Which Of The Following Would Be Considered Spyware
Question:
Answer: malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit
Question: There are various encryption methods, but __________ is the encryption standard currently used worldwide.
a) DDoS
b) TLS
c) AES
d) IMSI
Answer: AES
Question: Trojans depend on ________ to spread.
a) code injection
b) social engineering
c) self-replication
d) rootkits
Answer: social engineering
Question: Which of the following would be considered spyware?
a) all of the above
b) a keylogger
c) Antivirus software
d) firewall software
Answer: a keylogger
Question: What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?
a) Evil Twin
b) PUP
c) adware
d) RAT
Answer: PUP
Question: The current method of encrypting communication between a client and a server depends on a security protocol called _______.
a) TLS
b) RAT
c) AES
d) PUP
Answer: TLS
Question: If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.
a) keylogger
b) personal firewall
c) password manager
d) encryption key
Answer: password manager
Question: _______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.
a) DDoS
b) All of the above
c) Commands from a botmaster
d) Botnets
Answer: all of the above
Question: _____________ software shields certain applications against behaviors commonly exhibited by intrusions.
a) Malware
b) Virus signature
c) Antivirus
d) Anti-exploit
Answer: anti-exploit
Question: ____________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs.
a) Safe Browsing
b) SmartScreen Filter
c) Personal Firewall
d) Heuristic Analysis
Answer: safe browsing