Filters
Question type

Study Flashcards

 ​Most trojans are not designed to replicate themselves. 

Correct Answer

verifed

verified

 ​A computer _______ is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim's device.

Correct Answer

verifed

verified

 ​A(n) __________  is an undocumented method of accessing a digital device.

Correct Answer

verifed

verified

 ​Password entropy is a measure in _____ of a password's unpredictability.

Correct Answer

verifed

verified

 ​In addition to replicating itself, a virus self-distributing. 

Correct Answer

verifed

verified

 ​___________ is a term describing spam that uses a false pretext to trick victims into participating.

Correct Answer

verifed

verified

 ​If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________  is an excellent option. 


A)  ​keylogger 
B)  ​encryption key 
C)  ​password manager 
D)  ​personal firewall

Correct Answer

verifed

verified

 ​Password managers can generate unique passwords that have very good entropy. 

Correct Answer

verifed

verified

 ​Which of the following sequence of events best describes an online intrusion? 


A)  ​Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit. 
B)  ​A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker. 
C)  ​A USB drive containing a trojan is inserted into a device which opens a backdoor, allowing a hacker access to the device. 
D)  None of the above​

Correct Answer

verifed

verified

 ​Which of the following is not a characteristic of a weak password? 


A)  ​Eight characters in length and include one or more uppercase letters, numbers, and symbols. 
B)  ​Uses default passwords such as password, admin, system, and guest. 
C)  ​Any sequence that includes a user name. 
D)  ​Use of words from a dictionary.

Correct Answer

verifed

verified

 ​A network utility called ______________ produces a detailed list of open ports on a device.

Correct Answer

verifed

verified

 ​The best defense against malware is _____________. 


A)  ​encryption 
B)  ​entropy 
C)  ​antivirus software 
D)  ​all of the above

Correct Answer

verifed

verified

 ​Passwords used as encryption ________ help to make hijacked data unusable.

Correct Answer

verifed

verified

 Password managers store passwords in a(n) _________ file​

Correct Answer

verifed

verified

 ​The current method of encrypting communication between a client and a server depends on a security protocol called _______. 


A)  ​RAT 
B)  ​TLS 
C)  ​PUP 
D)  ​AES

Correct Answer

verifed

verified

 ​What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed? 


A)  RAT​ 
B)  ​PUP 
C)  ​Evil Twin 
D)  ​adware

Correct Answer

verifed

verified

 ​Most mass-mailing databases are legitimately compiled from customer lists. 

Correct Answer

verifed

verified

 ​The core function of a password manager is to store user IDs with their corresponding ________.

Correct Answer

verifed

verified

 ​Social engineering attacks prey on human vulnerabilities. 

Correct Answer

verifed

verified

 ​One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) ___________ .

Correct Answer

verifed

verified

Showing 21 - 40 of 106

Related Exams

Show Answer