Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Most modern CPUs support NX (No eXecute) to provide Data Execution Prevention (DEP), which ...: A. sets a special bit to designate a part

1. Most modern CPUs support NX (No eXecute) to provide Data Execution Prevention (DEP), which ...:
A. sets a special bit to designate a part of the HD for containing only data
B. will not allow code in the memory area to be executed.
C. will allow some code in the memory area to be executed.
D. Will prevent overwriting the OS section in the memory.
2.___is a non-technical approach to getting unauthorized access, usually by tricking people into giving up their passwords.
a. Social engineering
b. Logic bomb
c. Trojan horse
d. Malware
3. An attacker could install a keylogger, this is an example of a:
a. Threat
b. Vulnerability
4. Which of the following is the most probable security threat when a new network device is configured for the first-time installation?
a. Privilege escalation
b. Back door
c. Default account
d. Weak password
5. Which of the following network threats in transient deals with intercepting communication through some effort (passively, by listening, or actively, by injecting something in the communication)
a. Wiretapping
b. Eavesdropping
c. Privilege escalation
d. Spoofing
6. In each scenario, indicate what type of malware is depicted?
I. Sara discovered that she has been infected by a malware that silently captures all keystrokes including passwords and social network accounts credentials.
a. Rootkit
b. Logic Bomb
c. Trojan Horse
d. Keylogger
II. Upon several investigations, a network administrator found a suspicious program which modified some operating system commands that hides the existence of malware.
a. Rootkit
b. Logic Bomb
c. Trojan Horse
d. Keylogger
III. Deem, a software developer, discovered and disabled a hidden program in her company main server designed to delete important data on the 1st January 2019.
a. Rootkit
b. Logic Bomb
c. Trojan Horse
d. Keylogger
IV. Nora downloaded an application named "waterfalls.scr" where its author claims it is a free waterfall screensaver. When run, the application activated a hidden program that allowed a remote access to the Nora's computer.
a. Rootkit
b. Logic Bomb
c. Trojan Horse
d. Keylogger

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database And Expert Systems Applications 33rd International Conference Dexa 2022 Vienna Austria August 22 24 2022 Proceedings Part 1 Lncs 13426

Authors: Christine Strauss ,Alfredo Cuzzocrea ,Gabriele Kotsis ,A Min Tjoa ,Ismail Khalil

1st Edition

3031124227, 978-3031124228

More Books

Students also viewed these Databases questions

Question

Understand why customers are loyal to a particular service firm.

Answered: 1 week ago