Question: Select the correct Answer (7 points) What best describes phishing? It is the criminally fraudulent process of attempting to acquire sensitive information by masquerading as
- Select the correct Answer (7 points)
- What best describes phishing?
- It is the criminally fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication.
- It is a form of password attack by manipulating individuals into exposing confidential or personal information that may be used for fraudulent purposes.
- It is the criminally fraudulent process of a keylogger attempting to capture keyboard keystrokes of the user.
- All of the above describes phishing very well.
- B and C
- What type of free downloaded software may include spyware?
- Electronic Games
- Screensavers and toolbars
- Anti-spyware software
- All of the above
- A and B
- Which of the following information is not contained in digital certificate:
- Owners name or alias
- Owners public key
- Issuers name
- Issuers Private key
- None of the above
- Which of the following is not true:
- The Publicly accessible centralized directory of digital certificates is known as Certificate Repository.
- Protocol analyzer - Captures packets to decode and analyze their contents; facilitated by a router.
- Message Digest is one-way hash algorithms that provides data confidentiality.
- B and C
- None of the above
- The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are
A. Authenticated
B. Joined
C. Submit
D. A and B
E. None of the above
- Firewalls are often categorized as:
A. Packet Filters
B. Network Firewalls
C. Host Based Firewalls
D. All of The above
E. B and C
- Which action cannot be performed through a successful SQL injection attack?
A. reformat the web application servers hard drive
B. display a list of customer telephone numbers
C. discover the names of different fields in a table
D. erase a database table
E. None of the above
- We use Cryptography term to transforming messages to make them secure and immune to:
A. Attacks
B. Tempering
C. Altering
D. All of the above
E. A and B
- ------------------ ensures that sensitive information is kept away from those not authorized.
A. Availability
B. Confidentiality
C. Cryptography
D. Integrity
E. All of the above
- Which of the following would provide the way to test operating system patches for a wide variety of computers before deployment?
A. OS hardening
B. Application control
C. Virtualization
D. Sandboxing
E. All of the above
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
