Question 1
This Internet threat uses targeted fraudulent messages from reputable companies to elicit information from end users.
Crypto malware
Spear phishing
End-point attack
Supply chain attacks
Question 2
An SMB server should only allow access to which port?
443
445
80
22
Question 3
The Internet started as a project to route network communications around failed hardware.
True
False
Question 4
An HTTPS server should only access to which port?
443
445
80
22
Question 5
This Internet threat uses holes in the manufacturing process to insert malware or vulnerabilities.
Crypto malware
Spear phishing
End-point attack
Supply chain attacks
Question 6
A DMZ is a?
Demilitarized zone
Delta metal zone
Data message zero
None of these
Question 7
Port 80 is typically used by which protocol?
HTTP
HTTPS
SMTP
IMAP
Question 8
This Internet threat encrypts your hard disk and ransoms the keys to decrypt it.
Crypto Malware
Phishing
End-point attack
Supply chain attacks