Exam 7: Digital Security
Exam 1: Digital Content100 Questions
Exam 2: Digital Devices119 Questions
Exam 3: Networks100 Questions
Exam 4: The Web97 Questions
Exam 5: Social Media101 Questions
Exam 6: Software114 Questions
Exam 7: Digital Security106 Questions
Exam 8: Computer Programming: Understanding the Basics90 Questions
Select questions type
Most mass-mailing databases are legitimately compiled from customer lists.
Free
(True/False)
4.8/5
(31)
Correct Answer:
False
A ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
D
Hackers can use ports to communicate with devices in botnets.
Free
(True/False)
4.9/5
(42)
Correct Answer:
True
Hackers who gain control over several computers can organize them into a client-server network known as a(n)_______.
(Short Answer)
4.7/5
(32)
Microsoft uses a service called Safe Browsing to alert users about sites to avoid.
(True/False)
4.9/5
(43)
OS X devices include a utility that automatically encrypts data stored locally.
(True/False)
4.9/5
(35)
RATs can be used to create a backdoor to a victim's device that takes control of the device's camera.
(True/False)
4.8/5
(33)
Password _________ is a measure in bits of a password's unpredictability.
(Short Answer)
4.9/5
(46)
__________ are standalone programs that masquerade as useful utilities or applications
(Short Answer)
4.8/5
(35)
______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.
(Multiple Choice)
4.8/5
(38)
A(n)______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.
(Multiple Choice)
4.9/5
(25)
Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols.
(Multiple Choice)
4.8/5
(35)
There are various encryption methods, but __________ is the encryption standard currently used worldwide.
(Multiple Choice)
4.9/5
(39)
Passwords used as encryption ________ help to make hijacked data unusable.
(Short Answer)
4.8/5
(32)
Blacklist and header filtering is usually performed by email clients and Webmail services.
(True/False)
4.9/5
(37)
The most common types of PUPs and PUAs are toolbars and alternative browsers.
(True/False)
4.8/5
(37)
Showing 1 - 20 of 106
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)