Episodios
-
The podcast episode "Decoded – Unmasking the CEH" provides a comprehensive guide to the Certified Ethical Hacker (CEH) certification. Hosted by Edward Henriquez, the episode outlines what the CEH is, its significance in cybersecurity, and the career opportunities it can unlock. It thoroughly breaks down the 20 domains covered in the CEH exam, including topics like reconnaissance, network scanning, system hacking, and web application attacks. The podcast also offers advice on how to effectively prepare for the exam, suggesting study materials, hands-on practice, and the use of specific tools. Furthermore, it discusses the value of the CEH certification in comparison to other cybersecurity credentials. Ultimately, the episode aims to equip listeners with a clear understanding of the CEH and the steps needed to pursue it.
-
Decoded: The Open-Source Arsenal – Deep Dive into DFIR Tools is a podcast episode hosted by Edward Henriquez that explores a variety of open-source tools critical for digital forensics and incident response (DFIR). The episode examines tools used in disk and memory forensics, such as Autopsy, The Sleuth Kit, Volatility, and Rekall, for analyzing compromised systems and memory dumps. It further discusses network forensics with Wireshark, Zeek, and Suricata for traffic analysis and threat detection. Additionally, the episode covers log and event analysis using the ELK Stack and Graylog, as well as malware analysis with YARA, Ghidra, and Radare2. Finally, it touches upon incident response and threat hunting tools like Velociraptor, GRR Rapid Response, and Osquery, and concludes with cloud forensics tools for AWS and GCP, highlighting their importance in uncovering cyber threats.
-
¿Faltan episodios?
-
This podcast episode of "Decoded" explores the importance of Unix in cybersecurity. It traces Unix's origins and its influence on modern operating systems and security practices. The episode highlights essential Unix commands for security professionals and explains effective patching and update strategies. It also shows how to use Ansible for automating Unix security tasks such as enforcing policies, deploying intrusion detection tools, and managing user privileges. Ultimately, the podcast underscores why proficiency in Unix is critical for anyone serious about a career in cybersecurity.
-
Edward Henriquez hosts the "Decoded Podcast". The YouTube video by "UnixGuy | Cyber Security" outlines a comprehensive six-month plan for individuals seeking entry-level cybersecurity positions without prior experience or degrees. It emphasizes practical, hands-on skills, starting with the Google Cybersecurity Certificate. The plan includes resume building, focusing on relevant experience, immediately applying for jobs to gain confidence, becoming a cybersecurity generalist before specializing, participating in virtual internships, and engaging in intermediate-level training.
-
PurpleLab is an open-source cybersecurity lab designed to help security teams detect, analyze, and simulate cyber threats. It provides a sandboxed environment with tools for testing detection rules, generating realistic logs, and executing malware. The lab includes a web interface, a Windows 10 virtual machine with forensic tools, and integration with the ELK stack for log analysis. Administrators can configure LDAP settings and API keys, as well as set up integration with Splunk. PurpleLab requires a clean installation of Ubuntu Server 22.04 and offers various pages for monitoring, hunting, simulating attacks, and managing system health.
-
This podcast episode of Decoded, hosted by Edward Henriquez, addresses the ever-present threat of password cracking. It explores three common methods used by hackers: brute force attacks, dictionary attacks, and rainbow table attacks. For each technique, Henriquez provides real-world examples of successful breaches, highlighting the potential damage. Most importantly, the podcast offers actionable advice on how individuals and organizations can strengthen their password security through strategies like using long, complex passwords, enabling multi-factor authentication, and implementing robust password policies. The goal is to empower listeners with the knowledge to defend themselves against these prevalent cyber threats.
-
This curated list highlights top books for mastering Open-Source Intelligence (OSINT). The texts cover diverse aspects, from cybercrime investigation and strategic thinking to human rights documentation and digital privacy. Several books offer practical guidance on OSINT techniques, data analysis, and ethical considerations. Some focus on applying OSINT in specific domains like cybersecurity and corporate due diligence. Others explore the psychological dimensions of social engineering for ethical intelligence gathering. Overall, the collection equips readers with comprehensive knowledge for leveraging publicly available data across various fields.
-
The CrowdStrike 2024 Threat Hunting Report analyzes the evolving cyber threat landscape over the past year. It highlights the rise of stealthy, cross-domain attacks targeting identity, endpoints, and cloud environments. The report emphasizes the increasing use of legitimate tools like RMM software by adversaries for malicious purposes and insider threats exploiting recruitment processes. CrowdStrike's OverWatch team uses threat intelligence, AI, and proactive hunting to detect and disrupt these advanced threats, ultimately strengthening the Falcon platform's defenses. Case studies illustrate real-world examples of adversaries like SCATTERED SPIDER and FAMOUS CHOLLIMA, and detail the tactics used to counter them.
-
This podcast episode discusses using artificial intelligence (AI) to enhance cybersecurity. It focuses on running Large Language Models (LLMs) locally for improved security, pretraining AI models for threat detection and anomaly identification, and building AI-driven proof-of-concept security tools. Specific open-source LLMs like DeepSeek, Tulu-3, and Tongyi are highlighted for their applications in various security tasks. The episode emphasizes the benefits of AI in automating security workflows, improving response times, and reducing alert fatigue. Finally, it promotes building custom AI security tools using readily available technologies like Docker and Fast-LLM.
-
Ethical hacker Ryan Montgomery demonstrates various hacking techniques in a YouTube video, highlighting vulnerabilities in Wi-Fi networks, wireless devices (keyboards, mice, car keys), and even seemingly innocuous devices like vacuum cleaners. He showcases attacks like man-in-the-middle attacks and zero-click exploits, emphasizing how easily personal data (passwords, credit card information) can be stolen. The video stresses the importance of proactive security measures, including using password managers, antivirus software, RFID-blocking wallets, and regularly updating software. Ultimately, the video serves as a wake-up call regarding the pervasive nature of cyber threats and the need for enhanced digital security.
-
Edward Henriquez's CyberFrontiers podcast episode discusses the rising threat of deepfakes and AI-driven social engineering. The podcast explains how deepfake technology uses AI to create realistic but fake audio and video, providing examples of real-world fraudulent activities. It then highlights efforts by tech companies and government agencies to develop deepfake detection technologies. Finally, it offers practical advice for individuals and businesses to protect themselves from these sophisticated attacks, emphasizing the need for increased skepticism and multi-factor authentication. The episode concludes by advocating for stronger regulations and ethical AI development to combat the misuse of deepfake technology.
-
This podcast episode, "Patch or Perish," advocates for improved endpoint patch management to boost ROI. It highlights the substantial financial risks of inadequate patching, citing costly data breaches and downtime. The episode promotes integrating Microsoft Intune with Automox for automated patching, emphasizing cost savings through reduced manual labor, breach prevention, and increased uptime. Real-world examples of companies suffering massive losses due to poor patching are used to underscore the urgency of implementing a robust strategy. The podcast concludes with a clear, actionable plan for building a high-ROI patch management system.
-
Ghost GPT, a new AI model, is explained as a significant cybersecurity threat due to its ability to create highly realistic, deceptive communications for phishing and social engineering attacks. Unlike traditional malware, its adaptive nature makes detection difficult, requiring AI-powered solutions for effective mitigation. The podcast advocates for a proactive defense strategy involving investments in advanced security tools, employee training, and regular system updates. Organizations are urged to adopt a culture of cybersecurity awareness and leverage behavioral analytics to identify and counter these sophisticated AI-driven threats.
-
Open-source intelligence (OSINT) is the practice of gathering information from publicly available sources. The text describes how OSINT, initially used by military and intelligence agencies, is now crucial for cybersecurity. It details how organizations use OSINT to discover and analyze public-facing assets, identify potentially sensitive information, and improve their overall security posture. The text also lists numerous OSINT tools, outlining their functionalities and uses, emphasizing the importance of ethical and legal considerations when employing these techniques. Finally, it stresses the need to proactively address publicly accessible vulnerabilities to prevent exploitation by malicious actors.
-
The Cyber Security Podcast, hosted by industry experts, delves into the critical world of cyber threat intelligence (CTI). In this episode, the hosts explore the various types of CTI, including strategic, tactical, technical, and operational, and examine the crucial role played by CTI analysts. They discuss the intricacies of building a robust CTI program, focusing on the essential steps of data collection, analysis, and reporting. Additionally, the episode highlights the necessary skills and certifications for aspiring CTI professionals and addresses the growing demand for expertise in this field. As part of the discussion, the hosts look to the future of CTI and emphasize its pivotal role in shaping proactive cybersecurity strategies, making it an essential listen for anyone interested in the dynamic field of cybersecurity.
