What is the darknet?
What is the darknet?A . A type of network that is used for illegal activitiesB . A type of network that is only accessible through TORC . A type of network that is not connected to the internetD . Cloud StorageView AnswerAnswer: B
Which of the following concepts is related to the process of verifying a user's identity?
Which of the following concepts is related to the process of verifying a user's identity?A . AuthorizationB . Digital identityC . AuthenticationD . AccountingView AnswerAnswer: C
What are email spam filters?
What are email spam filters?A . Filters used to block sensitive information sent via emailB . Filters used to block all incoming emailC . Filters used to block only unsolicited and unwanted emailD . Filters used to block all outgoing emailView AnswerAnswer: C
What are some security risks associated with Smart Devices and IoT networks?
What are some security risks associated with Smart Devices and IoT networks?A . Overheating and battery malfunctionB . Poor internet connectivity and network lagC . Data breaches and unauthorized accessD . Display and resolution issuesView AnswerAnswer: C
Which of the following is a router that is used as a gateway to forward traffic from a device to other networks?
Which of the following is a router that is used as a gateway to forward traffic from a device to other networks?A . Default GatewayB . SwitchC . ModemD . Access PointView AnswerAnswer: A
What type of attack is this?
Your computer has become infected with a program that is causing it to perform slowly and display unwanted advertisements. What type of attack is this?A . DoSB . MalwareC . PhishingD . ExploitView AnswerAnswer: B
Which of the following is a characteristic of Perfect Forward Secrecy (PFS)?
Which of the following is a characteristic of Perfect Forward Secrecy (PFS)?A . It relies on a single long-term private key for all sessions.B . It is not used in modern encryption protocols.C . It generates a unique session key for each session.D . It uses symmetric encryption for all...
Which of the following is a type of attack where an attacker intercepts and reads network traffic?
Which of the following is a type of attack where an attacker intercepts and reads network traffic?A . BotnetB . Traffic interceptionC . DoSD . Packet filterView AnswerAnswer: B