Sometimes there are important things that dont fit neatly into another category... they end up here. These may be combinations of other topics or just loosely associated topics.
[Easy] What is the maximum sentence for accessing a protected computer without sufficient "authorization" under the Computer Fraud and Abuse Act in the United States (first-offense)?
- [1/1%] You cannot serve jail time for convicition under the CFAA
- [7/6%] 1 year
- [93/78%] [correct] 5 years
- [18/15%] 10 years
Explanation: https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act
[Easy] Submit answer 'C' for this one.
- [2/2%] Answer A is designed to check if you're actually paying attention.
- [0/0%] (B)ecause if you're not you might select this one.
- [115/97%] [correct] I'm paying attention, this is the answer I'm supposed to submit.
- [1/1%] This is another answer but its definitely not what I'm supposed to submit.
Explanation: https://www.youtube.com/watch?v=dQw4w9WgXcQ
[Medium] What is the "deep web" or "dark web?"
- [1/1%] A network of only computers in dark cases.
- [77/65%] [correct] A network usually accessible by normal internet connection but likely requiring special access methods.
- [4/3%] A network that is only accessible via special satellite connection.
- [36/31%] A network with sites exclusively for illegal activities like drug dealing.
Explanation: https://www.britannica.com/story/whats-the-difference-between-the-deep-web-and-the-dark-web
[Medium] When is it okay to attack a computer system or some other technology?
- [24/20%] It is never acceptable to attack a computer system.
- [20/17%] Only when someone from the owning business gives you explicit permission.
- [9/8%] Only when you own the device under attack.
- [66/55%] [correct] Only when a person of sufficient authority gives you explicit permission.
Explanation: https://www.coalfire.com/insights/resources/video/debrief-on-arrest-of-coalfire-pen-testers-in-iowa
[Hard] What has the greatest effect on the security of a password?
- [21/18%] [correct] The length of the password.
- [3/3%] The system it was set on.
- [87/74%] The complexity (variance in characters) of the password.
- [7/6%] The developer of the database.
Explanation: https://pages.nist.gov/800-63-3/sp800-63b.html