Question 36
Which of the following is an application that requires a host application for replication?
Question 37
Which of the following is the best countermeasure to encrypting ransomwares?
Question 38
Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company.
The phishing message will often use the name of the company CEO, president, or managers. The time a hacker spends performing research to locate this information about a company is known as?
The phishing message will often use the name of the company CEO, president, or managers. The time a hacker spends performing research to locate this information about a company is known as?
Question 39
Steve, a scientist who works in a governmental security agency, developed a technological solution to
identify people based on walking patterns and implemented this approach to a physical control access.
A camera captures people walking and identifies the individuals using Steve's approach.
After that, people must approximate their RFID badges. Both the identifications are required to open the
door.
In this case, we can say:
identify people based on walking patterns and implemented this approach to a physical control access.
A camera captures people walking and identifies the individuals using Steve's approach.
After that, people must approximate their RFID badges. Both the identifications are required to open the
door.
In this case, we can say:
Question 40
Windows file servers commonly hold sensitive files, databases, passwords and more.
Which of the following choices would be a common vulnerability that usually exposes them?
Which of the following choices would be a common vulnerability that usually exposes them?
