Module 7 - Answers PDF

Title Module 7 - Answers
Course Computer Applications
Institution Laurentian University
Pages 7
File Size 217 KB
File Type PDF
Total Downloads 63
Total Views 139

Summary

Answers...


Description

Exam Study Guide Sunday, October 27, 2019

Student:

White, Mackenzie

Assignment:

7-Module-7-Review

Assignment Date:

10/27/2019

Score(%):

100

Objective Questions Result

Response

Computer Concepts

_______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service. (512786)

Correct

A:DDoS



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 482

Computer Concepts

__________ changes an originating address or a destination address to redirect the flow of data between two parties. (512800)

Correct

C:Address spoofing



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 491

Computer Concepts

__________ is the process of modifying an executable file or data stream by adding additional commands. (512766)

Correct

D:Code injection



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 468

Computer Concepts

____________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs. (512816)

Correct

B:Safe Browsing



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 505

Computer Concepts

____________ is a term for a person who devises and carries out a scam in order to accomplish a goal. (512804)

Correct

D:None of the above •

New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 497

Computer Concepts

_____________ exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites. (512814)

Correct

C:Spear phishing



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 503

Computer Concepts

_____________ software shields certain applications against behaviors commonly exhibited by intrusions. (512790)

Correct

C:Antivirus



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 483

Subject

Question (ID)

Remediation

Exam Study Guide Report Page 1 of 7

Exam Study Guide Subject

Question (ID)

Result

Computer Concepts

______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest. (512803)

Correct

Computer Concepts

______________________ increases security by verifying identity based on more than just a password or PIN. (512821)

Correct

Computer Concepts

A ______________ exploit usually begins with a virus warning and an offer to disinfect the infected device. (512818)

Computer Concepts

Response

Remediation

C:Social engineering •

New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 497

C:Two-factor authentication



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 456

Correct

A:rogue antivirus



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 506

A computer _________ is a set of selfreplicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device. (512763)

Correct

B:virus



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 468

Computer Concepts

A cryptographic __________ is a procedure for encryption or decryption. (512750)

Correct

D:algorithm



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 455

Computer Concepts

A password manager can store passwords in an encrypted file located at which of the following storage locations? (512762)

Correct

D:All of the above



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 465

Computer Concepts

A social engineering scam called ___________ is when a victim is promised a large sum of money in exchange for the temporary use of a bank account. (512806)

Correct

A:advance fee fraud •

New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 498

Computer Concepts

A virus __________ usually arrives as an email message that contains warnings about a fake virus. (512779)

Correct

C:hoax



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 477

Computer Concepts

A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications. (512794)

Correct

B:firewall



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 485

Computer Concepts

A(n) __________ pings a packet of data to a port in order to see if that port is open or not. (512793)

Correct

B:port scan



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 484

Computer Concepts

A(n) ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker. (512782)

Correct

D:RAT



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 480

Exam Study Guide Report Page 2 of 7

Exam Study Guide Result

Response

Computer Concepts

Subject

A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code. (512789)

Question (ID)

Correct

A:zero-day



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 483

Computer Concepts

A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software. (512780)

Correct

B:online intrusion



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 479

Computer Concepts

Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files. (512775)

Correct

A:heuristic analysis



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 472

Computer Concepts

If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option. (512759)

Correct

C:password manager •

New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 463

Computer Concepts

If you suspect that your computer might be infected by a zero-day exploit, launching a (n) _______________ with a product such as Malwarebytes might identify the infection. (512791)

Correct

A:on-demand scan



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 483

Computer Concepts

If you use a password manager, what do you as the user need to remember? (512761)

Correct

B:The master password



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 464

Computer Concepts

MITM (man-in-the-middle) attacks include which of the following? (512797)

Correct

D:All of the above



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 489

Computer Concepts

Spam accounts for approximately ______ of all email. (512809)

Correct

D:70%



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 499

Computer Concepts

The best defense against malware is _____________. (512774)

Correct

C:antivirus software •

New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 472

Computer Concepts

The current method of encrypting communication between a client and a server depends on a security protocol called _______. (512802)

Correct



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 492

Computer Concepts

There are various encryption methods, but __________ is the encryption standard currently used worldwide. (512749)

Correct

• A:AES (Advanced Encryption Standard)

New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 455

B:TLS

Remediation

Exam Study Guide Report Page 3 of 7

Exam Study Guide Subject

Question (ID)

Result

Response

Computer Concepts

This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers. (512747)

Correct

B:Encryption



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 455

Computer Concepts

To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection. (512799)

Correct

B:Evil Twin



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 490

Computer Concepts

Trojans depend on ________ to spread. (512772)

Correct

B:social engineering •

New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 471

Computer Concepts

What is the process called when an app from a source other than an official app store is installed on a device? (512767)

Correct

A:Side-loading



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 469

Computer Concepts

What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed? (512820)

Correct

B:PUP



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 507

Computer Concepts

When antivirus software detects malware, which of the following would not be a course of action you could take? (512777)

Correct

A:Conduct a heuristic • analysis.

