Answers
Which of the following alternative operating systems is focused mostly on
greater security in the event of a compromise by preventing propagation?
Right Ans - Qubes
Which of the following might a malicious actor attempt to exploit in a social
engineering attack? Right Ans - All of the above
Which of the following alternative operating systems requires some type of
virtualization software and more than one system? Right Ans - Whonix
The sole purpose of alternative operating systems is for cyber criminals to
hide their nefarious activities. Right Ans - False
In an advanced persistent threat, once access is gained, which of the following
are likely to occur? Right Ans - All of the Above
Successfully opposing disinformation efforts spread via social media is
difficult because: Right Ans - All of the Above
Password cracking tools use wordlist dictionaries containing commonly used
passwords in an attempt to gain access using a brute force attack. These
wordlists must be downloaded separately from the tool due to the frequency
the list is updated. Right Ans - False
Only law enforcement and intelligence organizations can legally use
anonymous browsers like ToR. Right Ans - False
The amount of fake accounts on social media sites like Facebook is: Right
Ans - Close to equal the number of active users
Qubes achieves greater security by allowing the user to run applications and
store files in: Right Ans - Isolated containers
Using software and malware components to take control over a device's
resources is known as: Right Ans - Cryptojacking