Last Updated on December 11, 2018 by Admin
Cybersecurity Essentials 1.1 Chapter 3 Quiz Online 100% 2018
Learning with Cisco Netacad, there are many exams and lab activities to do. Some instructor require students to complete all Chapter exams, Final Exam and Chapter Quiz. No mater what instructors want you to do, examict.com offers all exams answers with clear explanation. Our Experts have verified all exam answers before we published to the website. We recommended you to chose any relevant chapter from the following:
Assignments | |
Answers | Online Test |
Final Quiz | Online |
Practice Quizzes | |
Answers | Online Test |
Chapter 1 Quiz | Online |
Chapter 2 Quiz | Online |
Chapter 3 Quiz | Online |
Chapter 4 Quiz | Online |
Chapter 5 Quiz | Online |
Chapter 6 Quiz | Online |
Chapter 7 Quiz | Online |
Chapter 8 Quiz | Online |
Final Quiz Form B | Online |
CE -- Chapter 3 Quiz
Quiz-summary
0 of 18 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
Information
CE -- Chapter 3 Quiz
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 18 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- Answered
- Review
-
Question 1 of 18
1. Question
1 pointsWhat is a vulnerability that allows criminals to inject scripts into web pages viewed by users?Correct
Incorrect
Cross-site scripting (XSS) allows criminals to inject scripts that contain malicious code into web applications.
Hint
Cross-site scripting (XSS) allows criminals to inject scripts that contain malicious code into web applications. -
Question 2 of 18
2. Question
1 pointsWhat type of attack targets an SQL database using the input field of a user?Correct
Incorrect
A criminal can insert a malicious SQL statement in an entry field on a website where the system does not filter the user input correctly.
Hint
A criminal can insert a malicious SQL statement in an entry field on a website where the system does not filter the user input correctly. -
Question 3 of 18
3. Question
2 pointsWhich two reasons describe why WEP is a weak protocol? (Choose two.)Correct
Incorrect
The initialization vector (IV) of WEP is as follows:
- Is a 24-bit field, which is too small
- Is cleartext and readable
- Is static and causes identical key streams to repeat on a busy network
Hint
The initialization vector (IV) of WEP is as follows:- Is a 24-bit field, which is too small
- Is cleartext and readable
- Is static and causes identical key streams to repeat on a busy network
-
Question 4 of 18
4. Question
1 pointsWhat is the difference between a virus and a worm?Correct
Incorrect
Worms are able to self-replicate and exploit vulnerabilities on computer networks without user participation.
Hint
Worms are able to self-replicate and exploit vulnerabilities on computer networks without user participation. -
Question 5 of 18
5. Question
1 pointsA criminal is using software to obtain information about the computer of a user. What is the name of this type of software?Correct
Incorrect
Spyware is software that tracks the activity of a user and obtains information about that user.
Hint
Spyware is software that tracks the activity of a user and obtains information about that user. -
Question 6 of 18
6. Question
1 pointsWhat is the meaning of the term logic bomb?Correct
Incorrect
A logic bomb remains inactive until a trigger event occurs. Once activated, a logic bomb runs malicious code that causes harm to a computer.
Hint
A logic bomb remains inactive until a trigger event occurs. Once activated, a logic bomb runs malicious code that causes harm to a computer. -
Question 7 of 18
7. Question
1 pointsWhat is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?Correct
Incorrect
Phishing is used by malicious parties who create fraudulent messages that attempt to trick a user into either sharing sensitive information or installing malware.
Hint
Phishing is used by malicious parties who create fraudulent messages that attempt to trick a user into either sharing sensitive information or installing malware. -
Question 8 of 18
8. Question
2 pointsWhat are two ways to protect a computer from malware? (Choose two.)Correct
Incorrect
At a minimum, a computer should use antivirus software and have all software up to date to defend against malware.
Hint
At a minimum, a computer should use antivirus software and have all software up to date to defend against malware. -
Question 9 of 18
9. Question
1 pointsWhat occurs on a computer when data goes beyond the limits of a buffer?Correct
Incorrect
A buffer overflow occurs by changing data beyond the boundaries of a buffer and can lead to a system crash, data compromise, or cause escalation of privileges.
