Podcast
Questions and Answers
Which type of attack helps cyber criminals find open ports and determine if active security devices like firewalls are being used?
Which type of attack helps cyber criminals find open ports and determine if active security devices like firewalls are being used?
What is the purpose of a browser-in-the-browser phishing scam?
What is the purpose of a browser-in-the-browser phishing scam?
What does a virus do to infected machines?
What does a virus do to infected machines?
What is an unprotected share?
What is an unprotected share?
Signup and view all the answers
What is a devious approach to attacking computer systems involving a virus hoax?
What is a devious approach to attacking computer systems involving a virus hoax?
Signup and view all the answers
True or false: A port scan attack helps cyber criminals find open ports and determine if active security devices like firewalls are being used by an organization.
True or false: A port scan attack helps cyber criminals find open ports and determine if active security devices like firewalls are being used by an organization.
Signup and view all the answers
True or false: Browser-in-the-browser is a type of phishing scam where sensitive user information is stolen by simulating a web browser window within a web browser.
True or false: Browser-in-the-browser is a type of phishing scam where sensitive user information is stolen by simulating a web browser window within a web browser.
Signup and view all the answers
True or false: A virus infects certain common executable or script files on all computers it can write to, causing infection.
True or false: A virus infects certain common executable or script files on all computers it can write to, causing infection.
Signup and view all the answers
True or false: An unprotected share is a mechanism that allows any user to connect to file systems and printers on other systems.
True or false: An unprotected share is a mechanism that allows any user to connect to file systems and printers on other systems.
Signup and view all the answers
True or false: A virus hoax involves the transmission of a real virus attached to a message pretending to be a virus warning.
True or false: A virus hoax involves the transmission of a real virus attached to a message pretending to be a virus warning.
Signup and view all the answers