Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the software was embedded in many hardware products that could not be easily patched with automatic software updates.
B) any password typed into a CAPTCHA could be monitored by a Van Eck device.
C) social engineers could exploit the bug through SQL injection.
D) all social media profile data was exposed, giving hackers access to the potential answers many firms ask as part of password security questions.
E) it eliminated the ability to expose a URL's desitination by hoving the cursor over an address.
Correct Answer
verified
Multiple Choice
A) It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
B) It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.
C) It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
D) It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.
E) It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
Correct Answer
verified
Multiple Choice
A) Spyware
B) Malware
C) Social engineering
D) Phishing
E) Virus infections
Correct Answer
verified
Multiple Choice
A) LinkedIn
B) Corproate directories
C) Social media posts
D) Contests or surveys
E) All of the above
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Short Answer
Correct Answer
verified
Multiple Choice
A) hacktivist
B) data harvester
C) corporate spy
D) white hat hacker
E) ethical cyber criminal
Correct Answer
verified
Multiple Choice
A) rootkits.
B) trojans.
C) viruses.
D) worms.
E) honeypots.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) audit; enforcement
B) accountability; flexibility
C) compliance; subjectivity
D) protocols; the backing of ISO
E) rigidity; adaptability
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) Audit trails
B) Intrusion detection tools
C) Access control tools
D) User-tracking tools
E) Network watching tools
Correct Answer
verified
Showing 1 - 20 of 89
Related Exams