
Non-fraudulent vs. Fraudulent Threats ( GROUP 6 )
Authored by Mark Feguro
Information Technology (IT)
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary origin of non-fraudulent threats?
Phishing attempts via SMS
Malware-laden applications
Deliberate attacks for financial gain
Mistakes or technical shortcomings
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a fraudulent threat in IoT?
Using factory default passwords because the user didn't change them
Lack of firmware updates due to device limitations
Botnet formation using default credentials to launch DDoS attacks
Using unencrypted communication protocols like Telnet
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the presentation, why are IoT and mobile devices particularly vulnerable?
They have high computing power that attracts attackers.
They often struggle to support strong authentication and encryption
They are not multiplying rapidly.
They do not process sensitive personal data.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does "Smishing" refer to?
Disguised apps that inject malware
Spyware that captures user activity
Phishing via SMS to trick users into revealing credentials
Hijacking devices to demand a ransom
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is considered a non-fraudulent threat for mobile devices?
Spyware and keyloggers
Excessive app permissions leading to unintentional data leakage
Malicious APKs
Vishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key reason for the expanding cyber-attack surface?
A decline in data sensitivity.
The decrease in the number of smart appliances.
The use of strong encryption on all devices.
The rapid multiplication of IoT and mobile endpoints
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Mirai and Mozi botnets are examples of what kind of threat?
Non-fraudulent IoT threats
Fraudulent mobile threats
Non-fraudulent mobile threats
Fraudulent IoT threats
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?