Professional Documents
Culture Documents
UnansweredQuestion 1
0 / 2 pts
What are two common indicators of spam mail? (Choose two.)
Correct Answer(intrebarea de sub e rasp correct)
Correct Answer
UnansweredQuestion 2
0 / 2 pts
What is the term used to describe an email that is targeting a specific person employed at a
financial institution?
spam
spyware
target phishing
Correct Answer
spear phishing
vishing
UnansweredQuestion 3
0 / 2 pts
What type of attack targets an SQL database using the input field of a user?
Cross-site scripting
buffer overflow
Correct Answer
SQL injection
XML injection
UnansweredQuestion 4
0 / 2 pts
What does a rootkit modify?
Correct Answer
operating system
screen savers
Notepad
programs
Microsoft Word
UnansweredQuestion 5
0 / 2 pts
An attacker is sitting in front of a store and wirelessly copies emails and contact lists from
nearby unsuspecting user devices. What type of attack is this?
bluejacking
Correct Answer
bluesnarfing
smishing
RF jamming
UnansweredQuestion 6
0 / 2 pts
What are two ways to protect a computer from malware? (Choose two)
Correct Answer
Correct Answer
UnansweredQuestion 7
0 / 2 pts
Which term describes the sending of a short deceptive SMS message used to trick a target into
visiting a website?
Correct Answer
smishing
spam
grayware
impersonation
UnansweredQuestion 8
0 / 2 pts
A computer is presenting a user with a screen requesting payment before the user data is allowed
to be accessed by the same user. What type of malware is this?
a type of worm
Correct Answer
a type of ransomware
a type of virus
UnansweredQuestion 9
0 / 2 pts
What are two of the tactics used by a social engineer to obtain personal information from an
unsuspecting target? (Choose two.)
integrity
Correct Answer
urgency
Correct Answer
intimidation
honesty
compassion
Authority
Intimidation
Consensus/Social Proof
Scarcity
Urgency
Familiarity/Liking
Trust
UnansweredQuestion 10
0 / 2 pts
Which two reasons describe why WEP is a weak protocol? (Choose two.)
Correct Answer
Correct Answer
UnansweredQuestion 11
0 / 2 pts
What is the difference between a virus and a worm?
Correct Answer
UnansweredQuestion 12
0 / 2 pts
What occurs on a computer when data goes beyond the limits of a buffer?
a system exception
Correct Answer
a buffer overflow
an SQL injection
cross-site scripting
UnansweredQuestion 13
0 / 2 pts
What is the name for the type of software that generates revenue by generating annoying pop-
ups?
trackers
Correct Answer
adware
pop-ups
spyware
UnansweredQuestion 14
0 / 2 pts
What is the name given to a program or program code that bypasses normal authentication?
ransomware
Trojan
virus
worm
Correct Answer
backdoor
UnansweredQuestion 15
0 / 2 pts
A criminal is using software to obtain information about the computer of a user. What is the
name of this type of software?
phishing
Correct Answer
spyware
adware
virus
UnansweredQuestion 16
0 / 2 pts
What is the term used when a malicious party sends a fraudulent email disguised as being from a
legitimate, trusted source?
backdoor
Trojan
vishing
Correct Answer
phishing
social engineering
UnansweredQuestion 17
0 / 2 pts
What is the meaning of the term logic bomb?
a malicious virus
a malicious worm
Correct Answer
UnansweredQuestion 18
0 / 2 pts
What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?
buffer overflow
Correct Answer
Cross-site scripting
SQL injection
XML injection
PreviousNext