Which of the following alternative operating systems is focused mostly on greater security in the event of a compromise by preventing
... [Show More] propagation?
Qubes
Which of the following might a malicious actor attempt to exploit in a social engineering attack?
All of the above
Which of the following alternative operating systems requires some type of virtualization software and more than one system?
Whonix
The sole purpose of alternative operating systems is for cyber criminals to hide their nefarious activities.
False
In an advanced persistent threat, once access is gained, which of the following are likely to occur?
All of the Above
Successfully opposing disinformation efforts spread via social media is difficult because:
All of the Above
Password cracking tools use wordlist dictionaries containing commonly used passwords in an attempt to gain access using a brute force attack. These wordlists must be downloaded separately from the tool due to the frequency the list is updated.
False
Only law enforcement and intelligence organizations can legally use anonymous browsers like ToR.
False
The amount of fake accounts on social media sites like Facebook is:
Close to equal the number of active users
Qubes achieves greater security by allowing the user to run applications and store files in:
Isolated containers
Using software and malware components to take control over a device's resources is known as:
Cryptojacking
Which of the following is the most common and successful method of fraudulently obtaining credentials to gain a foothold in an APT attack?
Spear Phishing
Because of ProtonMail's "zero access architecture" where the message sender encrypts using the recipient's public key, and the recipient decrypts with their private key, this encrypted messaging service can only be exchanged between ProtonMail users.
False
The sole purpose of using offshore web-hosting services is to engage in fraudulent activities such as evading local laws and disguising identity.
False
Which of the following is an example of an anonymous browser?
ToR Browser
Social media sites have enacted strict policies to prevent the posting or spreading misinformation, with penalties that include deactivating a user's account.
False
Why would one use the RSMangler command on a password wordlist used for password cracking?
To manipulate the original word list adding permutations
Whonix comes preloaded with anonymous browsing and email encryption tools.
True
Tails requires the ability to boot from media on the local device.
True
The terms white-hat hacker, script kiddie, and hacktivist, are all hacker types and cybercriminals.
False
Tails is an example of a Live Operating System, which can rely on all of the following EXCEPT:
A local installation of Windows
Sites on the dark web can't be reached using traditional web browsers because access is blocked via black lists that are constantly updated.
False
Which of the following best describes a cyber mercenary?
Hack for hire actors [Show Less]