Course Hero Logo

Chapter 3 Quiz_ Attempt review.pdf - Started on Friday, 26...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 13 pages.

Started onFriday, 26 August 2022, 6:33 PMStateFinishedCompleted onFriday, 26 August 2022, 6:39 PMTime taken5 mins 48 secsMarks25.00/25.00Grade10.00out of 10.00 (100%)Question 1CorrectMark 1.00 out of 1.00A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique isbeing used by the computer hacker?Select one:a.mail fraudb.ransomingc.heuristicsd.social engineering
Question 2the following?Select one:CorrectMark 1.00 out of 1.00A malicious computer program that replicates and propagates itself without having to attach to a host is called which ofthe following?Select one:
Question 3CorrectMark 1.00 out of 1.00If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on yourcomputer which of the following programs would they choose to use?Select one:
Question 4CorrectMark 1.00 out of 1.00

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 13 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
JI
Tags
Computer virus, type of technique

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture