Question: When the malicious VB script embedded in the remote Word document's template will be executed? * When the document is opened After you click on

  1. When the malicious VB script embedded in the remote Word document's template will be executed? *

  1. When the document is opened
  2. After you click on 'Enable content' button
  3. When you write something in the document.

2- When the malicious VB script embedded in the Word document will be executed? *

  1. When the document is opened

b- After you click on 'Enable content' button

c-When you write something in the document.

  1. What you should look at to identify phishing when you open a URL in an Internet browser? *

  1. Domain name
  2. TLS certificate - 'Issued by' field
  3. TLS certificate - 'Issued to' field
  4. Protocol (HTTP or HTTPS)
  5. Validity dates
  6. Recommended action by the Internet browser
  1. The CIA triad is an information security model that covers the following features of information: *

  1. Integration
  2. Confidentiality
  3. Accessibility
  4. Availability
  5. Integrity
  6. Connectivity

  1. A crypto algorithms that use the same cryptographic keys for both encryption and decryption are: *

a-Symmetric

b-Asymmetric

c-Hashing

  1. Select the techniques that belong to Social Engineering. *

a-Phishing

b-Pharming

c-Tailgating

d-Shoulder surfing

e-Exploitation

f-Pretexting

g-Vishing

h-DLL Side Loading

l-Smishing

  1. A trojan can be launched by using the DLL Side-Loading attack in which the malicious DLL is placed in the same folder with GoogleUpdate.exe (Google's legitimate file) and loaded during startup into the Google Updater process instead of the legitimate library (goopdate.dll). Select four relevant tactics that this scenario belongs to. *

a-Initial Access

b-Execution

c-Persistence

d-Privilege Escalation

e-Defense Evasion

f-Credential Access

g-Discovery

h-Lateral Movement

l-Collection

m-Command and Control

n-Exfiltration

j-Impact

8-CosmicDuke APT copies the clipboard contents every 30 seconds, takes screenshots and uploads the collected data to the attacker's server. Select four relevant tactics. *

a-Initial Access

b-Execution

c-Persistence

d-Privilege Escalation

e-Defense Evasion

f-Credential Access

g-Discovery

h-Lateral Movement

l-Collection

m-Command and Control

n-Exfiltration

j-Impact

9-You can trust the website if it uses the HTTPS protocol. *

Yes

No

10-browsers can detect phishing URLs. *

1 point

Yes

No

11-The type of threat in which threat actors actively pursue and compromise a target entity's infrastructure while maintaining anonymity. *

a-DDoS attack

b-Web attack

c-Targeted attack

d-Phishing attack

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!