Hint
A buffer overflow occurs by changing data beyond the boundaries of a buffer and can lead to a system crash, data compromise, or cause escalation of privileges. -
Question 10 of 18
10. Question
1 pointsWhat is the term used to describe an email that is targeting a specific person employed at a financial institution?Correct
Incorrect
Spear phishing is a phishing attack customized to reach a specific person or target.
Hint
Spear phishing is a phishing attack customized to reach a specific person or target. -
Question 11 of 18
11. Question
1 pointsAn attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?Correct
Incorrect
Blusnarfing is the copying of user information through unauthorized Bluetooth transmissions.
Hint
Blusnarfing is the copying of user information through unauthorized Bluetooth transmissions. -
Question 12 of 18
12. Question
2 pointsWhat are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)Correct
Incorrect
Social engineering tactics include the following:
- Authority
- Intimidation
- Consensus/Social Proof
- Scarcity
- Urgency
- Familiarity/Liking
- Trust
Hint
Social engineering tactics include the following:- Authority
- Intimidation
- Consensus/Social Proof
- Scarcity
- Urgency
- Familiarity/Liking
- Trust
-
Question 13 of 18
13. Question
2 pointsWhat are two common indicators of spam mail? (Choose two.)Correct
Incorrect
Spam is a common method of advertising through the use of unsolicited email and may contain malware.
Hint
Spam is a common method of advertising through the use of unsolicited email and may contain malware. -
Question 14 of 18
14. Question
1 pointsWhich term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?Correct
Incorrect
Smishing is also known as SMS phishing and is used to send deceptive text messages to trick a user into calling a phone number or visiting a specific website.
Hint
Smishing is also known as SMS phishing and is used to send deceptive text messages to trick a user into calling a phone number or visiting a specific website. -
Question 15 of 18
15. Question
1 pointsA computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?Correct
Incorrect
Ransomware commonly encrypts data on a computer and makes the data unavailable until the computer user pays a specific sum of money.
Hint
Ransomware commonly encrypts data on a computer and makes the data unavailable until the computer user pays a specific sum of money. -
Question 16 of 18
16. Question
1 pointsWhat is the name for the type of software that generates revenue by generating annoying pop-ups?Correct
Incorrect
Adware is a type of malware that displays pop-ups on a computer to generate revenue for the creator of the malware.
Hint
Adware is a type of malware that displays pop-ups on a computer to generate revenue for the creator of the malware. -
Question 17 of 18
17. Question
1 pointsWhat does a rootkit modify?Correct
Incorrect
A rootkit commonly modifies an operating system to create a backdoor to bypass normal authentication mechanisms.
Hint
A rootkit commonly modifies an operating system to create a backdoor to bypass normal authentication mechanisms. -
Question 18 of 18
18. Question
1 pointsWhat is the name given to a program or program code that bypasses normal authentication?Correct
Incorrect
A backdoor is a program or program code implemented by a criminal to bypass the normal authentication that is used to access a system.
Hint
A backdoor is a program or program code implemented by a criminal to bypass the normal authentication that is used to access a system.
Learning with Cisco Netacad, there are many exams and lab activities to do. Some instructor require students to complete all Chapter exams, Final Exam and Chapter Quiz. No mater what instructors want you to do, examict.com offers all exams answers with clear explanation. Our Experts have verified all exam answers before we published to the website. We recommended you to chose any relevant chapter from the following:
Assignments | |
Answers | Online Test |
Final Quiz | Online |
Practice Quizzes | |
Answers | Online Test |
Chapter 1 Quiz | Online |
Chapter 2 Quiz | Online |
Chapter 3 Quiz | Online |
Chapter 4 Quiz | Online |
Chapter 5 Quiz | Online |
Chapter 6 Quiz | Online |
Chapter 7 Quiz | Online |
Chapter 8 Quiz | Online |
Final Quiz Form B | Online |