Title | Module 7 - Answers |
---|---|
Course | Computer Applications |
Institution | Laurentian University |
Pages | 7 |
File Size | 217 KB |
File Type | |
Total Downloads | 63 |
Total Views | 139 |
Answers...
Exam Study Guide Sunday, October 27, 2019
Student:
White, Mackenzie
Assignment:
7-Module-7-Review
Assignment Date:
10/27/2019
Score(%):
100
Objective Questions Result
Response
Computer Concepts
_______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service. (512786)
Correct
A:DDoS
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 482
Computer Concepts
__________ changes an originating address or a destination address to redirect the flow of data between two parties. (512800)
Correct
C:Address spoofing
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 491
Computer Concepts
__________ is the process of modifying an executable file or data stream by adding additional commands. (512766)
Correct
D:Code injection
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 468
Computer Concepts
____________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs. (512816)
Correct
B:Safe Browsing
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 505
Computer Concepts
____________ is a term for a person who devises and carries out a scam in order to accomplish a goal. (512804)
Correct
D:None of the above •
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 497
Computer Concepts
_____________ exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites. (512814)
Correct
C:Spear phishing
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 503
Computer Concepts
_____________ software shields certain applications against behaviors commonly exhibited by intrusions. (512790)
Correct
C:Antivirus
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 483
Subject
Question (ID)
Remediation
Exam Study Guide Report Page 1 of 7
Exam Study Guide Subject
Question (ID)
Result
Computer Concepts
______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest. (512803)
Correct
Computer Concepts
______________________ increases security by verifying identity based on more than just a password or PIN. (512821)
Correct
Computer Concepts
A ______________ exploit usually begins with a virus warning and an offer to disinfect the infected device. (512818)
Computer Concepts
Response
Remediation
C:Social engineering •
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 497
C:Two-factor authentication
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 456
Correct
A:rogue antivirus
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 506
A computer _________ is a set of selfreplicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device. (512763)
Correct
B:virus
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 468
Computer Concepts
A cryptographic __________ is a procedure for encryption or decryption. (512750)
Correct
D:algorithm
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 455
Computer Concepts
A password manager can store passwords in an encrypted file located at which of the following storage locations? (512762)
Correct
D:All of the above
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 465
Computer Concepts
A social engineering scam called ___________ is when a victim is promised a large sum of money in exchange for the temporary use of a bank account. (512806)
Correct
A:advance fee fraud •
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 498
Computer Concepts
A virus __________ usually arrives as an email message that contains warnings about a fake virus. (512779)
Correct
C:hoax
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 477
Computer Concepts
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications. (512794)
Correct
B:firewall
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 485
Computer Concepts
A(n) __________ pings a packet of data to a port in order to see if that port is open or not. (512793)
Correct
B:port scan
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 484
Computer Concepts
A(n) ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker. (512782)
Correct
D:RAT
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 480
Exam Study Guide Report Page 2 of 7
Exam Study Guide Result
Response
Computer Concepts
Subject
A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code. (512789)
Question (ID)
Correct
A:zero-day
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 483
Computer Concepts
A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software. (512780)
Correct
B:online intrusion
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 479
Computer Concepts
Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files. (512775)
Correct
A:heuristic analysis
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 472
Computer Concepts
If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option. (512759)
Correct
C:password manager •
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 463
Computer Concepts
If you suspect that your computer might be infected by a zero-day exploit, launching a (n) _______________ with a product such as Malwarebytes might identify the infection. (512791)
Correct
A:on-demand scan
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 483
Computer Concepts
If you use a password manager, what do you as the user need to remember? (512761)
Correct
B:The master password
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 464
Computer Concepts
MITM (man-in-the-middle) attacks include which of the following? (512797)
Correct
D:All of the above
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 489
Computer Concepts
Spam accounts for approximately ______ of all email. (512809)
Correct
D:70%
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 499
Computer Concepts
The best defense against malware is _____________. (512774)
Correct
C:antivirus software •
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 472
Computer Concepts
The current method of encrypting communication between a client and a server depends on a security protocol called _______. (512802)
Correct
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 492
Computer Concepts
There are various encryption methods, but __________ is the encryption standard currently used worldwide. (512749)
Correct
• A:AES (Advanced Encryption Standard)
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 455
B:TLS
Remediation
Exam Study Guide Report Page 3 of 7
Exam Study Guide Subject
Question (ID)
Result
Response
Computer Concepts
This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers. (512747)
Correct
B:Encryption
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 455
Computer Concepts
To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection. (512799)
Correct
B:Evil Twin
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 490
Computer Concepts
Trojans depend on ________ to spread. (512772)
Correct
B:social engineering •
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 471
Computer Concepts
What is the process called when an app from a source other than an official app store is installed on a device? (512767)
Correct
A:Side-loading
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 469
Computer Concepts
What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed? (512820)
Correct
B:PUP
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 507
Computer Concepts
When antivirus software detects malware, which of the following would not be a course of action you could take? (512777)
Correct
A:Conduct a heuristic • analysis.
