As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- Which of the following attacks can be conducted over a landline?
- Smishing
- Whaling
- Vishing
- Pharming
- Ideally, when should passwords be changed?
- Only when an account is compromised
- Every day
- Every 30-90 days
- Never
- What consists of at least one bot server or controller and one or more client bots?
- Virus
- Trojan
- Botnet
- Adware
- What is implemented to carry out distributed DDoS attacks, steal data, and send spam messages and permits the hacker to access various devices and their connection?
- Trojan
- Virus
- Botnet
- Worm
- Nowadays, most botnets rely on which of the following for communication?
- Server-to-server
- Peer-to-peer
- Client-to-server
- Host-to-server
- Trojans are not capable of which of the following?
- Stealing data
- Self-replicating
- Stealing financial information
- Stealing login credentials...