Question
Thanks for the help. This type of authentication method requires a physical component to gain access: Double authentication Passwords Possessed Objects Biometric Devices 10 points
Thanks for the help.
This type of authentication method requires a physical component to gain access:
Double authentication | ||
Passwords | ||
Possessed Objects | ||
Biometric Devices |
10 points
QUESTION 2
Using social media, conversations, and/or research on a person to make intelligent guesses at passwords is an example of:
Phishing | ||
Pharming | ||
Brute Force Hacking | ||
Social Engineering |
10 points
QUESTION 3
War driving is:
Hacking into a mainframe | ||
Attempting to access unprotected wifi networks | ||
Using a car to gain access to a secure facility | ||
A sophisticated network attack |
10 points
QUESTION 4
Writing a script to attempt to try multiple passwords for an account is an example of:
Brute force hacking | ||
Social engineering | ||
War driving | ||
Throttling |
10 points
QUESTION 5
Using an anatomical characteristic (e.g. facial recognition) is an example of:
Passwords | ||
Possessed objects | ||
Double authentication | ||
Biometric devices |
10 points
QUESTION 6
Collecting accounts through various means that may be compromised is:
Social engineering | ||
Pharming | ||
War driving | ||
Hacking |
10 points
QUESTION 7
Which of the following is NOT a characteristic of a 'good' virus:
Undetectable | ||
Able to spread easily | ||
Destroys its host quickly | ||
Delivers an effective payload |
10 points
QUESTION 8
Programs that lock a computer down until a payment is made are called:
Viruses | ||
Spyware | ||
Adware | ||
Ransomware |
10 points
QUESTION 9
A danger with credit/debit cards and ATM usage is:
Phishing | ||
Skimming | ||
Pharming | ||
War driving |
10 points
QUESTION 10
Attempting to gain access to a system without authorization is:
Perfectly legal | ||
Cracking | ||
Not a serious problem | ||
Phishing |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started