COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
A hacker identifies a company to impersonate, then develops a believable email to distribute to a mass address list.
|
|
A hacker writes a program that erases the contents of a hard disk but packages it as a computer game.
|
|
A hacker creates an email attachment that automatically sends malicious emails to an entire address book when opened.
|
|
A hacker sets up a system where information collected from a malicious email is automatically inputted into a spreadsheet of private data.
|
Detailed explanation-1: -Which of the following situations describes the human component of phishing? A hacker identifies a company to impersonate, then develops a believable email to distribute to a mass address list.
Detailed explanation-2: -Answer: B) DOS attacks can be considered a class of computer threats.
Detailed explanation-3: -Which of the following accurately describes the trust model of certificate authorities? A certificate authority is trusted by the owner of the certificate and the party relying on the certificate.
Detailed explanation-4: -Which of the following activities poses the greatest personal cyber security risk? Purchasing a chair by emailing a credit card number to the chair owner. Which of the following is considered an unethical use of computer resources? Searching online for the answers to CodeHS exercise and quizzes.