Quiz2

pdf

School

Ohio State University *

*We aren’t endorsed by this school

Course

4081

Subject

Electrical Engineering

Date

Apr 3, 2024

Type

pdf

Pages

6

Uploaded by GrandVulturePerson209

Report
Telecommunication Network S... > Quizzes > Chapter 2 Self-Assessment 1241 - Spring 2024 Chapter 2 Self-Assessment Home Syllabus Due Mar 10 at 11:59pm Points 20 Questions 20 Dashboard Modules Available Mar 4 at 12am - Mar 10 at 11:59pm Time Limit 15 Minutes Announcements Courses People . it P Attempt History Groups Discussions Attempt Time Score Assignments LATEST Attempt 1 12 minutes 20 out of 20 [ec1 LTS . Quizzes Grades (2] Score for this quiz: 20 out of 20 Zoom Submitted Mar 5 at 1:29pm This attempt took 12 minutes. Honorlock Purchase Course Question 1 1/1pts Materials New Analytics Li downloads a program that prints out coupons but in the background it Launch VHLCentral silently collects her passwords. Li has actually downloaded a(n) _____. virus Send spam e-mail to all users If the company's stock price drop: ten additional years of retirement credit logic bomb Question 2 1/1pts ,,,,, is following an authorized person through a secure door. Taigating Social Engi > Following (SEF) Backpacking Question 3 1/1pts Each of the following could be a logic bomb except ______ . Erase all data if John Smith's name is removed from the list of employees Reformat the hard drive three months after Susan Jones left the company Question 4 1/1pts Submission Details: Time: 12 minutes Current Score: 20 out of 20 Kept Score: 20 out of 20
_____isanimage spam that is divided into multiple images and each piece of the message is divided and then layered to create a complete and legible message. Word splitting Geometric variance GIF layering Split painting Question 5 1/1pts Observing from a distance a user who enters a keypad code is known as shoulder surfing piggybacking spoofing watching Question 6 1/1pts Corre Each of the following is an action that a virus can take except Transport itself through the network to another device Cause a computer to crash Erase files from a hard drive nultiple copies of itself and consumed all of the free space in a hard Question 7 1/1pts requires a user to transport it from one computer to another. rootkit virus Trojan Question 8 1/1pts _____isageneral term used for describing software that gathers information without the user's consent.
Adware Scrapeware Pullware Spyware Question 9 1/1pts How can an attacker use a hoax? A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings. By sending out a hoax an attacker can convince a user to read his e-mail mo A user wk es multiple hoaxes could contact his supervisor for help. Hoaxes are not used by attackers today. Question 10 1/1pts Which of the following is a social engineering technique that uses flattery on a victim? Conformity Friendliness Ingratiation Question 11 1/1pts sends phishing messages only to wealthy individuals. Spear phishing Target phishing Microing Whaling Question 12 1/1pts is unsolicited instant messaging. Spam Vishing
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
SMS Phishing (SMS-P Spim Question 13 1/1pts To completely remove a rootkit from a computer you should flash the ROM BIOS erase and reinstall all files in the WINDOWS folder nd the Master Boot Record reformat the hard drive and reinstall the operating system Question 14 1/1pts An attacker who controls multiple zombies in a botnet is known as a(n) Zombie shepherd Rogue IRC Bot herder Cyber-robot Question 15 1/1pts Corre Each of the following is true regarding a keylogger except Hardware keyloggers are installed between the keyboard connector and computer keyboard or USB port Software keyloggers are easy to detect credit card numbers, or is, Keyloggers can be used to capture pas: personal information ers can be Software keylog; =signed to automatically send captured information back to the attacker through the Internet Question 16 1/1pts Each of the following is the reason why adware is scorned except __ It displays the attackers programming skills It displays objectionable con It can cause a computer to ¢ It can interfere with a ncer's nraductivit
Question 17 1/1pts The preferred method today of bot herders for command and control of zombies is to use ____ Internet Relay Chat (IRC) e-mail Hypertext Transport Protocol (HTTP) spam Question 18 1/1pts Each of the following is a different type of computer virus except _ program virus macro virus Correct remote virus boot virus Question 19 1/1pts Which of the following is not an item that could be retrieved through dumpster diving that would provide useful information? Calendars Memos Organizational charts Books Question 20 1/1pts Erin pretends to be a manager from another city and calls Nick to trick him into giving to her his password. What social engineering attack has Erin performed? Aliasing Luring 1 Impersonation Duplicity Quiz Score: 20 out of 20 PREVIOUS NEXT »
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help