-
Domain 5: Security Operations
What is the first step in the incident response process?
A. Containment
B. Detection and identification
C. Recovery
D. Eradication
Answer: B
What is the purpose of log analysis in security operations?
A. Enhance system performance
B. Identify and respond to suspicious activities
C. Encrypt data
D. Monitor user activity
Answer: B
Which of the following is a security incident?
A. Failed login attempt
B. Unauthorized access to sensitive files
C. Network scan from a trusted device
D. Scheduled maintenance
Answer: B
What is the purpose of a Security Information and Event Management (SIEM) system?
A. Detect malware
B. Centralize security monitoring and alerts
C. Automate patching
D. Block logins
Answer: B
What does “false positive” mean in security monitoring?
A. Actual threat detected
B. Threat blocked successfully
C. Benign activity mistaken as a threat
D. Failed login attempt
Answer: C
What is the primary purpose of vulnerability scanning?
A. Identify unpatched systems
B. Block malicious IPs
C. Encrypt communications
D. Monitor bandwidth
Answer: A
What is a common use case for a playbook in incident response?
A. Automate tasks
B. Guide teams through response
C. Configure firewall rules
D. Test vulnerabilities
Answer: B
What is the purpose of data retention policies?
A. Encrypt sensitive files
B. Define data storage duration
C. Automate backups
D. Block unauthorized access
Answer: B
Which type of malware locks users out until a ransom is paid?
A. Worm
B. Ransomware
C. Trojan
D. Spyware
Answer: B
What is the purpose of forensic analysis in security?
A. Detect ongoing attacks
B. Collect and analyze evidence
C. Enhance encryption
D. Automate scans
Answer: B
Which of the following prevents insider threats?
A. Network segmentation
B. Access monitoring and logging
C. Multi-factor authentication
D. Encryption
Answer: B
What is an important step in the post-incident process?
A. Block all external connections
B. Perform a root cause analysis
C. Encrypt logs
D. Restore access
Answer: B
Which of the following is an advanced persistent threat (APT)?
A. Phishing email
B. Long-term targeted attack by a skilled group
C. Malware via USB drives
D. Brute force attack
Answer: B
What is a zero-day vulnerability?
A. Exploited weakness before patch release
B. Outdated system vulnerability
C. Malware-infected system
D. Known weakness with no exploit
Answer: A
What is the purpose of a sandbox in malware analysis?
A. Isolate and observe suspicious programs
B. Encrypt files
C. Block traffic
D. Restore files
Answer: A
What is the role of a disaster recovery plan?
A. Restore operations after disruption
B. Prevent phishing attacks
C. Automate backups
D. Enforce compliance
Answer: A
What is the purpose of a business impact analysis (BIA)?
A. Identify critical functions and their loss impact
B. Detect malware infections
C. Test firewall efficiency
D. Test disaster plans
Answer: A
Which of the following is part of change management?
A. Evaluate risks before changes
B. Block unauthorized IPs
C. Automate vulnerability scans
D. Monitor physical access
Answer: A
What is the purpose of least privilege in access control?
A. Minimize user/system permissions
B. Encrypt data
C. Maximize productivity
D. Improve password complexity
Answer: A
What does a data loss prevention (DLP) solution do?
A. Prevents sensitive data from unauthorized access/transmission
B. Encrypts all network traffic
C. Blocks malicious email attachments
D. Restores deleted files
Answer: A
-
Domain 4: Network Security (20 Questions)
What is the purpose of a firewall?
A. Detect malware
B. Filter traffic between networks
C. Encrypt sensitive information
D. Manage network bandwidth
Answer: B
What type of attack floods a network to make resources unavailable?
A. Man-in-the-middle
B. Phishing
C. Denial of Service (DoS)
D. Replay
Answer: C
Which protocol encrypts data between a browser and server?
A. FTP
B. HTTP
C. HTTPS
D. Telnet
Answer: C
What is the primary function of a VPN?
A. Secure email communications
B. Provide an encrypted remote-access tunnel
C. Monitor network activity
D. Block unauthorized users
Answer: B
What is the goal of network segmentation?
