Question: When the malicious VB script embedded in the remote Word document's template will be executed? * When the document is opened After you click on
- When the malicious VB script embedded in the remote Word document's template will be executed? *
- When the document is opened
- After you click on 'Enable content' button
- When you write something in the document.
2- When the malicious VB script embedded in the Word document will be executed? *
- When the document is opened
b- After you click on 'Enable content' button
c-When you write something in the document.
- What you should look at to identify phishing when you open a URL in an Internet browser? *
- Domain name
- TLS certificate - 'Issued by' field
- TLS certificate - 'Issued to' field
- Protocol (HTTP or HTTPS)
- Validity dates
- Recommended action by the Internet browser
- The CIA triad is an information security model that covers the following features of information: *
- Integration
- Confidentiality
- Accessibility
- Availability
- Integrity
- Connectivity
- A crypto algorithms that use the same cryptographic keys for both encryption and decryption are: *
a-Symmetric
b-Asymmetric
c-Hashing
- Select the techniques that belong to Social Engineering. *
a-Phishing
b-Pharming
c-Tailgating
d-Shoulder surfing
e-Exploitation
f-Pretexting
g-Vishing
h-DLL Side Loading
l-Smishing
- A trojan can be launched by using the DLL Side-Loading attack in which the malicious DLL is placed in the same folder with GoogleUpdate.exe (Google's legitimate file) and loaded during startup into the Google Updater process instead of the legitimate library (goopdate.dll). Select four relevant tactics that this scenario belongs to. *
a-Initial Access
b-Execution
c-Persistence
d-Privilege Escalation
e-Defense Evasion
f-Credential Access
g-Discovery
h-Lateral Movement
l-Collection
m-Command and Control
n-Exfiltration
j-Impact
8-CosmicDuke APT copies the clipboard contents every 30 seconds, takes screenshots and uploads the collected data to the attacker's server. Select four relevant tactics. *
a-Initial Access
b-Execution
c-Persistence
d-Privilege Escalation
e-Defense Evasion
f-Credential Access
g-Discovery
h-Lateral Movement
l-Collection
m-Command and Control
n-Exfiltration
j-Impact
9-You can trust the website if it uses the HTTPS protocol. *
Yes
No
10-browsers can detect phishing URLs. *
1 point
Yes
No
11-The type of threat in which threat actors actively pursue and compromise a target entity's infrastructure while maintaining anonymity. *
a-DDoS attack
b-Web attack
c-Targeted attack
d-Phishing attack
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
