=201==
Adam is an attacker who along with his team
launched multiple attacks on target organization for financial benefits.
Adam 是一名攻擊者,他與他的團隊針對目標組織發起多次攻擊以獲取財務利益。
Worried about getting caught, he decided to
forge his identity.
擔心被抓住,他決定偽造身份。
To do so, he created a new identity by
obtaining information from different victims.
為此,他通過獲取不同受害者的信息創建了一個新身份。
Identify the type of identity theft Adam
has performed.
識別 Adam 所進行的身份盜竊類型。
A. Tax identity theft 稅務身份盜竊
B. Social identity theft 社會身份盜竊
C. Synthetic identity theft 合成身份盜竊
D. Medical identity theft 醫療身份盜竊
=202==
Tom received a phishing email and
accidentally opened its attachment.
Tom 收到一封網絡釣魚郵件並不小心打開了其附件。
This resulted in redirection of all
traffics to a fraudulent website.
這導致所有流量被重定向到欺詐網站。
What type of phishing attack happens?
發生了哪種類型的網絡釣魚攻擊?
A. Whaling 捕鯨
B. Spear Phishing 魚叉式網絡釣魚
C. Pharming 網絡欺騙
D. Spimming 廣告垃圾信息
=203==
Malicious software programs that infect
computers and corrupt or delete the data on them.
感染計算機並損壞或刪除其上的數據的惡意軟件程序。
The above-mentioned statement defines which
of the following terms?
上述陳述定義了以下哪個術語?
A. Trojan 木馬
B. Spyware 間諜軟體
C. Worm 蠕蟲
D. Virus 病毒
=204==
Introduction of malicious programs onto the
device connected to the campus network (Trojan Horse, email bombs, virus, etc.)
is called?
將惡意程序引入連接到校園網絡的設備(木馬、電子郵件炸彈、病毒等)被稱為?
A. Network Access 網絡訪問
B. Unauthorized Access 未經授權的訪問
C. Inappropriate Usage 不當使用
D. Authorize Access 授權訪問
=205==
Which one of the following is Inappropriate
Usage Incidents?
以下哪一項是不當使用事件?
A. Denial of Service Attack 拒絕服務攻擊
B. Reconnaissance Attack 偵察攻擊
C. Access Control Attack 訪問控制攻擊
D. Insider Threat 內部威脅
CBDAD
留言
張貼留言