Question: *** Understanding Computers Today and Tomorrow *** #1 This type of authentication method requires a physical component to gain access: a-Double authentication b-Passwords c-Possessed Objects

*** Understanding Computers Today and Tomorrow ***

#1 This type of authentication method requires a physical component to gain access:

a-Double authentication

b-Passwords

c-Possessed Objects

d-Biometric Devices

#2 Using social media, conversations, and/or research on a person to make intelligent guesses at passwords is an example of:

a-Phishing

b-Pharming

c-Brute Force Hacking

d-Social Engineering

#3 War driving is:

a-Hacking into a mainframe

b-Attempting to access unprotected wifi networks

c-Using a car to gain access to a secure facility

d-A sophisticated network attack

#4 Writing a script to attempt to try multiple passwords for an account is an example of:

a-Brute force hacking

b-Social engineering

c-War driving

d-Throttling

#5 Using an anatomical characteristic (e.g. facial recognition) is an example of:

a-Passwords

b-Possessed objects

c-Double authentication

d-Biometric devices

#6 Collecting accounts through various means that may be compromised is:

a-Social engineering

b-Pharming

c-War driving

d-Hacking

#7 Which of the following is NOT a characteristic of a 'good' virus:

a-Undetectable

b-Able to spread easily

c-Destroys its host quickly

d-Delivers an effective payload

#8 Programs that lock a computer down until a payment is made are called:

a-Viruses

b-Spyware

c-Adware

d-Ransomware

#9 A danger with credit/debit cards and ATM usage is:

a-Phishing

b-Skimming

c-Pharming

d-War driving

#10 Attempting to gain access to a system without authorization is:

a-Perfectly legal

b-Cracking

c-Not a serious problem

d-Phishing

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!