27/11/2024 11:35AM
BFOR 200 Test 2 Questions and Answers
How does a phishing attack work?
A.Scanning for out-of-date systems
B.Getting users to click on links that appear legitimate
C.Encrypting documents and system files
D.Attaching itself to seemingly legitimate files and programs
E.Stealing login information by tracking keystrokes
• - Answers✓✓B. Getting Users to click on link that appear legitimate
An attack that is highly personal and mimics a familiar person, like a boss or client
A.Phishing
B.Trojan horse
C.Spear phishing
D.Robocalls
E.Tech support scamming - Answers✓✓C. Spear phishing
It is best to have multiple people accountable for a system or process.
A.True
B.False - Answers✓✓True
It is possible to trick biometric authentication tools, like facial recognition or fingerprint
scanning.