30. What kind of malware can block access to data and decrease the availability of security by holding the system hostage?
- Spyware
- A logic bomb
- Ransomware
- Adware
31. What is it called when a hacker gets into a system through a secret entryway to gain remote access to the computer?
- Ransomware
- A backdoor
- Adware
- A Trojan
32. Which of the following best helps you strengthen your password?
- Use passwords from a precompiled list
- Incorporate symbols, numbers, and capital letters
- Choose the name of a favorite movie as a password
- Use the name of a beloved pet as a password
33. An attacker leaves a flash drive loaded with malware on a table. Someone plugs the drive into their computer to see what’s on it and accidentally installs malware. What kind of attack is this?
- Baiting
- DDoS
- Phishing
- Tailgating
34. What's the difference between a virus and a worm?
- Worms replicate through files, but viruses live on their own.
- Viruses do not replicate, but worms do.
- Worms replicate, but viruses do not.
- Viruses replicate through files, but worms live on their own.
35. An employee at a company plugs a router into the corporate network to make a simple wireless network. An attacker outside the building uses it to get access to the corporate network. What is the name of this type of attack?
- SYN flood attack
- A rogue AP (Access Point) attack
- A Denial-of-Service (DoS) attack
- A DNS cache poisoning attack
36. Which of the following can occur during a ping of death (POD) attack? Select all that apply.
- Phishing
- Baiting
- A buffer overflow
- Execution of malicious code
37. What is it called when a hacker takes down multiple services very quickly with the help of botnets?
- Distributed denial-of-service (DDoS)
- Cross-site Scripting (XSS)
- A SQL injection
- A password attack
38. If a hacker targets a vulnerable website by running commands that delete the website's data in its database, what type of attack did the hacker perform?
- Cross-site Scripting (XSS)
- SQL injection
- A dictionary attack
- A Denial-of-Service (DoS) attack
39. Fill in the blank: Phishing, spoofing, and tailgating are examples of ________ attacks.
- Network
- Social engineering
- Malware
- Injection
Shuffle Q/A 2
40. In the terminology of information security, what is a vulnerability?
- The possibility of suffering a loss in the event of an attack
- A program that entices users to download it, then installs malware on their systems
- A piece of malware that records each keypress by the user and gathers confidential information
- A flaw in the code of an application that can be exploited
41. What is a tool that protects passwords by checking whether the input is coming from a machine or a human?
- A firewall
- A CAPTCHA
- A key logger
- Antimalware software