Question

65. Question 65 Which feature of this email is a red flag, indicating that it may...

65.

Question 65

Which feature of this email is a red flag, indicating that it may be a phishing attack and not a legitimate account warning from PayPal?

<<insert Paypal phishing email graphic>>

1 point

Poor quality layout.

Suspicious attachments.

There is a hyperlink in the body of the email.

Generic greetings and signature.

66.

Question 66

Which three (3) of these are PCI-DSS requirements for any company handling, processing or transmitting credit card data? (Select 3)

1 point

Assign a unique ID to each person with computer access.

Restrict access to cardholder data by business need-to-know.

Restrict physical access to cardholder data.

All employees with direct access to cardholder data must change their passwords monthly.

67.

Question 67

Stolen credit card numbers are sold to brokers who resell them to carders who use them to buy prepaid credit cards that are then used to buy gift cards that will be used to buy merchandise that is shipped to a reshipper who sends it on to its final destination before it is sold for profit.

Why is such a complex process used instead of simply using the stolen numbers to buy the products that are desired?

1 point

If done quickly, there is a multiplying effect in play. The stolen credit card can be used to buy 3 or 4 prepaid cards each valued at the credit limit of the original card. The same is true for using each prepaid card to buy multiple gift cards and each gift card to buy more merchandise than its face value.

It is easier to get approval to use a credit card to purchase a prepaid credit card than to it is to purchase merchandise.

Because stolen cards can rarely be used directly to purchase merchandise.

To make the end-to-end transaction very difficult to follow.

68.

Question 68

According to a 2018 Ponemon study third party risk management, which three (3) of these were identified as best practices? (Select 3)

1 point

Frequent review of third-party management policies and programs.

An inventory of all third parties with whom you share information.

Requirement that all third-parties are bonded against data loss in the event of a breach.

Evaluation of the security and privacy practices of all third parties.

69.

Question 69

You get a phone call from a technician at the "Windows company" who tells you that they have detected a problem with your system and would like to help you resolve it. In order to help, they need you to go to a web site and download a simple utility that will allow them to fix the settings on your computer. Since you only own an Apple Mac, you are suspicious of this caller and hang up. What would the attack vector have been if you had downloaded the "simple utility" as asked?

1 point

Phishing

Remote Desktop Protocol (RDP)

Malicious Links

Software Vulnerabilities

70.

Question 70

Very provocative articles that come up in news feeds or Google searches are sometimes called "click-bait". These articles often tempt you to link to other sites that can be infected with malware. What attack vector is used by these click-bait sites to get you to go to the really bad sites?

1 point

Remote Desktop Protocol (RDP)

Malicious Links

Software Vulnerabilities

Phishing

Homework Answers

Answer #1

Answer 65 :
Suspicious attachments.

Answer 66 :
Assign a unique ID to each person with computer access.
Restrict access to cardholder data by business need-to-know.
Restrict physical access to cardholder data.

Answer 67 :
To make the end-to-end transaction very difficult to follow

Answer 68 :
An inventory of all third parties with whom you share information.
Requirement that all third-parties are bonded against data loss in the event of a breach.
Evaluation of the security and privacy practices of all third parties.

Answer 69 :
Software Vulnerabilities

Answer 70 :
Malicious Links

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application...
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application Security Testing. IAST Interactive Application Security Testing. PAST: Passive Application Security Testing. DAST: Dynamic Security Application Testing. 57. Question 57 Which one of the OWASP Top 10 Application Security Risks would be occur when there are no safeguards against a user being allowed to execute HTML or JavaScript in the user's browser that can hijack sessions. 1 point Insufficient logging and monitoring Security misconfiguration...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
Question 61 ​The tag for creating a numbered list is ____. a. ​<ol> b. ​<li />...
Question 61 ​The tag for creating a numbered list is ____. a. ​<ol> b. ​<li /> c. ​<ul> d. ​<nl> 1 points Question 62 ​The term for a collection of website files stored on a web server is ____. a. ​active website b. ​local website c. ​remote website d. ​plug-in website 1 points Question 63 ​The text editor installed with Windows is called ____. a. ​web pad b. ​MS Sketch c. ​Notebook d. ​Notepad 1 points Question 64 ​The text...
Question 1 of 15 Which of the following is not a recommended starting point to enter...
Question 1 of 15 Which of the following is not a recommended starting point to enter sales of products/services? A. Quick Create > Invoice B. Register > New transaction C. Quick Create > Sales Receipt D. Customer detail page > New transaction E. Transactions > Sales > New transaction Question 2 of 15 Which of the following statements accurately describes bank rules? A. Bank rules are imported from the Bank's website into the For Review tab in the Banking Center...
After reading the following article, how would you summarize it? What conclusions can be made about...
After reading the following article, how would you summarize it? What conclusions can be made about Amazon? Case 12: Amazon.com Inc.: Retailing Giant to High-Tech Player? (Internet Companies) Overview Founded by Jeff Bezos, online giant Amazon.com, Inc. (Amazon), was incorporated in the state of Washington in July 1994, and sold its first book in July 1995. In May 1997, Amazon (AMZN) completed its initial public offering and its common stock was listed on the NASDAQ Global Select Market. Amazon quickly...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT