Questions


August 2022 1 4 Report
1. Which is a Phishing attack?
A. Throwing water on an adversary’s computer
B. Tricking someone into giving away sensitive data
C. Sneaking into a concert without paying
D. Buying something with someone else’s credit

2. What is the difference between a Phishing and Spear Phishing attack?
A. A spear phishing attack is targeted while phishing is random
B. A phishing attack is illegal while spear phishing is legal
C. A spear phishing attack involves theft or identity fraud and phishing does not
D. A phishing attack is more convincing than a spear phishing attack

3. Which is NOT a motive or reason for phishing mentioned in the text?
A. To steal private communication or records
B. To commit identity fraud
C. To gain control of someone else’s computer network
D. To disarm home alarm systems

4. How can 2FA protect users from phishing attacks?
A. Nobody can log into the account under any circumstances
B. The attacker needs a fingerprint or eyeball scan to access the account
C. Users need two keys to log in, and the user can’t give away one of the keys
D. Two people have to approve the login, so the attacker can’t do it alone

5. Which statement would the author most likely AGREE with?
A. Every phishing attack involves stealing the victim’s identity to commit fraud
B. In a phishing attack, an attacker overpowers a victim with a stronger computer
C. In a spear phishing attack, the attacker erases the victim’s identity
D. If a phishing attack is successful, users willingly give attackers sensitive data

Answers & Comments


Add an Answer


Please enter comments
Please enter your name.
Please enter the correct email address.
You must agree before submitting.

Helpful Social

Copyright © 2024 EHUB.TIPS team's - All rights reserved.