Podcast
Questions and Answers
Which type of attack helps cyber criminals find open ports and determine if active security devices like firewalls are being used?
Which type of attack helps cyber criminals find open ports and determine if active security devices like firewalls are being used?
- Port scan attack (correct)
- Browser-in-the-browser
- Virus infection
- Unprotected share
What is the purpose of a browser-in-the-browser phishing scam?
What is the purpose of a browser-in-the-browser phishing scam?
- To steal sensitive user information (correct)
- To infect machines with a virus
- To connect to unprotected shares
- To attack computer systems with hoaxes
What does a virus do to infected machines?
What does a virus do to infected machines?
- Simulate a web browser window
- Connect to unprotected shares
- Infect certain common executable or script files (correct)
- Perform a port scan attack
What is an unprotected share?
What is an unprotected share?
What is a devious approach to attacking computer systems involving a virus hoax?
What is a devious approach to attacking computer systems involving a virus hoax?
True or false: A port scan attack helps cyber criminals find open ports and determine if active security devices like firewalls are being used by an organization.
True or false: A port scan attack helps cyber criminals find open ports and determine if active security devices like firewalls are being used by an organization.
True or false: Browser-in-the-browser is a type of phishing scam where sensitive user information is stolen by simulating a web browser window within a web browser.
True or false: Browser-in-the-browser is a type of phishing scam where sensitive user information is stolen by simulating a web browser window within a web browser.
True or false: A virus infects certain common executable or script files on all computers it can write to, causing infection.
True or false: A virus infects certain common executable or script files on all computers it can write to, causing infection.
True or false: An unprotected share is a mechanism that allows any user to connect to file systems and printers on other systems.
True or false: An unprotected share is a mechanism that allows any user to connect to file systems and printers on other systems.
True or false: A virus hoax involves the transmission of a real virus attached to a message pretending to be a virus warning.
True or false: A virus hoax involves the transmission of a real virus attached to a message pretending to be a virus warning.
Flashcards are hidden until you start studying