Multiple Choice
Which of the following sequence of events best describes an online intrusion?
A) Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit.
B) A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
C) A USB drive containing a trojan is inserted into a device which opens a backdoor, allowing a hacker access to the device.
D) None of the above
Correct Answer:

Verified
Correct Answer:
Verified
Q17: The CAN-SPAM Act is considered an effective
Q35: A social engineering scam called _ is
Q36: OS X devices include a utility that
Q47: A(n) _ pings a packet of data
Q51: A spam _ uses a set of
Q62: Antivirus software cannot be expected to block
Q76: _ changes an originating address or a
Q99: Password managers store passwords in a(n) _
Q101: Hackers who gain control over several computers
Q107: Social engineering attacks prey on human vulnerabilities.