Professional Documents
Culture Documents
Home / I'm Learning / Cyber Security Essentials / Chapter 3: Cybersecurity Threats, Vulnerabilities, and Attacks / Chapter 3 Quiz: Evidence5: PC3.1-PC3.4
!
Course Cyber Security Essentials
Home
$ Question 1 A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same
Calendar Incorrect user. What type of malware is this?
a type of virus
Question 2 What are two ways to protect a computer from malware? (Choose two.)
Correct
Select one or more:
Mark 3.00 out of
' Use antivirus software. "
3.00
programs
screen savers
Notepad
operating system
Question 4 Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?
Correct
Select one:
Mark 2.00 out of
2.00 impersonation
Flag grayware
question
spam
smishing "
Question 5 What are two common indicators of spam mail? (Choose two.)
Correct
Select one or more:
Mark 2.00 out of
2.00 The email is from your supervisor.
' The email has misspelled words or punctuation errors or both. "
Flag
question ' The email has no subject line. "
Question 6 What is the name given to a program or program code that bypasses normal authentication?
Correct
Select one:
Mark 2.00 out of
2.00 worm
backdoor "
Flag
question
virus
Trojan
ransomware
Question 7 What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?
Correct
Select one:
Mark 2.00 out of
2.00 social engineering
Flag Trojan
question
phishing "
backdoor
vishing
Question 9 What type of attack targets an SQL database using the input field of a user?
Correct
Select one:
Mark 2.00 out of
2.00 buffer overflow
Question 10 Which two reasons describe why WEP is a weak protocol? (Choose two.)
Correct
Select one or more:
Mark 2.00 out of
2.00 Everyone on the network uses a different key.
' The key is transmitted in clear text. "
Flag
question
The default settings cannot be modified.
' The key is static and repeats on a congested network. "
Question 11 What is the name for the type of software that generates revenue by generating annoying pop-ups?
Correct
Select one:
Mark 2.00 out of
2.00 trackers
Flag pop-ups
question
spyware
adware "
Question 12 What is the term used to describe an email that is targeting a specific person employed at a financial institution?
Correct
Select one:
Mark 2.00 out of
2.00 target phishing
Flag vishing
question
spyware
spam
Question 13 A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?
Correct
Select one:
Mark 2.00 out of
spyware "
2.00
Flag virus
question
phishing
adware
Question 14 What occurs on a computer when data goes beyond the limits of a buffer?
Correct
Select one:
Mark 2.00 out of
2.00 a system exception
an SQL injection
a malicious virus
Question 16 An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What
Correct type of attack is this?
bluesnarfing "
smishing
Question 17 What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?
Correct
Select one:
Mark 2.00 out of
2.00 XML injection
Question 18 What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)
Correct
Select one or more:
Mark 2.00 out of
2.00 honesty
Flag compassion
question
integrity
' urgency "
Finish review
◀ Research : Think & Share Jump to... Starter Task: Think & Share (5mins) ▶
Quiz navigation
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
NetAcad, a Cisco Corporate Social Responsibility program, is an IT skills and career building program available to learning institutions and individuals worldwide.
Terms and Conditions Privacy Statement Cookie Policy Data Protection Trademarks Data Protection Accessibility