Exam 7: Digital Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

​Most mass-mailing databases are legitimately compiled from customer lists.

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

False

​A ___________  is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

D

​Hackers can use ports to communicate with devices in botnets.

Free
(True/False)
4.9/5
(42)
Correct Answer:
Verified

True

​Any data entering a digital device could be malware.

(True/False)
4.8/5
(35)

​Hackers who gain control over several computers can organize them into a client-server network known as a(n)_______.

(Short Answer)
4.7/5
(32)

​Microsoft uses a service called  Safe Browsing to alert users about sites to avoid.

(True/False)
4.9/5
(43)

​OS X devices include a utility that automatically encrypts data stored locally.

(True/False)
4.9/5
(35)

​ IMSI catchers are operated by cellular service companies.

(True/False)
4.7/5
(41)

​RATs can be used to create a backdoor to a victim's device that  takes control of the device's camera.

(True/False)
4.8/5
(33)

​A(n)_______ password is difficult to hack.

(Short Answer)
4.9/5
(28)

​A botnet has a server that is controlled by hackers.

(True/False)
4.9/5
(40)

​Password _________ is a measure in bits of a password's unpredictability.

(Short Answer)
4.9/5
(46)

​__________ are standalone programs that masquerade as useful utilities or applications

(Short Answer)
4.8/5
(35)

​______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.

(Multiple Choice)
4.8/5
(38)

​A(n)______________  attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

(Multiple Choice)
4.9/5
(25)

​Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols.

(Multiple Choice)
4.8/5
(35)

​There are various encryption methods, but __________ is the encryption standard currently used worldwide.

(Multiple Choice)
4.9/5
(39)

​Passwords used as encryption ________ help to make hijacked data unusable.

(Short Answer)
4.8/5
(32)

​Blacklist and header filtering is usually performed by email clients and Webmail services.

(True/False)
4.9/5
(37)

​The most common types of PUPs and PUAs are toolbars and alternative browsers.

(True/False)
4.8/5
(37)
Showing 1 - 20 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)