Filters
Question type

Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.


A) strong arm
B) permuted
C) brute-force
D) zero-day
E) infinity

F) A) and C)
G) A) and B)

Correct Answer

verifed

verified

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.


A) cash-out fraudsters
B) data harvesters
C) corporate spies
D) ethical hackers
E) information hoarders

F) A) and C)
G) A) and B)

Correct Answer

verifed

verified

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:


A) honeypots.
B) zombots.
C) botnets.
D) blacklists.
E) megabots.

F) A) and B)
G) All of the above

Correct Answer

verifed

verified

The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining and improving organizational security.

A) True
B) False

Correct Answer

verifed

verified

The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card that can be received and processed by banking and transaction firms at the time of payment. They are in use in ApplePay and Android Wallet.

Correct Answer

verifed

verified

Describe briefly how technology can be leveraged to offset the attempts of attackers to undermine information security.

Correct Answer

verifed

verified

Technology plays a most important role i...

View Answer

Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.

A) True
B) False

Correct Answer

verifed

verified

Showing 81 - 87 of 87

Related Exams

Show Answer