Some its examples are Trojan, adware, and spyware
Fill in the blank with the appropriate word ___is software that is a subcategory of malware and
refers to unwanted software that performs malicious actions on a user’s computer. Some its
examples are Trojan, adware, and spyware.
Which of the following tools is John using to crack the wireless encryption keys?
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The
description of the tool is as follows:
Which of the following tools is John using to crack the wireless encryption keys?
Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
Which of the following security policies will you implement to keep safe your data when you connect your Lapto
Which of the following security policies will you implement to keep safe your data when you
connect your Laptop to the office network over IEEE 802.11 WLANs?
Each correct answer represents a complete solution. Choose two.
Which of the following is the first computer virus that was used to infect the boot sector of storage media fo
Which of the following is the first computer virus that was used to infect the boot sector of storage
media formatted with the DOS File Allocation Table (FAT) file system?
Which of the following needs to be documented to preserve evidences for presentation in court?
Which of the following needs to be documented to preserve evidences for presentation in court?
Which of the following statements are true about the Kerberos authentication scheme?
Kerberos is a computer network authentication protocol that allows individuals communicating
over a non-secure network to prove their identity to one another in a secure manner. Which of the
following statements are true about the Kerberos authentication scheme?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is used in asymmetric encryption?
Which of the following is used in asymmetric encryption?
Which of the following types of cybercrime has Sam performed?
Sam, a malicious hacker, targets the electric power grid of Umbrella Inc. and gains access to the
electronic control systems. Which of the following types of cybercrime has Sam performed?
which of the following attacks may she become vulnerable to?
Maria works as a Desktop Technician for PassGuide Inc. She has received an e-mail from the MN
Compensation Office with the following message:
Dear Sir/Madam,
My name is Edgar Rena, the director of compensation here at the MN Compensation Office in
Chicago. We receive so many complaints about fraudulent activities that have been taking place in
your region for the past few years. Due to the high volume loss of money, the MN compensation
department has had an agreement with the appropriate authority to compensate each victim with a
sum of USD$500,000.00.
You were selected among the list of people to be paid this sum. To avoid any imperative mood by
intending scammers, your payment has been transmuted into an International bank draft which
can be cashed at any local bank in your country.
Please fill the below details and send it to our secretary for your compensation bank draft.
Full name: ______
Address: ________
Tel: ____________
Fill & Send to:
Dr. Michael Brown
MN Compensation Office, IL
Tel: +1-866-233-8434
Email: micbrown@live.com
Further instructions shall be given to you by our secretary as soon as you contact him. To avoid
losing your compensation, you are requested to pay the sum of $350 for Insurance Premium to
our secretary.
Thanks and God bless.
If Maria replies to this mail, which of the following attacks may she become vulnerable to?