FEDVTE CYBER DARK ARTS QUESTIONS WITH CORRECT ANSWERS
Which of the following alternative operating systems is focused mostly on greater security in the event of a compromise by preventing propagation? CORRECT ANSWER Qubes Which of the following might a malicious actor attempt to exploit in a social engineering attack? CORRECT ANSWER All of the above Which of the following alternative operating systems requires some type of virtualization software and more than one system? CORRECT ANSWER Whonix The sole purpose of alternative operating systems is for cyber criminals to hide their nefarious activities. CORRECT ANSWER False In an advanced persistent threat, once access is gained, which of the following are likely to occur? CORRECT ANSWER All of the Above Successfully opposing disinformation efforts spread via social media is difficult because: CORRECT ANSWER All of the Above Password cracking tools use wordlist dictionaries containing commonly used passwords in an attempt to gain access using a brute force attack. These wordlists must be downloaded separately from the tool due to the frequency the list is updated. CORRECT ANSWER False Only law enforcement and intelligence organizations can legally use anonymous browsers like ToR. CORRECT ANSWER False The amount of fake accounts on social media sites like Facebook is: CORRECT ANSWER Close to equal the number of active users Qubes achieves greater security by allowing the user to run applications
Geschreven voor
- Instelling
- FEDVTE CYBER DARK ARTS
- Vak
- FEDVTE CYBER DARK ARTS
Documentinformatie
- Geüpload op
- 31 december 2022
- Aantal pagina's
- 3
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
which of the following alternative operating systems is focused mostly on greater security in the event of a compromise by preventing propagation correct answer qubes which of the following might a
Ook beschikbaar in voordeelbundel