Last Updated on October 18, 2019 by Explanation: Explanation: Explanation: Explanation:What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?
What type of attack targets an SQL database
using the input field of a user?
Which two reasons describe why WEP is a weak protocol? (Choose two.)
What is the difference between a virus and a worm?
A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?
- phishing
- adware
- spyware
- virus
Explanation:
What is the meaning of the term logic bomb?
- a malicious worm
- a malicious program that uses a trigger to awaken the malicious code
- a malicious virus
- a malicious program that hides itself in a legitimate program
Explanation:
What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?
- Trojan
- vishing
- phishing
- backdoor
- social engineering
Explanation:
What are two ways to protect a computer from malware? (Choose two.)
- Empty the browser cache.
- Use antivirus software.
- Delete unused software.
- Keep software up to date.
- Defragment the hard disk.
Explanation:
What occurs on a computer when data goes beyond the limits of a buffer?
- a buffer overflow
- a system exception
- an SQL injection
- cross-site scripting
Explanation:
What is the term used to describe an email that is targeting a specific person employed at a financial institution?
- spam
- vishing
- spear phishing
- target phishing
- spyware
Explanation:
An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?
- RF jamming
- smishing
- bluejacking
- bluesnarfing
Explanation:
What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)
- intimidation
- compassion
- honesty
- urgency
- integrity
Explanation:
What are two common indicators of spam mail? (Choose two.)
- The email has keywords in it.
- The email has misspelled words or punctuation errors or both.
- The email is from your supervisor.
- The email is from a friend.
- The email has no subject line.
- The email has an attachment that is a receipt for a recent purchase.
Explanation:
Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?
- spam
- smishing
- grayware
- impersonation
Explanation:
A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?
- a type of logic bomb
- a type of virus
- a type of worm
- a type of ransomware
Explanation:
What is the name for the type of software that generates revenue by generating annoying pop-ups?
- spyware
- trackers
- pop-ups
- adware
Explanation:
What does a rootkit modify?
- Microsoft Word
- Notepad
- screen savers
- programs
- operating system
Explanation:
What is the name given to a program or program code that bypasses normal authentication?
- virus
- worm
- ransomware
- Trojan
- backdoor
Explanation: