What is the term used to describe an email that is targeting a specific person employed at a financial institution?

Last Updated on October 18, 2019 by

Show
  1. What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

    • buffer overflow
    • SQL injection
    • XML injection
    • Cross-site scripting

      Explanation:

  2. What type of attack targets an SQL database using the input field of a user?

    • buffer overflow
    • SQL injection
    • XML injection
    • Cross-site scripting

      Explanation:

  3. Which two reasons describe why WEP is a weak protocol? (Choose two.)

    • WEP uses the same encryption features as Bluetooth.
    • Everyone on the network uses a different key.
    • The key is static and repeats on a congested network.
    • The default settings cannot be modified.
    • The key is transmitted in clear text.

      Explanation:

  4. What is the difference between a virus and a worm?

    • Viruses hide in legitimate programs but worms do not.
    • Worms self-replicate but viruses do not.
    • Viruses self-replicate but worms do not.
    • Worms require a host file but viruses do not.

      Explanation:

  5. A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?

    • phishing
    • adware
    • spyware
    • virus

      Explanation:

  6. What is the meaning of the term logic bomb?

    • a malicious worm
    • a malicious program that uses a trigger to awaken the malicious code
    • a malicious virus
    • a malicious program that hides itself in a legitimate program

      Explanation:

  7. What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

    • Trojan
    • vishing
    • phishing
    • backdoor
    • social engineering

      Explanation:

  8. What are two ways to protect a computer from malware? (Choose two.)

    • Empty the browser cache.
    • Use antivirus software.
    • Delete unused software.
    • Keep software up to date.
    • Defragment the hard disk.

      Explanation:

  9. What occurs on a computer when data goes beyond the limits of a buffer?

    • a buffer overflow
    • a system exception
    • an SQL injection
    • cross-site scripting

      Explanation:

  10. What is the term used to describe an email that is targeting a specific person employed at a financial institution?

    • spam
    • vishing
    • spear phishing
    • target phishing
    • spyware

      Explanation:

  11. An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?

    • RF jamming
    • smishing
    • bluejacking
    • bluesnarfing

      Explanation:

  12. What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)

    • intimidation
    • compassion
    • honesty
    • urgency
    • integrity

      Explanation:

  13. What are two common indicators of spam mail? (Choose two.)

    • The email has keywords in it.
    • The email has misspelled words or punctuation errors or both.
    • The email is from your supervisor.
    • The email is from a friend.
    • The email has no subject line.
    • The email has an attachment that is a receipt for a recent purchase.

      Explanation:

  14. Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?

    • spam
    • smishing
    • grayware
    • impersonation

      Explanation:

  15. A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

    • a type of logic bomb
    • a type of virus
    • a type of worm
    • a type of ransomware

      Explanation:

  16. What is the name for the type of software that generates revenue by generating annoying pop-ups?

    • spyware
    • trackers
    • pop-ups
    • adware

      Explanation:

  17. What does a rootkit modify?

    • Microsoft Word
    • Notepad
    • screen savers
    • programs
    • operating system

      Explanation:

  18. What is the name given to a program or program code that bypasses normal authentication?

    • virus
    • worm
    • ransomware
    • Trojan
    • backdoor

      Explanation:

Which term describes the sending of a short descriptive SMS message used to trick a target into visiting a website?

Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website? Explanation: Smishing is also known as SMS phishing and is used to send deceptive text messages to trick a user into calling a phone number or visiting a specific website.

What are two common indicators of spam mail Choose two?

What are two common indicators of spam mail? The email has no subject line. The email has misspelled words or punctuation errors or both. What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

What is the name given to a program code that bypasses normal authentication?

Explanation: A backdoor is a program or program code implemented by a criminal to bypass the normal authentication that is used to access a system.

What is a vulnerability that allows criminals to inject scripts into web pages viewed by users select one?

Cross-site Scripting (XSS) Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application.