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 473
Computer Concepts
Which of the following attacks uses password-cracking software to generate every possible combination of letters, numerals, and symbols? (512756)
Correct
D:Brute force
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 460
Computer Concepts
Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network? (512795)
Correct
D:All of the above
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 485-486
Computer Concepts
Which of the following is not a characteristic of a computer worm? (512769)
Correct
D:Spread through a process called sideloading
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 470
Computer Concepts
Which of the following is not a characteristic of a weak password? (512757)
Correct
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 461
Computer Concepts
Which of the following is not a type of spam filter? (512812)
Correct
A:Eight characters in • length and include one or more uppercase letters, numbers, and symbols • D:Entropy
Remediation
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 502 Exam Study Guide Report Page 4 of 7
Exam Study Guide Subject
Question (ID)
Result
Response
Computer Concepts
Which of the following is not an example of user authentication? (512751)
Correct
D:URLs (Uniform Resource Locators)
Computer Concepts
Which of the following sequence of events best describes an online intrusion? (512781)
Correct
Computer Concepts
Which of the following would be considered spyware? (512796)
Correct
Computer Concepts
A botnet has a server that is controlled by hackers. (512785)
Computer Concepts
Remediation •
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 456
A:Malware enters the • device, and then opens a backdoor, which opens a communications link on the device that a hacker can exploit.
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 479
A:A keylogger
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 489
Correct
True
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 482
A dropper installs a malicious program on a device, and it works with an entire program. Code injection inserts a segment of malicious code into another program. It carries only a short segment of code rather than an entire program. (512823)
Correct
True
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 471
Computer Concepts
A key characteristic of viruses is their ability to lurk in a device for days or months, quietly replicating themselves. (512768)
Correct
True
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 469
Computer Concepts
All Android devices automatically encrypt data stored on the device when a user activates the login password. (512753)
Correct
False
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 457
Computer Concepts
An original message or file that has not yet been encrypted is referred to as ciphertext. (512748)
Correct
False
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 455
Computer Concepts
Antivirus software cannot be expected to block threats that do not arrive in the form of malware. (512788)
Correct
True
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 483
Computer Concepts
Antivirus software’s on-access scanning has a high probability of identifying zero-day exploits. (512822)
Correct
False
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 483
Computer Concepts
Any data entering a digital device could be malware. (512773)
Correct
True
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 472
Exam Study Guide Report Page 5 of 7
Exam Study Guide Result
Response
Computer Concepts
Subject
Blacklist and header filtering are usually performed by email clients and Webmail services. (512813)
Question (ID)
Correct
False
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 502
Computer Concepts
Brute force attacks methodically try every possible password until the correct one is found. (512758)
Correct
True
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 460
Computer Concepts
Correctly installed antivirus software will prevent all intrusions. (512787)
Correct
False
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 483
Computer Concepts
FileVault is a MacOS utility included on by default on Macintosh computers that automatically encrypts data stored locally. (512755)
Correct
True
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 459
Computer Concepts
Hackers can use ports to communicate with devices in botnets. (512792)
Correct
True
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 484
Computer Concepts
Heuristics may produce false positives that mistakenly identify a legitimate file as malware. (512776)
Correct
True
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 473
Computer Concepts
If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure. (512801)
Correct
True
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 493
Computer Concepts
If you are traveling and expect to access files on a computer that you’ve left at home, make sure the remote access utility is turned off. (512784)
Correct
False
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 480
Computer Concepts
In addition to replicating itself, a virus is self-distributing. (512764)
Correct
False
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 468
Computer Concepts
It is not possible to encrypt a Windows hard drive volume. (512754)
Correct
False
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 458
Computer Concepts
Microsoft uses a service called Safe Browsing to alert users about sites to avoid. (512817)
Correct
False
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 505
Computer Concepts
Most ISPs and email services do not use filtering techniques to block spam. (512811)
Correct
False
•
New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 501
Computer Concepts
Most...