Skip to main content

IS5403 Week 2 New

 Lab 1

VirusTotal.txt
labconnection.com
0
PUP
API
Lab 2
5
Both of these
Both of these
1
DangerousObject
Lab 3
Heuristic scanning
Dynamic analysis
All of these
All of these
30

Lab 4
Wrong passcode 3 times

Alarm will sound

On-boarding

None
1234
Lab 5
Mobile app testing
MCM
MAM
UDM





5
Question

Which of the following malware does not harm the system but only targets the data?

Correct
 
5 of 10
6
Question

Password spraying cyber-attack can be categorized as which of the following type of attack?

Correct
 
6 of 10
7
Question

A USB can be used to drop which of the following types of malware? [Choose all that apply]

Correct
 
7 of 10
8
Question

Which of the following statements are true for artificial intelligence (AI)? [Choose all that apply]

Correct
 
8 of 10
9
Question

Which of the following type of attack is a pre-cursor to the collision attack?

Correct

3
Question

Which of the following statements are true for a zero-day attack? [Choose all that apply.]

Correct
 
3 of 7
4
Question

Which of the following is known as out-of-the-box configuration?

Correct
 
4 of 7
5
Question

Which of the following code provides instructions to the hardware?

Correct
 
5 of 7
6
Question

For which of the following Windows versions, Microsoft has stopped providing support services? [Choose all that apply.]

Correct

8
Question

Which type of attack occurs if an application overruns the allocated buffer boundary and writes to adjacent memory locations?

Correct
 
8 of 15
9
Question

Which of the following enables attackers to inject client-side scripts into web pages viewed by other users?

Correct
 
9 of 15
10
Question

Which of the following is also known as a “dot dot slash” attack?

Correct
 
10 of 15
11
Question

An application lists all the files and subdirectories in its web folder. This indicates which of the following weaknesses on the application?

Correct
 
11 of 15
12
Question

Which of the following provides unauthorized access to another user's system resources or application files at the same level/role within an organization?

Correct
 
12 of 15
13
Question

Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier which allows an attacker the opportunity to steal authenticated sessions, describes which of the following?

Correct
 
13 of 15
14
Question

Which of the following attack type confirms the vulnerability by revealing database-specific exceptions or error messages to the end-user or attacker?

Correct

2
Question

In which type of software environment are you most likely to find Microsoft Visual Studio and Eclipse?

Correct
 
2 of 7
3
Question

What is the highest level of normalization that you can achieve with a database?

Correct
 
3 of 7
4
Question

Which of the following loop runs until a statement becomes true?

Correct
 
4 of 7
5
Question

You have a version control system installed. Several developers work with this system. A new developer wants to work on the code. What is the first task that the developer must perform?

Correct
 
5 of 7
6
Question

Which of the following statements is true for the scalability of a system?

Correct




1
Question

Which of the following spectrums are used by wireless networks? [Choose all that apply]

Correct
 
1 of 6
2
Question

What is the maximum distance supported by Bluetooth 5.x?

Correct
 
2 of 6
3
Question

Which of the following features of Mobile Device Management (MDM) can be used by an organization? [Choose all that apply]

Correct
 
3 of 6
4
Question

Which of the following Unified Endpoint Management (UEM) features can help an IT administrator manage and administer IT assets? [Choose all that apply]

Correct
 
4 of 6
5
Question

Which of the following method is used in sideloading?

Correct

What word is used today to refer to network-connected hardware devices?
Correct

Which of the following is NOT a characteristic of malware?
Correct


Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer?
Correct

Marius's team leader has just texted him that an employee, who violated company policy by bringing in a file on her USB flash drive, has just reported that her computer is suddenly locked up with cryptomalware. Why would Marius consider this a dangerous situation?
Correct

Which type of malware relies on LOLBins?
Correct

Which of the following is known as a network virus?
Correct

Josh is researching the different types of attacks that can be generated through a botnet. Which of the following would NOT be something distributed by a botnet?
Correct

Which of the following is NOT a means by which a bot communicates with a C&C device?
Correct

Randall's roommate is complaining to him about all of the software that came pre-installed on his new computer. He doesn't want the software because it slows down the computer. What type of software is this?
Correct

What is the difference between a Trojan and a RAT?
Correct

Which of these would NOT be considered the result of a logic bomb?
Correct

Which of the following attacks is based on a website accepting user input without sanitizing it?
Correct

Which of the following attacks is based on the principle that when a user is currently authenticated on a website and then loads another webpage, the new page inherits the identity and privileges of the first website?
Correct

Which of the following manipulates the trusting relationship between web servers?
Incorrect

Which type of memory vulnerability attack manipulates the "return address" of the memory location of a software program?
Correct


What race condition can result in a NULL pointer/object dereference?
Correct

Which of the following attacks targets the external software component that is a repository of both code and data?
Correct

What term refers to changing the design of existing code?
Correct

Which of the following is technology that imitates human abilities?
Correct

Which statement regarding a keylogger is NOT true?
Correct


Akira is explaining to his team members the security constraints that have made it a challenge for protecting a new embedded system. Which of the following would Akira NOT include as a constraint?
Correct

Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution?
Correct

Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution?
Correct

In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?
Correct

Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates?
Correct

What is the process of identifying the geographical location of a mobile device?
Correct


Which of these is used to send SMS text messages to selected users or groups of users?
Correct



Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki's advice regarding its. Which of the following would Enki NOT tell him?
Correct

Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called?
Correct

Which of the following technologies can convert a texting app into a live chat platform?
Correct

What prevents a mobile device from being used until the user enters the correct passcode?
Correct


Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document?
Correct


What does containerization do?
Correct

What allows a device to be managed remotely?
Correct

Which of these is NOT a security feature for locating a lost or stolen mobile device?
Correct

What enforces the location in which an app can function by tracking the location of the mobile device?
Correct

Which of these is considered the strongest type of passcode to use on a mobile device?
Correct

Which of the following is NOT a context-aware authentication?
Incorrect

Which tool manages the distribution and control of apps?
Correct












































































































































































































































































































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh