Search Header Logo

CPE315 Module 6

Authored by Monarjay Malbog

Computers

University

Used 4+ times

CPE315 Module 6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network.

Trojan Horse

Worm

Adware

Ransom ware

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of malware typically displays annoying pop-ups to generate revenue for its author?

Adware

Ransomware

Scareware

phishing

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of malware encrypts all data on a drive and demands payment in Bitcoin cryptocurrence to unencrypt the files?

Phishing

Scareware

Ransomware

Trojan Horse

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of malware attempts to convince people to divulge their personally identifable information (PII)?

phishing

rootkit

ransomware

trojan horse

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which is an example of social engineering?

a computer displaying unauthorized pop-ups and adware

an anonymous programmer directing a DDOS attack on a data center

the infection of a computer by a virus carried by a Trojan

an unidentified person claiming to be a technician collecting user information from employees

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which access attack method involves a software program that attempts to discover a system password by the use of an electronic dictionary?

Denial of Service Attack

Buffer Overflow Attack

Port Redirection Attack

Brute-Force Attack

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of a reconnaissance attack on a computer network?

To gather information about the target network and system

To redirect data traffic so that it can be monitored

To prevent users from accessing network resources

To steal data from the network servers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?