90%(10)9 out of 10 people found this document helpful
This preview shows page 1 - 3 out of 3 pages.
TestChapter 2 Practice testQuestion 10 out of 0 points____________________ are malware programs that hide their true nature, and reveal their designed behavior only when activated.Selected Answer:b. Trojan horsesAnswers:a. Virusesb. Trojan horsesc. Wormsd. SpamQuestion 20 out of 0 pointsThe ____________________ fraud is a social engineering attack that involves convincing the victim to participate in a seeming money-making venture while getting the victim to pay fees, bribes or refund uncleared international payments.Selected Answer:[None Given]Correct Answer:Evaluation MethodCorrect AnswerCase SensitivityExact Matchadvance-feeExact Matchadvance feeQuestion 30 out of 0 pointsOne form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________Selected Answer:FalseAnswers:True
FalseQuestion 40 out of 0 pointsPacket munchkinsuse automated exploits to engage in distributed denial-of-service attacks.