Questions

Question 1

This Internet threat uses targeted fraudulent messages from reputable companies to elicit information from end users.

Crypto malware
Spear phishing
End-point attack
Supply chain attacks

Question 2

An SMB server should only allow access to which port?

443
445
80
22

Question 3

The Internet started as a project to route network communications around failed hardware.
True
False

Question 4

An HTTPS server should only access to which port?
443
445
80
22

Question 5

This Internet threat uses holes in the manufacturing process to insert malware or vulnerabilities.

Crypto malware
Spear phishing
End-point attack
Supply chain attacks

Question 6

A DMZ is a?

Demilitarized zone
Delta metal zone
Data message zero
None of these

Question 7

Port 80 is typically used by which protocol?

HTTP
HTTPS
SMTP
IMAP

Question 8

This Internet threat encrypts your hard disk and ransoms the keys to decrypt it.
Crypto Malware
Phishing
End-point attack
Supply chain attacks

Tags: No tags