Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. This device could have electronics that could cause your OS to identify it as a HID, so it fools the OS into thinking that

1.  This device could have electronics that could cause your OS to identify it as a HID, so it fools the OS into thinking that it is connected to a keyboard or mouse.
    A.     USB cable
    B.     card shimmer
    C.     cloned card
    D.     card skimmer

2. This device could have electronics that could cause your OS to identify it as a HID, so it fools the OS into thinking that it is connected to a keyboard or mouse.
    A.     USB flash drive
    B.     card skimmer
    C.     cloned card
    D.     card shimmer

3. This is when a hacker makes a physical copy of your credit card.
    A.     card skimming
    B.     USB cable
    C.     card cloning
    D.     USB flash drive

4. Your organization recently got hacked. The organization’s NIDS (Network Intrusion Detection System) triggered an alert about suspicious network activity from some computers. The NIDS recorded that the same online game was downloaded on all these computers. The help desk recently received calls from users with these same computers. The users complained that their computer’s webcam and microphone kept being turned on and off and network access was slow. Which of the following is the MOST likely malware type?
    A.     RAT
    B.     keylogger
    C.     ransomware
    D.     worm

5. This device captures payment and personal information from a credit card holder.
    A.     card skimmer
    B.     malicious USB cable
    C.     cloned card
    D.     USB flash drive

6. A hacker’s computer tricks the user’s computer to shift from TLS to SSL. What kind of attack is this?
    A.     collision attack
    B.     downgrade attack
    C.     supply chain attack
    D.     birthday attack

7. What is an easier, quicker way to find a collision attack?
    A.     on-premises attack
    B.     downgrade attack
    C.     supply chain attack
    D.     birthday attack

8. An attacker captured a database of hashed passwords. Some passwords are single words, but other passwords are long strings of letters, characters, and symbols. What technique will crack the MOST passwords in the LEAST amount of time?
    A.     rainbow tables
    B.     dictionary attack
    C.     brute force attack
    D.     spraying

9. A hacker’s computer tricks the user’s computer to shift from 2048-bit to 512-bit RSA encryption keys. What kind of attack is this?
    A.     birthday attack
    B.     supply chain attack
    C.     collision attack
    D.     downgrade attack

10. SolarWinds unwittingly sent out software updates to its customers that included the hacked code. What kind of attack is this?
    A.     birthday attack
    B.     supply chain attack
    C.     adversarial AI attack
    D.     downgrade attack

Step by Step Solution

3.41 Rating (167 Votes )

There are 3 Steps involved in it

Step: 1

The detailed answer for the above question is provided below 1 D card skimmer A card skimmer is a device that captures payment and personal informatio... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing and Assurance services an integrated approach

Authors: Alvin a. arens, Randal j. elder, Mark s. Beasley

14th Edition

133081605, 132575957, 9780133081602, 978-0132575959

More Books

Students also viewed these Programming questions

Question

Questions E3-1A and E3-2A

Answered: 1 week ago