
1.3 - Surveying the Cyberspace
Authored by Aviciena Santoso
Computers
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Man in the middle
Packet sniffing
Social engineering
Malware attacks
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker, pretending to be a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link.
Whaling
Fishing attack
Code injection
Phishing attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A common cyberattack where malicious software executes unauthorized actions on the victim’s system.
Code injection
Malware attacks
Lack of segregation
Default credentials
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This attack uses trial-and-error to guess login info, encryption keys, or to find a hidden web page.
Brute force attack
Trial and error attack
Password reuse attack
Encryption attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these vulnerabilities in a database happens when a user can access the information of another user with the same login credentials?
Default credentials
Unpatched database
Lack of authentication
Lack of segregation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following vulnerabilities in a database occurs when the developer does not configure a production database after creating it?
Default components and values
Default credentials
Failed configurations
Unpatched database
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users inundated with requirements to supply complex passwords to different systems often resort to reusing the same password across multiple accounts so that they can easily manage their credentials. This leads to which of the following vulnerabilities?
Faulty sessions
Identity theft
Credential reuse
Need a secretary to manage all my passwords
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?