New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 473

Computer Concepts

Which of the following attacks uses password-cracking software to generate every possible combination of letters, numerals, and symbols? (512756)

Correct

D:Brute force



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 460

Computer Concepts

Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network? (512795)

Correct

D:All of the above



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 485-486

Computer Concepts

Which of the following is not a characteristic of a computer worm? (512769)

Correct

D:Spread through a process called sideloading



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 470

Computer Concepts

Which of the following is not a characteristic of a weak password? (512757)

Correct

New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 461

Computer Concepts

Which of the following is not a type of spam filter? (512812)

Correct

A:Eight characters in • length and include one or more uppercase letters, numbers, and symbols • D:Entropy

Remediation

New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 502 Exam Study Guide Report Page 4 of 7

Exam Study Guide Subject

Question (ID)

Result

Response

Computer Concepts

Which of the following is not an example of user authentication? (512751)

Correct

D:URLs (Uniform Resource Locators)

Computer Concepts

Which of the following sequence of events best describes an online intrusion? (512781)

Correct

Computer Concepts

Which of the following would be considered spyware? (512796)

Correct

Computer Concepts

A botnet has a server that is controlled by hackers. (512785)

Computer Concepts

Remediation •

New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 456

A:Malware enters the • device, and then opens a backdoor, which opens a communications link on the device that a hacker can exploit.

New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 479

A:A keylogger



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 489

Correct

True



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 482

A dropper installs a malicious program on a device, and it works with an entire program. Code injection inserts a segment of malicious code into another program. It carries only a short segment of code rather than an entire program. (512823)

Correct

True



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 471

Computer Concepts

A key characteristic of viruses is their ability to lurk in a device for days or months, quietly replicating themselves. (512768)

Correct

True



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 469

Computer Concepts

All Android devices automatically encrypt data stored on the device when a user activates the login password. (512753)

Correct

False



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 457

Computer Concepts

An original message or file that has not yet been encrypted is referred to as ciphertext. (512748)

Correct

False



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 455

Computer Concepts

Antivirus software cannot be expected to block threats that do not arrive in the form of malware. (512788)

Correct

True



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 483

Computer Concepts

Antivirus software’s on-access scanning has a high probability of identifying zero-day exploits. (512822)

Correct

False



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 483

Computer Concepts

Any data entering a digital device could be malware. (512773)

Correct

True



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 472

Exam Study Guide Report Page 5 of 7

Exam Study Guide Result

Response

Computer Concepts

Subject

Blacklist and header filtering are usually performed by email clients and Webmail services. (512813)

Question (ID)

Correct

False



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 502

Computer Concepts

Brute force attacks methodically try every possible password until the correct one is found. (512758)

Correct

True



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 460

Computer Concepts

Correctly installed antivirus software will prevent all intrusions. (512787)

Correct

False



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 483

Computer Concepts

FileVault is a MacOS utility included on by default on Macintosh computers that automatically encrypts data stored locally. (512755)

Correct

True



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 459

Computer Concepts

Hackers can use ports to communicate with devices in botnets. (512792)

Correct

True



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 484

Computer Concepts

Heuristics may produce false positives that mistakenly identify a legitimate file as malware. (512776)

Correct

True



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 473

Computer Concepts

If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure. (512801)

Correct

True



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 493

Computer Concepts

If you are traveling and expect to access files on a computer that you’ve left at home, make sure the remote access utility is turned off. (512784)

Correct

False



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 480

Computer Concepts

In addition to replicating itself, a virus is self-distributing. (512764)

Correct

False



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 468

Computer Concepts

It is not possible to encrypt a Windows hard drive volume. (512754)

Correct

False



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 458

Computer Concepts

Microsoft uses a service called Safe Browsing to alert users about sites to avoid. (512817)

Correct

False



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 505

Computer Concepts

Most ISPs and email services do not use filtering techniques to block spam. (512811)

Correct

False



New Perspectives on Computer Concepts 2018 Comprehensive [PageNo:] 501

Computer Concepts

Most...


Similar Free PDFs