MCQOPTIONS
Saved Bookmarks
This section includes 4 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The threat of backdoors started when ____________ & ____________ OSs became widely accepted. |
| A. | single-user, Windows |
| B. | multiuser, networked |
| C. | single-user, UNIX |
| D. | multiuser, UNIX |
| Answer» C. single-user, UNIX | |
| 2. |
A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system s hardware. |
| A. | crypter |
| B. | virus |
| C. | backdoor |
| D. | key-logger |
| Answer» D. key-logger | |
| 3. |
_____________ can modify data on your system so that your system doesn t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access. |
| A. | IM Trojans |
| B. | Backdoor Trojans |
| C. | Trojan-Downloader |
| D. | Ransom Trojan |
| Answer» E. | |
| 4. |
A/an ___________ is a program that steals your logins & passwords for instant messaging applications. |
| A. | IM Trojans |
| B. | Backdoor Trojans |
| C. | Trojan-Downloader |
| D. | Ransom Trojan |
| Answer» B. Backdoor Trojans | |