Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers. Show
An original message or file that has not yet been encrypted is referred to as ciphertext. A cryptographic There are
various encryption methods, but A cryptographic Which of the following is not an example of an authentication protocol? The single most effective security measure for digital devices is to password protect access to them. Passwords used as encryption Android devices automatically encrypt data stored on the device when a user activates the login password. It is not possible to encrypt a Windows hard drive volume. OS X devices include a utility that automatically encrypts data stored locally. A(n) Conventional
wisdom tells us that strong passwords are at least Which of the following type of attack uses password-cracking software to generate every possible combination of letters, numerals, and symbols? Which of the following is not a characteristic of a weak password? Brute force attacks methodically try every
possible password until the correct one is found. Password Password entropy is a measure in If you want to store passwords on your digital device, make sure to If you feel more secure with a totally random and unique password for each
of your logins, then a(n) The core function of a password manager is to store user IDs with their corresponding Password managers can generate unique passwords that have very good entropy. Password managers store passwords in a(n) If you use a password manager, what do you as the user need to remember? A password manager can store passwords in an encrypted file located at which of the following storage locations?
The action carried out by malware code is referred to as a(n) Common classifications of A computer In addition to replicating itself, a virus self-distributing. Viruses spread themselves from one device to another.
What is the process called
when an app from a source other than an official app store is installed on a device? Any code that is designed to hide the existence of processes and privileges is referred to as a(n) A key characteristic of viruses is their ability to lurk in a device for days or months, quietly replicating themselves. A computer Which of the following is not a characteristic of a computer worm? Stuxnet is a notorious computer Similar to a worm, a trojan is not designed to spread itself to other devices. Most trojans are not designed to replicate themselves. A(n)
Trojans depend on A(n) Any data entering a digital device could be malware. The best defense against malware is A virus Antivirus software can use techniques called One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) Heuristics may
produce false positives that mistakenly identify a legitimate file as malware. When antivirus software detects malware, which of the following would not be a course of action you could take? Once you have installed antivirus software, you don't typically need to keep it running full time in the background. A virus A(n) Which of the following sequence of events best describes an online intrusion? A A(n) RATs can be used to create a backdoor to a victim’s device that takes control of the device’s camera. If you are traveling and expect to access files on a computer that you’ve left at home, make sure the remote access utilities is turned off. Which type of device is the top target for ransomware?
Hackers who gain control over several computers can organize them into a client-server network known as a(n) A botnet has a server that is controlled by hackers.
Correctly
installed antivirus software will prevent all intrusions. Antivirus software cannot be expected to block threats that do not arrive in the form of malware. A(n)
Hackers can use ports to communicate with devices in botnets. A(n) A network utility called A(n) Which
of the following can be used to block unauthorized access while allowing authorized communications on a device or network? Any software that secretly gathers personal information without the victim’s knowledge is classified as Which of the following would be considered spyware? MITM attacks include which of the following? The objective of a MITM attack is
for a third party to block communications between two entities. A(n) To establish a(n)
If a hacker
intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure. The current method of encrypting communication between a client and a server depends on a security protocol called
IMSI catchers are operated by cellular service companies.
Social engineering attacks prey on human vulnerabilities. A social engineering scam called
Spam sent by scammers often uses spoofed email addresses. Most mass-mailing databases are legitimately compiled from customer lists. Spam accounts for approximately The CAN-SPAM Act is considered an effective means of controlling the volume of spam on the Internet.
Most ISPs and email services do not use filtering techniques to block spam. A spam Which
of the following is not a type of spam filter? Blacklist and header filtering is usually performed by email clients and Webmail services.
Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware
removal software.
Microsoft uses a service called Safe Browsing to alert users about sites to avoid. A The most common types of PUPs and PUAs are toolbars and alternative
browsers. What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed? Which of the following can be used to block unauthorized access while allowing authorized communications?A(n) firewall is a device or software that is designed to block unauthorized access while allowing authorized communications.
What is the term used to describe unwanted software?Malware is a term used to describe malicious software that is designed to disrupt normal computer operation, gather personal information, gain unauthorized access to system resources and exhibit other unwanted activity.
Is the process of modifying an executable file or data stream by adding additional commands?Code injection is the process of modifying an executable file or data stream by adding additional commands. A computer worm is a self-replicating, self- distributing program designed to carry out unauthorized activity on a victim's device.
What is the process called when an app from a source other than an official app store is installed on a device?'Sideloading' is the process of downloading and installing apps onto a mobile device from an unofficial source. On Android, users enable device settings to download apps from unknown sources.
|