Search Header Logo

Non-fraudulent vs. Fraudulent Threats ( GROUP 6 )

Authored by Mark Feguro

Information Technology (IT)

University

Used 2+ times

Non-fraudulent vs. Fraudulent Threats ( GROUP 6 )
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary origin of non-fraudulent threats?

Phishing attempts via SMS

Malware-laden applications

Deliberate attacks for financial gain

Mistakes or technical shortcomings

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a fraudulent threat in IoT?

Using factory default passwords because the user didn't change them

Lack of firmware updates due to device limitations

Botnet formation using default credentials to launch DDoS attacks

Using unencrypted communication protocols like Telnet

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the presentation, why are IoT and mobile devices particularly vulnerable?

They have high computing power that attracts attackers.

They often struggle to support strong authentication and encryption

They are not multiplying rapidly.

They do not process sensitive personal data.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "Smishing" refer to?

Disguised apps that inject malware

Spyware that captures user activity

Phishing via SMS to trick users into revealing credentials

Hijacking devices to demand a ransom

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a non-fraudulent threat for mobile devices?

Spyware and keyloggers

Excessive app permissions leading to unintentional data leakage

Malicious APKs

Vishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key reason for the expanding cyber-attack surface?

A decline in data sensitivity.

The decrease in the number of smart appliances.

The use of strong encryption on all devices.

The rapid multiplication of IoT and mobile endpoints

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Mirai and Mozi botnets are examples of what kind of threat?

Non-fraudulent IoT threats

Fraudulent mobile threats

Non-fraudulent mobile threats

Fraudulent IoT threats

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?