QUESTIONS AND ANSWERS 100%
CORRECT
________ attacks typically extend over a period of months.
A) ddos
B) Malware
C) APT
D) Spear phishing - correct answer C) APT
The general term for evil software is ________.
A) virus
B) worm
C) malware
D) all of the above - correct answer C) malware
________ is the most frequent type of company attack.
,A) dos
B) Hacking
C) Ransomware
D) Malware - correct answer D) Malware
Users typically can eliminate a vulnerability in one of their programs by ________.
A) installing a patch
B) using an antivirus program
C) both A and B
D) neither A nor B - correct answer A) installing a patch
Vulnerability-based attacks that occur before a patch is available are called ________
attacks.
A) indefensible
B) stealth
,C) malware
D) zero-day - correct answer D) zero-day
What kind of attack is most likely to succeed against a system with no technological
vulnerabilities?
A) malware
B) social engineering
C) both A and B
D) neither A nor B - correct answer B) social engineering
A spear phishing attack is usually aimed at ________.
A) an individual
B) a group
C) everyone
D) all of the above - correct answer A) an individual
, ________ are full programs.
A) Viruses
B) Worms
C) both A and B
D) neither A nor B - correct answer B) Worms
Which of the following attach themselves to other programs?
A) viruses
B) worms
C) both A and B
D) neither A nor B - correct answer A) viruses
Viruses and worms propagate through ________.
A) social engineering