Question
1. This device could have electronics that could cause your OS to identify it as a HID, so it fools the OS into thinking that
1. This device could have electronics that could cause your OS to identify it as a HID, so it fools the OS into thinking that it is connected to a keyboard or mouse.
A. USB cable
B. card shimmer
C. cloned card
D. card skimmer
2. This device could have electronics that could cause your OS to identify it as a HID, so it fools the OS into thinking that it is connected to a keyboard or mouse.
A. USB flash drive
B. card skimmer
C. cloned card
D. card shimmer
3. This is when a hacker makes a physical copy of your credit card.
A. card skimming
B. USB cable
C. card cloning
D. USB flash drive
4. Your organization recently got hacked. The organization’s NIDS (Network Intrusion Detection System) triggered an alert about suspicious network activity from some computers. The NIDS recorded that the same online game was downloaded on all these computers. The help desk recently received calls from users with these same computers. The users complained that their computer’s webcam and microphone kept being turned on and off and network access was slow. Which of the following is the MOST likely malware type?
A. RAT
B. keylogger
C. ransomware
D. worm
5. This device captures payment and personal information from a credit card holder.
A. card skimmer
B. malicious USB cable
C. cloned card
D. USB flash drive
6. A hacker’s computer tricks the user’s computer to shift from TLS to SSL. What kind of attack is this?
A. collision attack
B. downgrade attack
C. supply chain attack
D. birthday attack
7. What is an easier, quicker way to find a collision attack?
A. on-premises attack
B. downgrade attack
C. supply chain attack
D. birthday attack
8. An attacker captured a database of hashed passwords. Some passwords are single words, but other passwords are long strings of letters, characters, and symbols. What technique will crack the MOST passwords in the LEAST amount of time?
A. rainbow tables
B. dictionary attack
C. brute force attack
D. spraying
9. A hacker’s computer tricks the user’s computer to shift from 2048-bit to 512-bit RSA encryption keys. What kind of attack is this?
A. birthday attack
B. supply chain attack
C. collision attack
D. downgrade attack
10. SolarWinds unwittingly sent out software updates to its customers that included the hacked code. What kind of attack is this?
A. birthday attack
B. supply chain attack
C. adversarial AI attack
D. downgrade attack
Step by Step Solution
3.41 Rating (167 Votes )
There are 3 Steps involved in it
Step: 1
The detailed answer for the above question is provided below 1 D card skimmer A card skimmer is a device that captures payment and personal informatio...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started