QUESTIONS AND ANSWERS 100%
CORRECT
The general term for evil software is ________.
A) virus
B) worm
C) malware
D) all of the above - correct answer C) malware
________ is the most frequent type of company attack.
A) dos
B) Hacking
C) Ransomware
D) Malware - correct answer D) Malware
Users typically can eliminate a vulnerability in one of their programs by ________.
,A) installing a patch
B) using an antivirus program
C) both A and B
D) neither A nor B - correct answer A) installing a patch
Vulnerability-based attacks that occur before a patch is available are called ________
attacks.
A) indefensible
B) stealth
C) malware
D) zero-day - correct answer D) zero-day
What kind of attack is most likely to succeed against a system with no technological
vulnerabilities?
A) malware
,B) social engineering
C) both A and B
D) neither A nor B - correct answer B) social engineering
A spear phishing attack is usually aimed at ________.
A) an individual
B) a group
C) everyone
D) all of the above - correct answer A) an individual
________ are full programs.
A) Viruses
B) Worms
C) both A and B
D) neither A nor B - correct answer B) Worms
, Which of the following attach themselves to other programs?
A) viruses
B) worms
C) both A and B
D) neither A nor B - correct answer A) viruses
Viruses and worms propagate through ________.
A) social engineering
B) exploiting vulnerabilities
C) both A and B
D) neither A nor B - correct answer C) both A and B
Which of the following sometimes uses direct propagation between computers?
A) viruses