Crear actividad
Jugar Froggy Jumps
1. What are 3 examples of types of application testing?
A
Firewalls, password management, Computer antivirus
B
spyware, network security, ransomeware
C
Active interception, zombies, botnets
2. Factors that can cause vulnerabilities?
A
client side application
B
serverside application
C
Passwords
3. what does DLP stand for?
A
Data loss prevention
B
data liability prevention
C
Database loss prevention
4. Preventing the use of USB storage devices on a computer can be considered a DLP technique.
A
False
B
I don't know
C
True
5. Confidentiality refers to the _____ information from unauthorized access or disclosure.
A
Accuracy
B
Protection
C
Clarify
6. Firewall functionality?
A
All of the above
B
Filter traffic based on a variety of factors, including rules, IP address, and connection state.
C
Sending away traffic that doesn’t fit criteria.
7. Which of the following malicious programs, appearing to be legitimate, is commonly used to target banking and payment systems to access confidential information?
A
Ransomware
B
Backdoor
C
Trojan horse
8. Which of the following is not true of a logic bomb?
A
Its level of destruction is always the same
B
Logic bomb triggers are categorized as either positive or negative
C
Lies dormant, typically undetected, until trigger occurs
9. ______ is used legitimately in free versions of applications to display advertisements while a program is running but can be classified as ______ if the code records users' information or browsing habits without their consent and authorization.
A
Adware; ransomware
B
Adware; spyware
C
Social engineering; malvertising
10. Which of the following is not true of a keylogger?
A
Task managers are enough to detect it
B
This surveillance technology is sometimes hardware-based.
C
It can require physical access to the target's device for installation.