Last Updated on October 18, 2019 by Explanation: Explanation: Explanation: What is the difference between a virus and a worm?
A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?
What is the meaning of the term logic bomb?
What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?
What are two ways to protect a computer from malware? (Choose two.)
What occurs on a computer when data goes beyond the limits of a buffer?
What is the term used to describe an email that is targeting a specific person employed at a financial institution?
An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?
What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)
What are two common indicators of spam mail? (Choose two.)
Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?
A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?
What is the name for the type of software that generates revenue by generating annoying pop-ups?
What does a rootkit modify?
What is the name given to a program or program code that bypasses normal authentication?
Which term describes the sending of a short descriptive SMS message used to trick a target into visiting a website?Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website? Explanation: Smishing is also known as SMS phishing and is used to send deceptive text messages to trick a user into calling a phone number or visiting a specific website.
What are two common indicators of spam mail Choose two?What are two common indicators of spam mail? The email has no subject line. The email has misspelled words or punctuation errors or both. What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?
What is the name given to a program code that bypasses normal authentication?Explanation: A backdoor is a program or program code implemented by a criminal to bypass the normal authentication that is used to access a system.
What is a vulnerability that allows criminals to inject scripts into web pages viewed by users select one?Cross-site Scripting (XSS) Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application.
|