BFOR 200 Test 2 With Correct Answers 100% Verified
How does a phishing attack work?
A.Scanning for out-of-date systems
B.Getting users to click on links that appear legitimate
C.Encrypting documents and system files
D.Attaching itself to seemingly legitimate files and programs
E.Stealing login information by tracking keystrokes
• - ANSWER B. Getting Users to click on link that appear legitimate
An attack that is highly personal and mimics a familiar person, like a boss or client
A.Phishing
B.Trojan horse
C.Spear phishing
D.Robocalls
E.Tech support scamming - ANSWER C. Spear phishing
It is best to have multiple people accountable for a system or process.
A.True
B.False - ANSWER True
It is possible to trick biometric authentication tools, like facial recognition or fingerprint
scanning.
A.True
B.False - ANSWER True
How does a phishing attack work?
A.Scanning for out-of-date systems
B.Getting users to click on links that appear legitimate
C.Encrypting documents and system files
D.Attaching itself to seemingly legitimate files and programs
E.Stealing login information by tracking keystrokes
• - ANSWER B. Getting Users to click on link that appear legitimate
An attack that is highly personal and mimics a familiar person, like a boss or client
A.Phishing
B.Trojan horse
C.Spear phishing
D.Robocalls
E.Tech support scamming - ANSWER C. Spear phishing
It is best to have multiple people accountable for a system or process.
A.True
B.False - ANSWER True
It is possible to trick biometric authentication tools, like facial recognition or fingerprint
scanning.
A.True
B.False - ANSWER True