ANSWERS (VERIFIED ANSWERS) ALREADY GRADED A+
Which of the following can be used to block unauthorized access while
allowing authorized communication on a device or network?
Ans✓✓✓Network router
Personal Firewall
Hardware that uses a NAT
What is the process called when an app from a source other than an
official app store is installed on a device?
a. Code injection
b. Rootkit
c. Side-loading
d. Dropper Ans✓✓✓c. Side-loading
______Can be used to flood a web site with so much traffic that it can
no longer provide its intended service. Ans✓✓✓DDoS
Botnets
Commands from a botmaster
Which of the following is not a characteristic of a weak password?
Ans✓✓✓Eight characters in length and include one or more uppercase
letters, numbers, and symbols
, A ______ is malware that arrives in a trojan disguised as legitimate
software and sets up a secret communicate link to a hacker.
a. DDoS
b. TLS
c. RAT
d. PUP Ans✓✓✓c. RAT
______Software shields certain applications against behaviors
commonly exhibited by intrusions. Ans✓✓✓Anti-Exploit
______ is a deceptive practice that exploits human psychology by
introducing victims to interact with a digital device in a way that is not
in their best interest.
a. Address spoofing
b. Evil Twin
c. Social engineering
d. None of the above Ans✓✓✓c. Social engineering
Spam accounts for approximately ____ of all email.
a. 70%
b. 40%
c. 60%
d. 50% Ans✓✓✓a. 70%