Match each item with a statement below.
A. The steps that ensure that the individual is who he or she claims to be
B. A password attack in which every possible combination of letters, numbers, and characters is used to match passwords in a stolen password file
C. A password attack that compares common dictionary words against those in a stolen password file.
D. A secret combination of letters, numbers, and/or symbols that serves to authenticate a user by what he or she knows
E. Viewing information that is entered by another person
F. Grouping individuals and organizations into clusters based on an affiliation
G. Redirecting a user to a fictitious website based on a misspelling of the URL
H. A phishing attack in which the attacker calls the victim on the telephone
I. A phishing attack that targets wealthy individuals
A. Authentication
B. Brute force attack
C. Dictionary attack
D. Password
E. Shoulder surfing
F. Social engineering
G. Typo squatting
H. Vishing
I. Whaling
You might also like to view...
?
Referring to the figure above, which item represents a preview of the button to be generated based on your selections?
A. a B. b C. c D. d
Which of the following commands allows a standard user to execute a single command as root without actually switching to the root account?
A. su B. sudo C. sudoer D. doas
You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of?
A. TCP B. UDP C. ICMP D. IGMP
What is the output of the following code?
a. 7 8 9
b. 9 10 11
c. 8 9 10
d. 7 8 9 10