No student devices needed. Know more
20 questions
Routers are responsible for _________________.
Transporting Data packets.
Providing wireless Internet access.
Providing electricity to the Internet.
Providing connectivity to the internet via a wired connection.
A rogue access point is an __________.
access point installed on a network with authorization of the owner.
access point installed on a network without the network owner’s permission.
access point installed on a network without making a payment to the ISP.
PII is know as
Portable Information Index.
Personally Identifiable Information.
Playable Identifiable Index.
In passive interception, a rogue access point can read your data but cannot manipulate it.
True
False
A Hacker using Passive interception can collect a user's Internet footprint by_______.
Transferring a virus to your computer.
By monitoring DNS requests and other Internet traffic.
Replacing your password on your website's user account.
In active interception, a rogue access point can also replace your password in a website.
True
False
In active interception, a rogue access point can ___________.
manipulate your data.
can read your data but cannot manipulate it.
Steal your PII.
You should think twice before connecting to a free wireless hotspot in public locations such as coffee shops or airports.
True
False
Malware is useful software that's unknowingly installed onto a computer.
True
False
Malware often tries to protect you personal data .
True
False
A Trojan horse is...
also self-replicating, but it copies itself into entirely different computers within the network. It can travel along networked protocols such as email, file sharing, or instant messaging.
self-replicating: it contains code that copies itself into other files on the system. Viruses may hide in the code of a legitimate program.
a harmful program that masquerades as a legitimate program and is often downloaded onto computers by unknowing users.
A virus is ...
also self-replicating, but it copies itself into entirely different computers within the network. It can travel along networked protocols such as email, file sharing, or instant messaging.
self-replicating: it contains code that copies itself into other files on the system. It may hide in the code of a legitimate program.
a harmful program that masquerades as a legitimate program and is often downloaded onto computers by unknowing users.
A worm is ...
also self-replicating, but it copies itself into entirely different computers within the network. It can travel along networked protocols such as email, file sharing, or instant messaging.
self-replicating: it contains code that copies itself into other files on the system. Viruses may hide in the code of a legitimate program.
a harmful program that masquerades as a legitimate program and is often downloaded onto computers by unknowing users.
Spyware steals data and ...
sends it back to the malware creators.
pops up advertisements to users.
holds a computer hostage by encrypting user data or blocking access to applications, and it demands the user pay a ransom to the anonymous malware creators.
utilizes a computer's resources to mine for cryptocurrency.
Adware will...
sends it back to the malware creators.
pops up advertisements to users.
holds a computer hostage by encrypting user data or blocking access to applications, and it demands the user pay a ransom to the anonymous malware creators.
utilizes a computer's resources to mine for cryptocurrency.
Ransomware will...
sends it back to the malware creators.
pops up advertisements to users.
hold a computer hostage by encrypting user data or blocking access to applications, and it demands the user pay a ransom to the anonymous malware creators.
utilizes a computer's resources to mine for cryptocurrency.
Cryptomining malware will...
sends it back to the malware creators.
pops up advertisements to users.
hold a computer hostage by encrypting user data or blocking access to applications, and it demands the user pay a ransom to the anonymous malware creators.
utilizes a computer's resources to mine for cryptocurrency.
Computers, including mobile phones and hardware devices, should always keep up to date with security patches to reduce the risk of malware.
True
False
Firewalls cannot identify and block all malware.
True
False
Firewall is a system that monitors incoming and outgoing network traffic to a computer or internal network, and determines what traffic to allow.
True
Fasle
Explore all questions with a free account