Exam 2: Malware and Social Engineering Attacks
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
Phishing is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.
Free
(True/False)
4.8/5
(30)
Correct Answer:
True
Two types of malware have the primary trait of circulation.These are viruses and worms.
Free
(True/False)
5.0/5
(37)
Correct Answer:
True
Select the term used to describe tracking software that is deployed without the consent or control of the user.
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
C
What social engineering principal frightens and coerces a victim by using threats?
(Multiple Choice)
4.9/5
(32)
Social engineering impersonation means to masquerade as a real or fictitious character and then play out the role of that person on a victim.
(True/False)
4.8/5
(37)
What type of malicious software technology is used to monitor user behavior or gather information about the user,sometimes including personally identifiable or other sensitive information?
(Multiple Choice)
4.9/5
(37)
What type of undocumented yet benign hidden feature launches after a special set of commands,key combinations,or mouse clicks?
(Multiple Choice)
4.9/5
(33)
What type of software can be installed in an individual's web browser to prevent ads from displaying?
(Multiple Choice)
4.9/5
(37)
How many different Microsoft Windows file types can be infected with a virus?
(Multiple Choice)
4.7/5
(39)
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software,such as a virus?
(Multiple Choice)
4.9/5
(33)
What type of attack is targeted against a smaller group of specific individuals,such as the major executives working for a manufacturing company?
(Multiple Choice)
4.8/5
(42)
What type of ransomware displays a screen and prevents the user from accessing the computer's resources?
(Multiple Choice)
4.9/5
(29)
Select below the type of malware that appears to have a legitimate use,but contains something malicious:
(Multiple Choice)
4.9/5
(32)
A virus that infects an executable program file is known as?
(Multiple Choice)
4.8/5
(38)
What type of structure is used to provide instructions to infected bot computers?
(Multiple Choice)
4.7/5
(32)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)