A. Reduce network congestion
B. Isolate sensitive data/systems
C. Increase encryption efficiency
D. Enhance speed
Answer: B
What device connects network segments?
A. Switch
B. Router
C. Firewall
D. Load Balancer
Answer: B
Which protocol resolves domain names to IPs?
A. HTTP
B. DNS
C. SMTP
D. SNMP
Answer: B
What does an IDS do?
A. Block unauthorized traffic
B. Detect/alert suspicious activity
C. Encrypt communications
D. Filter email spam
Answer: B
Which prevents ARP spoofing?
A. Dynamic IP allocation
B. Static ARP tables
C. NAT
D. Gateway reconfiguration
Answer: B
What is a key benefit of a proxy?
A. Hide internal IPs from external users
B. Block malicious traffic at the packet level
C. Encrypt all network traffic
D. Prevent social media access
Answer: A
What is port scanning?
A. Identify open ports on a device
B. Encrypt incoming traffic
C. Test firewall configurations
D. Block unauthorized IPs
Answer: A
What is the purpose of tools like Wireshark?
A. Test software vulnerabilities
B. Analyze/capture network traffic
C. Encrypt data in transit
D. Configure firewalls
Answer: B
Which control allows traffic based on rules?
A. Intrusion Prevention System (IPS)
B. Firewall
C. Network Access Control (NAC)
D. Honeypot
Answer: B
What is a key advantage of a honeypot?
A. Prevent phishing
B. Attract attackers to identify malicious activity
C. Improve encryption
D. Block brute-force attacks
Answer: B
What is the role of DNSSEC?
A. Secure email
B. Prevent DNS spoofing, ensure integrity
C. Encrypt DNS queries
D. Improve bandwidth
Answer: B
Which protocol provides secure file transfer?
A. FTP
B. SFTP
C. Telnet
D. HTTP
Answer: B
What type of attack alters communications?
A. Man-in-the-middle
B. DoS
C. Social engineering
D. Replay
Answer: A
What is the function of NAC?
A. Encrypt sensitive traffic
B. Enforce device security policies
C. Prevent malware
D. Monitor unauthorized logins
Answer: B
Which wireless security protocol is most secure?
A. WEP
B. WPA
C. WPA2
D. WPA3
Answer: D
What is the purpose of VLANs?
A. Increase speed
B. Segment/isolate traffic for security
C. Encrypt all traffic
D. Prevent malware
Answer: B
-
Domain 3: Access Control Concepts
Example of logical access control:A. Security guards
B. Biometric authentication
C. Passwords
D. Fire alarms
Answer: C
Multi-factor authentication (MFA) requires:A. Two or more forms of authentication from different categories
B. The same password used in multiple places
C. Multiple users authenticating simultaneously
D. A combination of encryption methods
Answer: A
Access control based on job roles:A. Discretionary Access Control (DAC)
B. Role-Based Access Control (RBAC)
C. Attribute-Based Access Control (ABAC)
D. Mandatory Access Control (MAC)
Answer: B
Access control granting permissions based on attributes like location:A. Attribute-Based Access Control (ABAC)
B. Role-Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Discretionary Access Control (DAC)
Answer: A
Access control using predefined rules/labels:A. Discretionary Access Control (DAC)
B. Role-Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Attribute-Based Access Control (ABAC)
Answer: C
Principle of least privilege:A. Giving users only necessary permissions
B. Allowing administrators unlimited access
C. Preventing user account creation
D. Implementing mandatory security clearances
Answer: A
Time-based access control:A. Granted only during specific hours
B. Determined by user role
C. Restricted to known locations
D. Granted after authentication expires
Answer: A
Centralized server enforcing access control policies:A. Firewall
B. Directory Service
C. Proxy Server
D. Load Balancer
Answer: B
Attack using stolen session token:A. Brute force
B. Replay attack
C. Session hijacking
D. Phishing
Answer: C
Access control model where users can grant/restrict access:A. Discretionary Access Control (DAC)
B. Mandatory Access Control (MAC)
C. Role-Based Access Control (RBAC)
D. Attribute-Based Access Control (ABAC)
Answer: A
Purpose of a password policy:A. Encrypt files
B. Enforce secure password creation/management
C. Monitor login attempts
D. Limit account creation
Answer: B
“Something you have” in MFA:A. Password
B. Smart card
C. Biometrics
D. PIN
Answer: B
Risk of sharing user credentials:A. Loss of password integrity
