Question: Question 1 A denial-of-service (DoS) attack using multiple machines to carry out the attack is called Ransomware Distributed denial-of-service (DDoS) A smurf attack A sweeper

Question 1

A denial-of-service (DoS) attack using multiple machines to carry out the attack is called

  1. Ransomware
  2. Distributed denial-of-service (DDoS)
  3. A smurf attack
  4. A sweeper

Question 2

A brute force attack is a form of one of the following:

  1. System Monitoring
  2. Denial of Service Attack
  3. Password Cracking
  4. Log Management

Question 3

A virus is an example of which type of cyber threat?

  1. Network security
  2. Personal security
  3. Logical security
  4. Physical security

Question 4

The logical network layer of cyberspace includes which of the following components?

  1. Firmware
  2. Digital identity
  3. People
  4. Computers

Question 5

Packet switching describes the method of how which of the following transits networks?

  1. Passwords
  2. User identification
  3. Information
  4. Images

Question 6

If a new virus is created that has not yet been identified, it is called which of the following?

  1. Zombie
  2. Unidentified Virus
  3. Brute-Force
  4. Zero-Day

Question 7

Trojan horse programs, memory-scrapers, and spyware are examples of

  1. Malware
  2. Ransomware
  3. Adware
  4. Computer worms

Question 8

Ransomware is a class of

  1. Malware
  2. Spoofing
  3. Hacking
  4. Trojan

Question 9

A file virus does not attack the following file types:

  1. .com
  2. .doc
  3. .dll
  4. .exe

Question 10

This term describes any software that harms a computer and deletes data:

  1. Social Engineering
  2. Botnet
  3. Malware
  4. TCP

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!