TEST 3 on chap 7+9+11 assesses knowledge on cybersecurity threats and preventive measures. It covers topics like computer viruses, anti-exploit software, authentication protocols, social engineering, and ransomware, focusing on understanding and preventing digital security breaches.
C2C
B2G
B2C
B2B
Rate this question:
public attribute, class attribute
public attribute, private attribute
Private attribute, class attribute
Class attribute, public attribute
Rate this question:
Source code
Op code
Object code
Structured English
Rate this question:
Zero-day
Brute force
Dictionary
rootkit
Rate this question:
Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit.
A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker.
A USB drive containing a trojan is inserted into a device which opens a backdoor, allowing a hacker access to the device.
None of the above
Rate this question:
Function
Goto
Method
Iteration
Rate this question:
SIMULA
Python
Java
COBOL
Rate this question:
Keylogger
Evil Twin
botnet
None of the above
Rate this question:
Any sequence that includes a user name
Eight characters in length and include one or more uppercase letters, numbers, and symbols
Use of words from a dictionary
Uses default passwords such as password, admin, system, and guest.
Rate this question:
Structured
Unstructured
Semi-structured
None of the above
Rate this question:
interpreter, compiler
Compiler, object code
Constant, variable
Object code, compiler
Rate this question:
Parameters
Variables
Functions
Rules
Rate this question:
TLS
PUP
RAT
AES
Rate this question:
Sequence control structure
Sequential execution
Formal method
Programming paradigm
Rate this question:
Malware
Anti-exploit
Antivirus
Virus Signature
Rate this question:
Corrective procedures
Deterrents
Detection activities
Preventive countermeasures
Rate this question:
Software engineering, computer programming
Computer programming, software engineering
Application programming, systems programming
Systems programming, application programming
Rate this question:
First
Third
Fourth
Second
Rate this question:
TLS
RAT
PUP
DDoS
Rate this question:
Entropy
brute force
Massive
dictionary
Rate this question:
reliability
Convertibility
availability
Serviceability
Rate this question:
ecommerce application
Supply chain
Payment processing routine
payment gateway
Rate this question:
Batch
Online
Inline
None of the above
Rate this question:
Detection activities
Deterrents
Preventive countermeasures
Corrective procedures
Rate this question:
Control structure
Flow control
Walkthrough
None of the above
Rate this question:
Declarative
Object-oriented
Procedural
None of the above
Rate this question:
selection control structure
Decision table
Storyboard
formal method
Rate this question:
Heuristic analysis
port scan
Virus signature
rootkit
Rate this question:
Repair the infection.
Conduct a heuristic analysis.
Put the infected file into quarantine.
Delete the infected file.
Rate this question:
Control
Algorithm
Syntax
Parameter
Rate this question:
C++
Prolog
COBOL
Objective C
Rate this question:
A keylogger
Firewall software
Antivirus software
all of the above
Rate this question:
Application
System
Unit
Integration
Rate this question:
Iteration
Abstraction
syntax
flow control
Rate this question:
Trojan
Virus
Worm
All of the bove
Rate this question:
ciphertext
Firewall
Algorithm
Key
Rate this question:
Your passwords for individual sites.
The master password
Form data including credit card numbers.
All of the above
Rate this question:
XML
UML
HTML
DSS
Rate this question:
Permission
Blacklist
Entropy
Content
Rate this question:
social engineering
rootkits
Code injection
Self-replication
Rate this question:
Low-level languages
High-level languages
Multiparadigm languages
First generation languages
Rate this question:
Algorithm
predicate
known information
assumption
Rate this question:
Code
Control
Encapsulation
Function
Rate this question:
function
Class attribute
Method
Control structure
Rate this question:
Desktops
Laptops
Smartphones
All of the above
Rate this question:
Self-replicating
Spread through a process called side-loading
Self-distributing
Usually standalone executable programs
Rate this question:
colocation
Fuzzy logic
lights-out management
none of the above
Rate this question:
C2C
B2B
B2C
B2G
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.