B. Violation of encryption standards
C. Increased bandwidth usage
D. Unauthorized access
Answer: D
Purpose of account lockout policies:A. Block malicious traffic
B. Prevent brute force attacks
C. Encrypt sensitive data
D. Monitor login attempts
Answer: B
Access control dynamically adjusting access by location:A. Attribute-Based Access Control (ABAC)
B. Role-Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Discretionary Access Control (DAC)
Answer: A
Primary purpose of biometric authentication:A. Enhance encryption
B. Verify physical characteristics
C. Monitor network traffic
D. Backup critical data
Answer: B
Granting temporary access:A. Privilege escalation
B. Time-bound access
C. User provisioning
D. Conditional access
Answer: B
Attack manipulating users to share confidential data:A. Malware
B. Social engineering
C. Phishing
D. Keylogging
Answer: B
Preventing password reuse:A. Multi-factor authentication
B. Password history policies
C. Single sign-on
D. Encryption
Answer: B
Primary function of access control logs:A. Block unauthorized users
B. Record access attempts
C. Update user roles
D. Enforce encryption
Answer: B
Purpose of a firewall:A. Detect malware
B. Filter traffic between networks
C. Encrypt sensitive information
D. Manage bandwidth
Answer: B
Attack flooding a network to disrupt resources:A. Man-in-the-middle
B. Phishing
C. Denial of Service (DoS)
D. Replay
Answer: C
-
Domain 2: Business Continuity
What is the goal of a Business Continuity Plan (BCP)?
A. Test incident response capabilities
B. Ensure critical business functions continue during a disruption
C. Mitigate cybersecurity vulnerabilities
D. Monitor system performance
Answer: B
Key outcome of a Business Impact Analysis (BIA):
A. Identifying threats
B. Prioritizing critical systems and processes
C. Writing security policies
D. Testing disaster recovery systems
Answer: B
Part of a disaster recovery plan:
A. Incident detection methods
B. Recovery time objectives (RTOs)
C. Employee training manuals
D. Physical security controls
Answer: B
Recovery Point Objective (RPO):
A. Maximum downtime for critical systems
B. Maximum tolerable data loss
C. Time to detect a security incident
D. Frequency of backups
Answer: B
Test simulating a disaster to evaluate response plans:
A. Tabletop exercise
B. Walkthrough drill
C. Full-scale test
D. Functional test
Answer: C
Goal of high availability:
A. Continuous system access
B. Improved system integrity
C. Increased network security
D. Encrypted communication
Answer: A
Backup type copying data changed since the last full backup:
A. Full backup
B. Incremental backup
C. Differential backup
D. Mirror backup
Answer: B
Purpose of redundancy in business continuity:
A. Reduce costs
B. Ensure system reliability
C. Improve encryption
D. Eliminate testing
Answer: B
Alternate site fully operational during a disaster:
A. Hot site
B. Warm site
C. Cold site
D. Shadow site
Answer: A
Difference between disaster recovery and business continuity:
A. Disaster recovery focuses on technology; business continuity on processes.
B. Disaster recovery focuses on processes; business continuity on compliance.
C. Disaster recovery is part of business continuity.
D. They are unrelated.
Answer: C
Purpose of a contingency plan:
A. Steps to respond to unexpected events
B. Methods to eliminate risks
C. Techniques for improving software development
D. Guidelines for encryption protocols
Answer: A
Concept reducing disruption impact by relocating operations:
A. Data recovery
B. Risk mitigation
C. Disaster recovery
D. Continuity of operations
Answer: D
Tool estimating disruption probability and impact:
A. Penetration test
B. Business Impact Analysis (BIA)
C. Security assessment
D. Threat model
Answer: B
Tabletop exercise:
A. Simulated, non-physical test of plans
B. Full activation of business continuity protocols
C. Automated system backup
D. Incident monitoring solution
Answer: A
Ensures data recovery after a disaster:
A. Firewalls
B. Backups
C. Multi-factor authentication
D. Encryption
Answer: B
Document outlining roles during an incident:
A. Business Impact Analysis
B. Disaster Recovery Plan
C. Incident Response Plan
D. Access Control Policy
Answer: C
Difference between RTO and RPO:
