GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

Johnny develops an app to encrypt short messages. He runs th…

Johnny develops an app to encrypt short messages. He runs the encryption program, but it is designed to deliberately introduce a 5- to 15-second delay before encryption begins. What type of data is Johnny about to encrypt?

Read Details

Cadence will attempt to find two different sets of input tex…

Cadence will attempt to find two different sets of input text that will yield the same hash when using MD5. What type of attack is Cadence most likely to perform?

Read Details

Alpha and Beta are having a conversation in English. Gamma,…

Alpha and Beta are having a conversation in English. Gamma, who is a gifted conversationalist and tends to monopolize conversations, approaches Alpha and Beta. As soon as Alpha and Beta see Gamma, they start speaking in Spanish, but Gamma does not understand. What did Alpha and Beta just do?

Read Details

Lamarr receives a text message indicating the password to hi…

Lamarr receives a text message indicating the password to his bank account has been changed but needs verification to commit the change. It includes a number to call and a link, both of which will lead to fraud if Lamarr follows through with the instructions. This is an example of what type of attack?

Read Details

Evin thinks one of the computer systems where he works may h…

Evin thinks one of the computer systems where he works may have been compromised. He does not currently have a good way of determining if an unauthorized user logged in successfully. Which of the following can Evin implement that will, going forward, help him identify who logs in?

Read Details

Which of the following lists the data type in order from the…

Which of the following lists the data type in order from the type that needs the highest level of protection to the lowest level?

Read Details

Karlo installs an alarm system that is capable of emitting a…

Karlo installs an alarm system that is capable of emitting and detecting a signal in the light spectrum. The capability serves the purpose of detecting motion and how close an object is in a limited space. Which of the following best describes the type of signal the emitter can transmit?

Read Details

An individual who was recently fired goes to their former pl…

An individual who was recently fired goes to their former place of employment on a weekend. Since they are unable to enter, security goes to the front door to inquire. The fired employee says they forgot their access card and just needs to pick up their tablet in their office. What attack surface is the former employee trying to exploit?

Read Details

An attacker hacks into a cell phone with the intent of steal…

An attacker hacks into a cell phone with the intent of stealing credit card information. The attacker also tries to extend the nefarious activity to contacts in the victim’s phone, and their contacts as well. What entity was the attacker targeting?

Read Details

The CEO of a small retail chain is visiting a client. They c…

The CEO of a small retail chain is visiting a client. They call the help desk in a panic and request a password reset because it expired. The technician says they are not allowed to manually reset passwords but to kindly use the online password reset system. The CEO gets irate, says “You’re fired,” and hangs up. Which of the following best characterizes what happened, or what should have happened?

Read Details

Posts pagination

Newer posts 1 … 43,684 43,685 43,686 43,687 43,688 … 84,733 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top