[SOLVED] Type of malware..
Question 1 type of malware
Question 2
Question 3
Question 4
Question 5
Question 6
Question 7
Question 8
Question 9
Question 10
Question 11
Question 12Public interest and benefit disclosures:A.
do not require the patient’s written authorization or verbal agreementB.
require an individual’s verbal agreementC.
require an individual’s written authorizationD.
include incidental disclosures
Question 13If a patient refuses to sign a(n) _____________________________, treatment may be conditioned.A.
AuthorizationB.
ConsentC.
Notice of Privacy PracticesD.
AmendmentQuestion 14What type of attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file?
a. hash
b. brute force
c. man in the middle
d. dictionaryQuestion 15Which document identifies individuals within the organization who are in positions of authority?
a. System manuals
b. Policy manuals
c. Organizational charts
d. Phone directoriesQuestion 16What can an attacker use to divert all mail to their post office box so that the victim is never aware that personal information has been stolen?
a. mail bouncing
b. change-of-address form
c. automatic forwarding
d. mail redirectQuestion 17Which of the following is a numerical measurement used by lenders to assess a consumer’s creditworthiness?
a. credit report
b. credit rank
c. credit score
d. credit levelQuestion 18With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are requested to update personal information, such as passwords or credit card numbers?
a. pretexting
b. phishing
c. pharming
d. typo squatting
Question 19What law contains rules regarding consumer privacy?
a. Accurate Transactions Act
b. Fair Credit Reporting Act
c. Fair and Accurate Credit Transactions Act
d. Credit and Transactions ActQuestion 20Proving that a document was created by a particular user is referred to as which of the following?
a. availability
b. nonrepudiation
c. repudiation
d. integrity
a. Privacy of any level that you desire is easily achievable today.
b. Privacy is the state or condition of being free from public attention to the degree that you determine.
c. Privacy is difficult due to the fact that Data is collected on almost all actions and transactions that individuals perform.
d. Privacy is the right to be left alone to the level that you choose.Question 22Which of the following is a risk associated with the use of private data?
a. Constant use of encryption.
b. Malfunctioning hardware devices.
c. Associations with groups.
d. Statistical anomalies.
Question 23Which technology hides the existence of data?
a. Symmetric encryption
b. Cryptography
c. Steganography
d. Asymmetric decryptionQuestion 24Which of the following creates a digest and does not create ciphertext that can later be decrypted?
a. symmetric cryptography
b. Message Digest Encryption (MDE)
c. asymmetric cryptography
d. hash algorithmQuestion 25What is another name for asymmetric cryptography?
a.
Public key cryptography
b.
Unbalanced encryption
c.
Secret key cryptography
d.
Private encryptionQuestion 27____ is a complete programming language that can be used to create stand-alone applications.
a. WScript
b. JavaScript
c. Java
d. Shell scriptQuestion 28Using what email protocol can mail be organized into folders on the mail server and read from any device?
a. HTML
b. IMAP
c. POP3
d. SMTPQuestion 29Which of the following uses graphical images of text in order to circumvent text-based filters?
a. Image spam
b. Java spam
c. Flash spam
d. PDF spamQuestion 30HTTP is based on which larger set of standards for Internet communication?
a. NetBEUI
b. IEEE 802.11
c. IPX/SPX
d. TCP/IPQuestion 31Using which Internet security best practice is information not saved by the browser, such as pages that are visited will not be recorded to history or the address bar?
a. controlling cookies
b. private browsing
c. downloading files
d. clearing the cache type of malware type of malware type of malware
Are you overwhelmed by your class schedule and need help completing this assignment? You deserve the best professional and plagiarism-free writing services. Allow us to take the weight off your shoulders by clicking this button.
Get help