A) Employee sabotage
B) Malware
C) A virus
D) A worm
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) 10 percent
B) 20 percent
C) 42 percent
D) 28 percent
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Malicious software that blocks access to a system or data until money is paid to the attacker
B) A generic name for any "evil software"
C) A piece of code executed by a virus or a worm
D) A program that gives an attacker remote control of your computer
Correct Answer
verified
Multiple Choice
A) Bank account theft
B) Credit card number theft
C) Spoofing
D) Spam
Correct Answer
verified
Multiple Choice
A) spear phishing
B) sabotage
C) IP address spoofing
D) hacking
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Financial professionals
B) IT security employees
C) CEOs
D) Data entry clerks
Correct Answer
verified
Multiple Choice
A) Rootkits are seldom caught by ordinary antivirus programs.
B) Rootkits take over the root account of a computer.
C) Rootkits use a root account's privileges to hide themselves.
D) Rootkits are typically less of a threat than are Trojan horses.
Correct Answer
verified
Multiple Choice
A) $3.9 million per incident
B) $150 million per year
C) $10,000 per incident
D) $190,000 per year
Correct Answer
verified
Multiple Choice
A) China
B) Russia
C) Iran
D) United States
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) An APT
B) A black-market websites
C) A bug bounty
D) Carding
Correct Answer
verified
Multiple Choice
A) Amazon
B) Yahoo! Inc.
C) First American Corp.
D) Facebook
Correct Answer
verified
Showing 1 - 20 of 69
Related Exams