TEST 3 on chap 7+9+11 assesses knowledge on cybersecurity threats and preventive measures. It covers topics like computer viruses, anti-exploit software, authentication protocols, social engineering, and ransomware, focusing on understanding and preventing digital security breaches.
Malware
Anti-exploit
Antivirus
Virus Signature
Rate this question:
Password
PINs
Fingerprint scanner
All of the above
Rate this question:
Evil Twin
Address spoofing
Social engineering
None of the above
Rate this question:
50%
40%
60%
70%
Rate this question:
Desktops
Laptops
Smartphones
All of the above
Rate this question:
Personal Firewall
Heuristic Analysis
SmartScreen Filter
Safe Browsing
Rate this question:
TLS
IMSI
AES
DDoS
Rate this question:
digital certificate
Netstat
Firewall
Evil Twin
Rate this question:
Personal firewall
Hardware that uses a NAT
Network router
All of the above
Rate this question:
Encryption
Entropy
Antivirus software
All of the above
Rate this question:
Encryption key
Personal firewall
Keylogger
Password manager
Rate this question:
Repair the infection.
Conduct a heuristic analysis.
Put the infected file into quarantine.
Delete the infected file.
Rate this question:
Advance fee fraud
Pharming
Evil Twin
Address spoofing
Rate this question:
Permission
Blacklist
Entropy
Content
Rate this question:
social engineering
rootkits
Code injection
Self-replication
Rate this question:
DDoS
Botnets
Commands from a botmaster
All of the above
Rate this question:
Address spoofing
IMSI catchers
Evil Twins
All of the above
Rate this question:
Keylogger
Evil Twin
botnet
None of the above
Rate this question:
ciphertext
Firewall
Algorithm
Key
Rate this question:
Zero-day
Brute force
Dictionary
rootkit
Rate this question:
Code injection
Dropper
Side-loading
Rootkit
Rate this question:
Main-in-the-middle
RAT
Internet worm
None of the above
Rate this question:
Social engineering
IMSI catching
Address spoofing
All of the above
Rate this question:
signature
Payload
Dropper
Hoax
Rate this question:
Any sequence that includes a user name
Eight characters in length and include one or more uppercase letters, numbers, and symbols
Use of words from a dictionary
Uses default passwords such as password, admin, system, and guest.
Rate this question:
Address spoofing
Zero-day attack
Online intrusion
brute force attack
Rate this question:
TLS
PUP
RAT
AES
Rate this question:
Heuristic analysis
port scan
Virus signature
rootkit
Rate this question:
Virus hoax
Backdoor
rogue antivirus
RAT
Rate this question:
TLS
RAT
PUP
DDoS
Rate this question:
Entropy
brute force
Massive
dictionary
Rate this question:
Keylogging
Pharming
Brute force attack
Code injection
Rate this question:
Your passwords for individual sites.
The master password
Form data including credit card numbers.
All of the above
Rate this question:
Port scan
Virus signature
Side-loading
heuristic analysis
Rate this question:
Authentication
Ciphertext
encryption
Decryption
Rate this question:
Evil Twin
RAT
PUP
Adware
Rate this question:
Local storage
Cloud storage
USB storage
all of the above
Rate this question:
Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit.
A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
A USB drive containing a trojan is inserted into a device which opens a backdoor, allowing a hacker access to the device.
None of the above
Rate this question:
Self-replicating
Spread through a process called side-loading
Self-distributing
Usually standalone executable programs
Rate this question:
A keylogger
Firewall software
Antivirus software
all of the above
Rate this question:
XML
UML
HTML
DSS
Rate this question:
Collect, display, and modify transactions.
Store transactions.
List transactions.
all of the above
Rate this question:
Make backups
Optimize for speed and security
Revise as necessary to meet business needs
Convert data
Rate this question:
Create applications
Test applications
Purchase or contract for hardware and software
Obtain approval
Rate this question:
computers, communications networks, and data
people and products
policies and procedures
All of the above
Rate this question:
Increases managerial efficiency
Produces routine and on-demand reports
Provides useful information for managerial activities
Collect, display, and modify transactions
Rate this question:
MIS
information system
TPS
Organization
Rate this question:
Sales
customer support
Payment gateway
marketing
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.