Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

*** Understanding Computers Today and Tomorrow *** #1 This type of authentication method requires a physical component to gain access: a-Double authentication b-Passwords c-Possessed Objects

*** Understanding Computers Today and Tomorrow ***

#1 This type of authentication method requires a physical component to gain access:

a-Double authentication

b-Passwords

c-Possessed Objects

d-Biometric Devices

#2 Using social media, conversations, and/or research on a person to make intelligent guesses at passwords is an example of:

a-Phishing

b-Pharming

c-Brute Force Hacking

d-Social Engineering

#3 War driving is:

a-Hacking into a mainframe

b-Attempting to access unprotected wifi networks

c-Using a car to gain access to a secure facility

d-A sophisticated network attack

#4 Writing a script to attempt to try multiple passwords for an account is an example of:

a-Brute force hacking

b-Social engineering

c-War driving

d-Throttling

#5 Using an anatomical characteristic (e.g. facial recognition) is an example of:

a-Passwords

b-Possessed objects

c-Double authentication

d-Biometric devices

#6 Collecting accounts through various means that may be compromised is:

a-Social engineering

b-Pharming

c-War driving

d-Hacking

#7 Which of the following is NOT a characteristic of a 'good' virus:

a-Undetectable

b-Able to spread easily

c-Destroys its host quickly

d-Delivers an effective payload

#8 Programs that lock a computer down until a payment is made are called:

a-Viruses

b-Spyware

c-Adware

d-Ransomware

#9 A danger with credit/debit cards and ATM usage is:

a-Phishing

b-Skimming

c-Pharming

d-War driving

#10 Attempting to gain access to a system without authorization is:

a-Perfectly legal

b-Cracking

c-Not a serious problem

d-Phishing

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MySQL Crash Course A Hands On Introduction To Database Development

Authors: Rick Silva

1st Edition

1718503008, 978-1718503007

More Books

Students also viewed these Databases questions

Question

Why do HCMSs exist? Do they change over time?

Answered: 1 week ago