

MCQOPTIONS
Saved Bookmarks
This section includes 4 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
The threat of backdoors started when ____________ & ____________ OSs became widely accepted. |
A. | single-user, Windows |
B. | multiuser, networked |
C. | single-user, UNIX |
D. | multiuser, UNIX |
Answer» C. single-user, UNIX | |
2. |
A _________________ may be a hidden part of a program, a separate infected program a Trojan in disguise of an executable or code in the firmware of any system s hardware. |
A. | crypter |
B. | virus |
C. | backdoor |
D. | key-logger |
Answer» D. key-logger | |
3. |
_____________ can modify data on your system so that your system doesn t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access. |
A. | IM Trojans |
B. | Backdoor Trojans |
C. | Trojan-Downloader |
D. | Ransom Trojan |
Answer» E. | |
4. |
A/an ___________ is a program that steals your logins & passwords for instant messaging applications. |
A. | IM Trojans |
B. | Backdoor Trojans |
C. | Trojan-Downloader |
D. | Ransom Trojan |
Answer» B. Backdoor Trojans | |