A. RTO = downtime; RPO = data loss tolerance.
B. RTO = business processes; RPO = system availability.
C. RTO = mitigation; RPO = recovery.
D. They are identical.
Answer: A
System ensuring uninterrupted power during disasters:
A. UPS (Uninterruptible Power Supply)
B. Load balancer
C. Firewall
D. Proxy server
Answer: A
Purpose of a warm site:
A. Immediate failover
B. Partial functionality with setup required
C. Basic physical location without equipment
D. Duplicates live systems for seamless recovery
Answer: B
Process evaluating disaster recovery plan effectiveness:
A. Penetration testing
B. Backup monitoring
C. Plan testing and exercises
D. Incident response
Answer: C
-
Domain 1: Security Principles
1. Which part of the CIA triad ensures data is accessible when needed?
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
Answer: C. Availability
2. What is the main purpose of confidentiality in information security?
A. To ensure data is free from errors
B. To ensure only authorized parties can access data
C. To ensure data is accessible when needed
D. To enforce accountability
Answer: B. To ensure only authorized parties can access data
3. Which security principle ensures data has not been altered during transmission?
A. Integrity
B. Confidentiality
C. Availability
D. Accountability
Answer: A. Integrity
4. Which of the following is considered a preventive control?
A. Firewall
B. Audit log
C. Incident response plan
D. Backup
Answer: A. Firewall
5. What does the principle of least privilege entail?
A. Users should have the maximum access possible.
B. Users should only have access necessary for their role.
C. All access should be denied by default.
D. Users should share accounts.
Answer: B. Users should only have access necessary for their role.
6. A policy requiring two people to approve a critical action is an example of:
A. Separation of duties
B. Job rotation
C. Least privilege
D. Defense in depth
Answer: A. Separation of duties
7. Encryption is primarily used to achieve:
A. Availability
B. Confidentiality
C. Integrity
D. Accountability
Answer: B. Confidentiality
8. Which of the following describes a threat?
A. A weakness in a system
B. A potential danger to a system
C. A measure taken to reduce risk
D. A way to detect vulnerabilities
Answer: B. A potential danger to a system
9. What is a vulnerability?
A. A measure to counteract a threat
B. A weakness in a system that can be exploited
C. A probability of a threat occurring
D. A risk to the system
Answer: B. A weakness in a system that can be exploited
10. What type of risk cannot be fully eliminated but must be accepted?
A. Avoidable risk
B. Residual risk
C. Inherent risk
D. Mitigated risk
Answer: B. Residual risk
11. Which of the following is an example of a physical control?
A. Firewall rules
B. Biometric scanners
C. Encryption algorithms
D. Password policies
Answer: B. Biometric scanners
12. What is an example of a deterrent control?
A. Security guards
B. Data backup
C. Antivirus software
D. Incident response
Answer: A. Security guards
13. What is the purpose of defense in depth?
A. To focus all efforts on a single strong control
B. To layer multiple security measures
C. To ensure faster access to data
D. To eliminate risks completely
Answer: B. To layer multiple security measures
14. Social engineering attacks primarily target:
A. Software vulnerabilities
B. Network protocols
C. Human behavior
D. Encryption mechanisms
Answer: C. Human behavior
15. Which of the following is an example of social engineering?
A. Sending a phishing email
B. Exploiting a software bug
C. Performing a man-in-the-middle attack
D. Cracking a password hash
Answer: A. Sending a phishing email
16. What is the primary goal of risk assessment?
A. To eliminate all risks
B. To identify and prioritize risks
C. To design security controls
D. To monitor security incidents
Answer: B. To identify and prioritize risks
17. Which type of attack involves overwhelming a network with traffic?
A. Phishing
B. Ransomware
C. Denial of Service (DoS)
D. Keylogging
Answer: C. Denial of Service (DoS)
18. What is the primary purpose of policies in cybersecurity?
A. To replace technical controls
B. To provide guidelines and expectations
C. To replace monitoring systems
D. To enforce compliance
Answer: B. To provide guidelines and expectations
19. A brute-force attack targets:
A. The user’s personal details
B. Guessing passwords systematically
C. Exploiting a software vulnerability
D. Social manipulation
Answer: B. Guessing passwords systematically
20. What type of malware encrypts files and demands payment for their release?
A. Spyware
B. Ransomware
C. Worm
D. Trojan
Answer: B. Ransomware
- Mostrar más