Lab 1
VirusTotal.txt
labconnection.com
0
PUP
API
Lab 2
5
Both of these
Both of these
1
DangerousObject
Lab 3
Heuristic scanning
Dynamic analysis
All of these
All of these
30
Lab 4
Wrong passcode 3 times
None
1234
Lab 5
Mobile app testing
MCM
MAM
UDM
6
Question
For which of the following Windows versions, Microsoft has stopped providing support services? [Choose all that apply.]
Correct
14
Question
Which of the following attack type confirms the vulnerability by revealing database-specific exceptions or error messages to the end-user or attacker?
Correct
What word is used today to refer to network-connected hardware devices?
Hide Feedback
Correct
Which of the following is NOT a characteristic of malware?
Hide Feedback
Correct
Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer?
Hide Feedback
Correct
Marius's team leader has just texted him that an employee, who violated company policy by bringing in a file on her USB flash drive, has just reported that her computer is suddenly locked up with cryptomalware. Why would Marius consider this a dangerous situation?
Hide Feedback
Correct
Which type of malware relies on LOLBins?
Hide Feedback
Correct
Which of the following is known as a network virus?
Hide Feedback
Correct
Josh is researching the different types of attacks that can be generated through a botnet. Which of the following would NOT be something distributed by a botnet?
Hide Feedback
Correct
Which of the following is NOT a means by which a bot communicates with a C&C device?
Hide Feedback
Correct
Randall's roommate is complaining to him about all of the software that came pre-installed on his new computer. He doesn't want the software because it slows down the computer. What type of software is this?
Hide Feedback
Correct
What is the difference between a Trojan and a RAT?
Hide Feedback
Correct
Which of these would NOT be considered the result of a logic bomb?
Hide Feedback
Correct
Which of the following attacks is based on a website accepting user input without sanitizing it?
Hide Feedback
Correct
Which of the following attacks is based on the principle that when a user is currently authenticated on a website and then loads another webpage, the new page inherits the identity and privileges of the first website?
Hide Feedback
Correct
Which of the following manipulates the trusting relationship between web servers?
Hide Feedback
Incorrect
Which type of memory vulnerability attack manipulates the "return address" of the memory location of a software program?
Hide Feedback
Correct
What race condition can result in a NULL pointer/object dereference?
Hide Feedback
Correct
Which of the following attacks targets the external software component that is a repository of both code and data?
Hide Feedback
Correct
What term refers to changing the design of existing code?
Hide Feedback
Correct
Which of the following is technology that imitates human abilities?
Hide Feedback
Correct
Which statement regarding a keylogger is NOT true?
Hide Feedback
Correct
Akira is explaining to his team members the security constraints that have made it a challenge for protecting a new embedded system. Which of the following would Akira NOT include as a constraint?
Hide Feedback
Correct
Agape has been asked to experiment with different hardware to create a controller for a new device on the factory floor. She needs a credit-card-sized motherboard that has a microcontroller instead of a microprocessor. Which would be the best solution?
Hide Feedback
Correct
Hakaku needs a tool with a single management interface that provides capabilities for managing and securing mobile devices, applications, and content. Which tool would be the best solution?
Hide Feedback
Correct
In her job interview, Xiu asks about the company policy regarding smartphones. She is told that employees may choose from a limited list of approved devices but that she must pay for the device herself; however, the company will provide her with a monthly stipend. Which type of enterprise deployment model does this company support?
Hide Feedback
Correct
Aoi has been asked to provide research regarding adding a new class of Android smartphones to a list of approved devices. One of the considerations is how frequently the smartphones receive firmware OTA updates. Which of the following reasons would Aoi NOT list in her report as a factor in the frequency of Android firmware OTA updates?
Hide Feedback
Correct
What is the process of identifying the geographical location of a mobile device?
Hide Feedback
Correct
Which of these is used to send SMS text messages to selected users or groups of users?
Hide Feedback
Correct
Enki received a request by a technician for a new subnotebook computer. The technician noted that he wanted USB OTG support and asked Enki's advice regarding its. Which of the following would Enki NOT tell him?
Hide Feedback
Correct
Banko's sister has just downloaded and installed an app that allows her to circumvent the built-in limitations on her Android smartphone. What is this called?
Hide Feedback
Correct
Which of the following technologies can convert a texting app into a live chat platform?
Hide Feedback
Correct
What prevents a mobile device from being used until the user enters the correct passcode?
Hide Feedback
Correct
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document?
Hide Feedback
Correct
What does containerization do?
Hide Feedback
Correct
What allows a device to be managed remotely?
Hide Feedback
Correct
Which of these is NOT a security feature for locating a lost or stolen mobile device?
Hide Feedback
Correct
What enforces the location in which an app can function by tracking the location of the mobile device?
Hide Feedback
Correct
Which of these is considered the strongest type of passcode to use on a mobile device?
Hide Feedback
Correct
Which of the following is NOT a context-aware authentication?
Hide Feedback
Incorrect
Which tool manages the distribution and control of apps?
Hide Feedback
Correct
Comments
Post a Comment