Question: Thanks for the help. This type of authentication method requires a physical component to gain access: Double authentication Passwords Possessed Objects Biometric Devices 10 points
Thanks for the help.
This type of authentication method requires a physical component to gain access:
| Double authentication | ||
| Passwords | ||
| Possessed Objects | ||
| Biometric Devices |
10 points
QUESTION 2
Using social media, conversations, and/or research on a person to make intelligent guesses at passwords is an example of:
| Phishing | ||
| Pharming | ||
| Brute Force Hacking | ||
| Social Engineering |
10 points
QUESTION 3
War driving is:
| Hacking into a mainframe | ||
| Attempting to access unprotected wifi networks | ||
| Using a car to gain access to a secure facility | ||
| A sophisticated network attack |
10 points
QUESTION 4
Writing a script to attempt to try multiple passwords for an account is an example of:
| Brute force hacking | ||
| Social engineering | ||
| War driving | ||
| Throttling |
10 points
QUESTION 5
Using an anatomical characteristic (e.g. facial recognition) is an example of:
| Passwords | ||
| Possessed objects | ||
| Double authentication | ||
| Biometric devices |
10 points
QUESTION 6
Collecting accounts through various means that may be compromised is:
| Social engineering | ||
| Pharming | ||
| War driving | ||
| Hacking |
10 points
QUESTION 7
Which of the following is NOT a characteristic of a 'good' virus:
| Undetectable | ||
| Able to spread easily | ||
| Destroys its host quickly | ||
| Delivers an effective payload |
10 points
QUESTION 8
Programs that lock a computer down until a payment is made are called:
| Viruses | ||
| Spyware | ||
| Adware | ||
| Ransomware |
10 points
QUESTION 9
A danger with credit/debit cards and ATM usage is:
| Phishing | ||
| Skimming | ||
| Pharming | ||
| War driving |
10 points
QUESTION 10
Attempting to gain access to a system without authorization is:
| Perfectly legal | ||
| Cracking | ||
| Not a serious problem | ||
| Phishing |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
