Sociology Questions
Explore questions in the Sociology category that you can ask Spark.E!
What type of attack is occurring when a counterfeit card reader is in use?
A hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwords in conjunction with multiple usernames. What specific type of password attack is the hacker most likely performing?
The latest web application, using default settings, is currently accepting application programming interface (API) calls over HyperText Transfer Protocol (HTTP). The environment has a moderate key management system. Even with basic server security, the API connection is vulnerable to which of the following? (Select all that apply.)
An attacker modified the HTML code of a legitimate password-change web form, then hosted the .html file on the attacker's web server. The attacker then emailed a URL link of the hosted file to a real user of the web page. Once the user clicked the link, it changed the user's password to a value the attacker set. Based on this information, what type of attack is the website vulnerable to?
Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain controllers. The attacker initiated the query from a client computer. What type of injection attack did the attacker perform?
During an internal investigation, a security specialist discovered a malicious backdoor script on a system administrator's machine that executes if the admin's account becomes disabled. What type of malware did the specialist discover?
An attacker is planning to setup a backdoor that will infect a set of specific computers at an organization, to inflict a set of other intrusion attacks remotely. Which of the following will support the attackers' plan? (Select all that apply.)
A user used an administrator account to download and install a software application. After the user launched the .exe extension installer file, the user experienced frequent crashes, slow computer performance, and strange services running when turning on the computer. What most likely happened to cause these issues?
A security operations center (SOC) analyst investigates the propagation of a memory-resident virus across the network and notices a rapid consumption of network bandwidth, causing a Denial of Service (DoS). What type of virus is this?
A user purchased a laptop from a local computer shop. After powering on the laptop for the first time, the user noticed a few programs like Norton Antivirus asking for permission to install. How would an IT security specialist classify these programs?
A fileless malicious software can replicate between processes in memory on a local host or over network shares. What other behaviors and techniques would classify malware as fileless rather than a normal virus? (Select all that apply.)
End-users at an organization contact the cybersecurity department. After downloading a file, they are being redirected to shopping websites they did not intend to navigate to, and built-in webcams turn on. The security team confirms the issue as malicious, and notes modified DNS (Domain Name System) queries that go to nefarious websites hosting malware. What most likely happened to the users' computers?
After a meta-analysis of studies on end-of-life brain functioning, researchers confirmed two indicators of death are _____.A)eyes not responding to pain and the lack of heartbeatB)eye movement in the absence of brain waves and ceased respirationC)slow brain waves and ceased respirationD)no spontaneous breathing and eyes not responding to pain
If a user's device becomes infected with crypto-malware, which of the following is the best way to mitigate this compromise?
Be able to describe the most significant laws that were passed as a result of the Civil Rights Movement.
Describe the impact of the changing living patterns in American society during the Post-WWII Era
Of the reasons Oregon residents gave for requesting physician-assisted suicide, the LEAST common reason was _____.A)loss of autonomyB)loss of ability to enjoy lifeC)painD)loss of dignity
Which of the following statements is a way that death today is different from 100 years ago?A)Death occurs earlier.B)Death impacts more children.C)Dying has become less familiar.D)Dying occurs faster.
Alison has just entered a hospice. She can expect _____.A)restricted visiting hours for family and close friendsB)artificial life-support systemsC)pain managementD)to be resuscitated if she quits breathing on her own
Oregon's law regarding assisted suicide requires the _____.A)consent of the next of kinB)patient's illness to be confirmed by at least four physiciansC)patient to enter hospice careD)dying person to request the lethal drugs twice orally and once in writing
