Question: Thanks for the help. This type of authentication method requires a physical component to gain access: Double authentication Passwords Possessed Objects Biometric Devices 10 points

Thanks for the help.

This type of authentication method requires a physical component to gain access:

Double authentication

Passwords

Possessed Objects

Biometric Devices

10 points

QUESTION 2

Using social media, conversations, and/or research on a person to make intelligent guesses at passwords is an example of:

Phishing

Pharming

Brute Force Hacking

Social Engineering

10 points

QUESTION 3

War driving is:

Hacking into a mainframe

Attempting to access unprotected wifi networks

Using a car to gain access to a secure facility

A sophisticated network attack

10 points

QUESTION 4

Writing a script to attempt to try multiple passwords for an account is an example of:

Brute force hacking

Social engineering

War driving

Throttling

10 points

QUESTION 5

Using an anatomical characteristic (e.g. facial recognition) is an example of:

Passwords

Possessed objects

Double authentication

Biometric devices

10 points

QUESTION 6

Collecting accounts through various means that may be compromised is:

Social engineering

Pharming

War driving

Hacking

10 points

QUESTION 7

Which of the following is NOT a characteristic of a 'good' virus:

Undetectable

Able to spread easily

Destroys its host quickly

Delivers an effective payload

10 points

QUESTION 8

Programs that lock a computer down until a payment is made are called:

Viruses

Spyware

Adware

Ransomware

10 points

QUESTION 9

A danger with credit/debit cards and ATM usage is:

Phishing

Skimming

Pharming

War driving

10 points

QUESTION 10

Attempting to gain access to a system without authorization is:

Perfectly legal

Cracking

Not a serious problem

Phishing

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!