Question: Select the correct Answer (7 points) What best describes phishing? It is the criminally fraudulent process of attempting to acquire sensitive information by masquerading as

  1. Select the correct Answer (7 points)

  1. What best describes phishing?
  1. It is the criminally fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication.

  1. It is a form of password attack by manipulating individuals into exposing confidential or personal information that may be used for fraudulent purposes.

  1. It is the criminally fraudulent process of a keylogger attempting to capture keyboard keystrokes of the user.

  1. All of the above describes phishing very well.

  1. B and C

  1. What type of free downloaded software may include spyware?
    1. Electronic Games
    2. Screensavers and toolbars
    3. Anti-spyware software
    4. All of the above
    5. A and B

  1. Which of the following information is not contained in digital certificate:

  1. Owners name or alias
  2. Owners public key
  3. Issuers name
  4. Issuers Private key
  5. None of the above

  1. Which of the following is not true:
  1. The Publicly accessible centralized directory of digital certificates is known as Certificate Repository.
  2. Protocol analyzer - Captures packets to decode and analyze their contents; facilitated by a router.
  3. Message Digest is one-way hash algorithms that provides data confidentiality.
  4. B and C
  5. None of the above

  1. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are

A. Authenticated

B. Joined

C. Submit

D. A and B

E. None of the above

  1. Firewalls are often categorized as:

A. Packet Filters

B. Network Firewalls

C. Host Based Firewalls

D. All of The above

E. B and C

  1. Which action cannot be performed through a successful SQL injection attack?

A. reformat the web application servers hard drive

B. display a list of customer telephone numbers

C. discover the names of different fields in a table

D. erase a database table

E. None of the above

  1. We use Cryptography term to transforming messages to make them secure and immune to:

A. Attacks

B. Tempering

C. Altering

D. All of the above

E. A and B

  1. ------------------ ensures that sensitive information is kept away from those not authorized.

A. Availability

B. Confidentiality

C. Cryptography

D. Integrity

E. All of the above

  1. Which of the following would provide the way to test operating system patches for a wide variety of computers before deployment?

A. OS hardening

B. Application control

C. Virtualization

D. Sandboxing

E. All of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!