Cybersecurity essentials chapter 3 quiz Welcome to Cybersecurity essentials chapter 3 quiz What is the name given to a program or program code that bypasses normal authentication? Select one: backdoor Trojan worm virus ransomware None What is the term used to describe an email that is targeting a specific person employed at a financial institution? Select one: spyware spam spear phishing target phishing vishing None What is the meaning of the term logic bomb? Select one: a malicious program that uses a trigger to awaken the malicious code a malicious program that hides itself in a legitimate program a malicious virus a malicious worm None An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this? Select one: RF jamming bluejacking smishing blue snarfing None What does a rootkit modify? Select one: programs operating system Microsoft Word Notepad screen savers None A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this? Select one: a type of logic bomb a type of worm a type of ransomware a type of virus None What is the difference between a virus and a worm? Select one: Worms require a host file but viruses do not. Worms self-replicate but viruses do not. Viruses self-replicate but worms do not. Viruses hide in legitimate programs but worms do not. None Which two reasons describe why WEP is a weak protocol? (Choose two.) Select one or more: The default settings cannot be modified. Everyone on the network uses a different key. The key is transmitted in clear text. The key is static and repeats on a congested network. WEP uses the same encryption features as Bluetooth. What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.) Select one or more: intimidation integrity urgency honesty compassion What is a vulnerability that allows criminals to inject scripts into web pages viewed by users? Select one: Cross-site scripting SQL injection XML injection buffer overflow None Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website? Select one: smishing grayware spam impersonation None A criminal is using software to obtain information about the computer of a user. What is the name of this type of software? Select one: spyware adware virus phishing None What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source? Select one: phishing Trojan social engineering backdoor vishing None What are two common indicators of spam mail? (Choose two.) Select one or more: The email has keywords in it. The email is from your supervisor. The email has misspelled words or punctuation errors or both. The email is from a friend. The email has no subject line. The email has an attachment that is a receipt for a recent purchase. What type of attack targets an SQL database using the input field of a user? Select one: buffer overflow XML injection SQL injection Cross-site scripting None What are two ways to protect a computer from malware? (Choose two.) Select one or more: Use antivirus software. Keep software up to date. Defragment the hard disk. Delete unused software. Empty the browser cache. What occurs on a computer when data goes beyond the limits of a buffer? Select one: an SQL injection a buffer overflow a system exception cross-site scripting None What is the name for the type of software that generates revenue by generating annoying pop-ups? Select one: trackers adware spyware pop-ups None