No student devices needed. Know more
33 questions
Which malware(s) type requires a hosted program?
worm
virus
backdoor
trojan horse
logic bomb
Which malware(s) is considered an independent program?
worm
botnet
backdoor
trojan horse
logic bomb
Is this a phishing scam?
Yes
No
Which malware type requires a condition to be met, before it executes it's malicious code?
worm
botnet
backdoor
trojan horse
logic bomb
Which malware type looks like a ligitimate software, but actually contains malicious code in it?
worm
virus
backdoor
trojan horse
logic bomb
Which malware type is capable of performing Distributed Denial of Service (DDos) attacks?
worm
botnet
backdoor
trojan horse
logic bomb
When a digital attacker uses multiple computers to overload web traffic on a server, this is known as ...
distributed denial of service
phishing
service overload
adware attack
Which malware type allows users to gain access to programs using alternative credentials?
worm
virus
backdoor
trojan horse
logic bomb
Is this a phishing scam?
Yes
No
Which malware type is capable of spread to other software in the system?
worm
botnet
virus
trojan horse
logic bomb
A fraudulent website requires you to input your username, password, or credit card information, with the intent to steal that information. This is known as...
DDoS
phishing
ransomware
trojan horse
worm
Is this a phishing scam?
Yes
No
Which are possible ways that malware can be acquired?
opening an email attachment/link from a unknown sender or spam
downloading a game from a pirating website
click on an online ad
updating your software
filesharing
Granting access after clearing at least 2 steps of authentication, such as a password and code sent to your cell phone is called:
compound authentication
complex authentication
frequency analysis authentication
multifactor authentication
Is this a phishing scam?
Yes
No
What is one way that does NOT prevent password-cracking programs from easily identifying your password?
Using a mixture of upper and lower case letters
Using special characters as part of your password
Making it easy to remember so you don't have to write it down
Using former pet names that hackers could never know
Using social engineering to trick users into providing their personal information is called
keylogging
phishing
pharming
spearing
Which of the following activities poses the greatest personal cybersecurity risk?
Making a purchase at an online store that uses public key encryption to transmit credit card information
Paying a bill using a secure electronic payment system
Reserving a hotel room by e-mailing a credit card number to a hotel
Withdrawing money from a bank account using an automated teller machine (ATM)
what is a symmetric key used for?
Sending and receiving information from the Web
Encrypting data
Decrypting data
Encrypting and decrypting data
Is this a phishing scam?
Yes
No
Cryptography today uses which of the following?
published algorithms available to all
algorithms known by only a few members of the IETF governing organization
the Caesar Cipher
undecidable algorithms
Scam or Real?
Scam
Real
Computer viruses can replicate after infecting a computer. How are they transmitted
By attaching to a valid program or file
By visiting a website that is infected
By clicking on a link that takes you to a counterfeit website designed to look like a legitimate
By being on the same network as an infected device
Is this a phishing scam?
Yes
No
Which of the following has the greatest potential for compromising a user’s personal privacy?
A group of cookies stored by the user’s Web browser
The Internet Protocol (IP) address of the user’s computer
The user’s e-mail address
The user’s public key used for encryption
Both online newspapers and social media sites are used to distribute information on the Internet. Which of the following best describes an advantage that online newspapers have over social media sites?
The ability to distribute information instantaneously
The ability to provide credibility to the information distributed
The ability to provide information that is widely accessible
The ability to provide media-rich content for low cost
Which of the following is LEAST likely to indicate a phishing attack?
An e-mail from your bank asks you to call the number on your card to verify a transaction
An e-mail from a merchant asks that you click on a link to reset your password
An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes
An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you
Is this a phishing scam?
Yes
No
What benefit does a rogue access point offer?
allow an intruder into the network system
Provide a conduit for the theft of company information
Flood the network with useless data, creating a denial of service
Infect other SSID Clients in the system
no benefit
What service does a certificate of authority provide?
it gives out encrypted keys
It decrypts information that has been encrypted
it informs you if you have been hacked using their website or service
ensures communication is protected by providing authentication of encryption keys
Scam or Real?
Scam
Real
Explore all questions with a free account