PUP
D) AES
Correct Answer
verified
Multiple Choice
A) RAT
B) PUP
C) Evil Twin
D) adware
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Showing 21 - 40 of 106
Related Exams