Sociology Questions
Explore questions in the Sociology category that you can ask Spark.E!
What percentage of Puerto Rican children are poor
how many indigenous people in Canada live on a reservation or settlement
in northern European countries child outcomes are
College Enrollment and Graduation of Asian Americans
what population is predicted to pass Hispanic population as largest ethnic group
how many poor Latino children live in married couple families
How many people in Canada identify as Indigenous
in Hispanic families Children are expected to care for
Largest concentrations of indigenous people in Canada
Generational effects in schooling and family income is highest in the
Which of the following is NOT one of the early indicators that a dating partner is likely to become violent eventually?
You come across a website offering free software downloads and download a program from it. Later, you realize that your computer is behaving strangely, and you suspect a malware infection. What kind of threat might you have encountered?A. A Trojan disguised as the downloaded softwareB. AdwareC. A phishing attack aimed a stealing your personal informationD. Ransomware that encrypts your files and demands payment
In the last month, there has been a rise in the number of watering hole attacks. Which of the following BEST describes the goals of a watering hole attack?A. Installing ransomware on the target's computerB. Gaining unauthorized access to a specific user's email accountC. Compromising a frequently visited website to infect its visitors with malwareD. Tricking users into sharing sensitive information through deceptive emails
Which of the following is a distinguishing feature of a business email compromise (BEC) attack?A. It involves targeting individuals through text messagesB. The attacker poses as a legitimate brand or organizationC. It relies on compromising frequently visited websitesD. It involves infecting the target's computer with malware
Which of the following scenarios best describes the concept of disinformation?A. Emily shares an article from a reputable news source about climate changeB. Liam fact-checks information before including it in his research paperC. Alex creates a social media account to impersonate a celebrityD. Maya engages in a constructive discussion with her colleagues about office policies
A company executive was researching cloud computing. The executive typed www.microsoft.com into their web browser to get to the Microsoft home page but was redirected to a website with a slightly different home page than expected. What type of attack is this?A. Brand impersonationB. TyposquattingC. Watering hole attackD. Whaling
What distinguishes spear phishing from regular phishing?A. Spear phishing uses phone calls, while regularB. Spear phishing targets high-profile individuals, while regular phishing targets a broader audienceC. Spear phishing relies on fake websites, while regular phishing uses malicious attachmentsD. Spear phishing only targets large corporations, while regular phishing targets individuals
You receive an email claiming to be from the IRS (Internal Revenge Service) informing you of a tax refund. The email contains a link to a website where you can claim the refund by providing your personal and financial information. You provide this information, but an hour later your bank account has been emptied. What type of attack is this most likely to be?A. Spear phishingB. PhishingC. SmishingD. Vishing
Recently, your company suffered data theft from company-owned mobile telephones. You are a cybersecurity administrator and have been tasked with protecting the data stored on company mobile phones. Which of the following can be used to protect data stored on mobile telephones? Select the BEST TWO?A. VPN softwareB. Strong passwordsC. Remote wipeD. Screen locksE. Cable locks
You are working for a government agency and have been tasked with sending data to a field operative. You decide to hide a secret message inside a pretty picture that you attach to a digitally signed email. What is the technique adopted by you called?A. SteganographyB. Malware injectionC. PhishingD. Data masking
