THREATS

A scheme to acquire private personal or financial information using a fraudulent email message is called:

A scheme to acquire private personal or financial information using a fraudulent email message is called:

CORRECT

CORRECT

The answer is phishing.

The answer is phishing.

Phishing is a scheme to acquire private, personal or financial information using fraudulent email messages. These types of attacks are declining, though more targeted attacks against one or a small number of individuals, known as “spear phishing,” have become more common.
Phishing is a scheme to acquire private, personal or financial information using fraudulent email messages. These types of attacks are declining, though more targeted attacks against one or a small number of individuals, known as “spear phishing,” have become more common.

INCORRECT

INCORRECT

The correct answer is phishing.

The correct answer is phishing.

Phishing is a scheme to acquire private, personal or financial information using fraudulent email messages. These types of attacks are declining, though more targeted attacks against one or a small number of individuals, known as “spear phishing,” have become more common.
THREATS

"Our company is starting to store backups off-site to better protect against ______________ attacks."

"Our company is starting to store backups off-site to better protect against ______________ attacks."

CORRECT

CORRECT

The answer is ransomware.

The answer is ransomware.

Ransomware is a type of malicious software that prevents users from accessing their data or systems until a ransom is paid. Cyber criminals are known to have deleted backup files, so maintaining off-site backups is a sound practice.
Ransomware is a type of malicious software that prevents users from accessing their data or systems until a ransom is paid. Cyber criminals are known to have deleted backup files, so maintaining off-site backups is a sound practice.

INCORRECT

INCORRECT

The correct answer is ransomware.

The correct answer is ransomware.

Ransomware is a type of malicious software that prevents users from accessing their data or systems until a ransom is paid. Cyber criminals are known to have deleted backup files, so maintaining off-site backups is a sound practice.
THREATS

A __________________ is when cyber criminals flood a network with fake traffic to prevent legitimate users from accessing the network.

A __________________ is when cyber criminals flood a network with fake traffic to prevent legitimate users from accessing the network.

CORRECT

CORRECT

The answer is Denial-of-Service (DoS) attack.

The answer is Denial-of-Service (DoS) attack.

In a DoS attack, a network is flooded with spurious traffic to prevent legitimate users from accessing the network. Many experts believe that DoS attacks are likely to worsen as criminals begin to exploit vulnerabilities in the “Internet of Things,” such as networked appliances or smartphones, to carry out the attacks.
In a DoS attack, a network is flooded with spurious traffic to prevent legitimate users from accessing the network. Many experts believe that DoS attacks are likely to worsen as criminals begin to exploit vulnerabilities in the “Internet of Things,” such as networked appliances or smartphones, to carry out the attacks.

INCORRECT

INCORRECT

The answer is Denial-of-Service (DoS) attack.

The correct answer is Denial-of-Service (DoS) attack.

In a DoS attack, a network is flooded with spurious traffic to prevent legitimate users from accessing the network. Many experts believe that DoS attacks are likely to worsen as criminals begin to exploit vulnerabilities in the “Internet of Things,” such as networked appliances or smartphones, to carry out the attacks.
THREATS

A collection of compromised computers under the control of a single entity is commonly referred to as a:

A collection of compromised computers under the control of a single entity is commonly referred to as a:

CORRECT

CORRECT

The answer is botnet.

The answer is botnet.

A botnet is a collection of compromised computers, sometimes numbering in the thousands or even millions, that are under the control of a single entity. Botnets are typically used to steal data, such as online banking credentials, or to facilitate other types of cybercrime, like spamming or DDoS attacks.
A botnet is a collection of compromised computers, sometimes numbering in the thousands or even millions, that are under the control of a single entity. Botnets are typically used to steal data, such as online banking credentials, or to facilitate other types of cybercrime, like spamming or DDoS attacks.

INCORRECT

INCORRECT

The correct answer is botnet.

The correct answer is botnet.

A botnet is a collection of compromised computers, sometimes numbering in the thousands or even millions, that are under the control of a single entity. Botnets are typically used to steal data, such as online banking credentials, or to facilitate other types of cybercrime, like spamming or DDoS attacks.
THREATS

The _____________________ is an anonymous part of the Internet where criminals can buy and sell information stolen from businesses or other entities.

The _____________________ is an anonymous part of the Internet where criminals can buy and sell information stolen from businesses or other entities.

CORRECT

CORRECT

The answer is Dark web.

The answer is Dark web.

The Dark web is a marketplace where private, protected, and proprietary information, as well as the tools that cyber criminals use to hack into computers — such as viruses, exploit kits and other malware — are readily available for purchase and use.
The Dark web is a marketplace where private, protected, and proprietary information, as well as the tools that cyber criminals use to hack into computers — such as viruses, exploit kits and other malware — are readily available for purchase and use.

INCORRECT

INCORRECT

The correct answer is Dark web.

The correct answer is Dark web.

The Dark web is a marketplace where private, protected, and proprietary information, as well as the tools that cyber criminals use to hack into computers — such as viruses, exploit kits and other malware — are readily available for purchase and use.