Filters
Question type

Study Flashcards

 If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure.​ 

A) True
B) False

Correct Answer

verifed

verified

 ​Microsoft uses a service called  Safe Browsing to alert users about sites to avoid. 

A) True
B) False

Correct Answer

verifed

verified

 ​Most ISPs and email services do not use filtering techniques to block spam. 

A) True
B) False

Correct Answer

verifed

verified

 ​______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest. 


A)  ​Evil Twin 
B)  ​Address spoofing 
C)  ​Social engineering 
D)  ​None of the above

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

 ​A(n) ________________  takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software. 


A)  ​address spoofing 
B)  ​online intrusion 
C)  ​brute force attack 
D)  ​zero-day attack

E) All of the above
F) None of the above

Correct Answer

verifed

verified

 ​Any data entering a digital device could be malware. 

A) True
B) False

Correct Answer

verifed

verified

 ​A botnet has a server that is controlled by hackers. 

A) True
B) False

Correct Answer

verifed

verified

 ​Viruses spread themselves from one device to another. 

A) True
B) False

Correct Answer

verifed

verified

 ​A(n) _______ password is difficult to hack.

Correct Answer

verifed

verified

 ​Once you have installed antivirus software, you don't typically need to keep it running full time in the background 

A) True
B) False

Correct Answer

verifed

verified

 ​A virus __________ usually arrives as an email message that contains warnings about a supposedly new virus. 


A)  ​payload 
B)  ​signature 
C)  ​hoax 
D)  ​dropper

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

 ​__________ changes an originating address or a destination address to redirect the flow of data between two parties. 


A)  ​Social engineering 
B)  ​IMSI catching 
C)  ​Address spoofing 
D)  ​All of the above

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

 ​_____________ software shields certain applications against behaviors commonly exhibited by intrusions. 


A)  ​Malware 
B)  ​Anti-exploit 
C)  ​Antivirus 
D)  ​Virus signature

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

 Brute force attacks methodically try every possible password until the correct one is found.​ 

A) True
B) False

Correct Answer

verifed

verified

 A cryptographic ________ is a word, number, or phrase that must be known to encrypt or decrypt data.​

Correct Answer

verifed

verified

 ​__________ is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems.

Correct Answer

verifed

verified

 ​Which of the following is not a type of spam filter? 


A)  ​Content 
B)  ​Permission 
C)  ​Blacklist 
D)  ​Entropy

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

 ​If you use a password manager, what do you as the user need to remember? 


A)  ​Your passwords for individual sites. 
B)  ​The master password. 
C)  ​Form data including credit card numbers. 
D)  ​All of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

 ​Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software. 

A) True
B) False

Correct Answer

verifed

verified

 ​Blacklist and header filtering is usually performed by email clients and Webmail services. 

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 80 of 106

Related Exams

Show Answer