Business Test 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

List characteristics of computer viruses. More than one answer may be correct.

-A computer virus is software that infects computers and is created using computer code. -Viruses can destroy programs or alter the operations of a computer or network.

Which of the following is an example of data in transit? More than one answer may be correct.

-A person uses an app on their smartphone to pay a bill. -A person transfers documents between their laptop and mobile device.

Which of the following scenarios is an example of project crashing? More than one answer may be selected.

-A project manager brings on more developers to assist with software updating. -A project manager determines that purchasing additional equipment will allow them to create products twice as fast.

Which of the following is a situation that UEBA would flag for review? More than one answer may be correct.

-A user normally spends less than an hour accessing a secure server. One day, she spends almost all of her time accessing the data on that server. -A user who normally sends between 50 and 100 emails a day sends over 1,000 emails one day.

The term virus is a useful way to identify this malware for which of the following reasons? More than one answer may be correct.

-Both biological and computer viruses have the ability to reproduce themselves. -A virus needs a host body or computer system to do its work.

From the following list, select all the steps that the Federal Emergency Management Agency (FEMA) recommends businesses take to help protect their systems, data, and information from natural disasters.

-Create a business continuity plan. -Utilize offsite cloud storage. -Store data in different areas across the country.

According to Norton, which of the following steps should be taken to defend against rootkits? More than one answer may be correct.

-Don't ignore software updates. -Be aware of phishing emails. -Watch out for drive-by downloads.

Which of the following statements about Gantt charts is true?

-Gantt charts are designed for internal stakeholders, not external ones. -A Gantt chart displays a critical path for project completion.

Which of the following would be included in a risk assessment executive summary that was prepared to help executives make informed decisions about security? More than one answer may be correct.

-If a cyberattack were able to breach our security, the medical information and social security numbers of all of patients would be available. -Because our organization has multiple government contracts, we need to worry about threats from other countries' governments who seek to gain sensitive information regarding the U.S. government. -All employees are required to go through biannual cybersecurity training. Additional training is required when new threats that could affect our organization become known.

Which statement describes state-sponsored cyberwarfare? More than one answer may be correct.

-It originates with foreign governments. -It is launched or executed by a foreign government or a paid third-party -It can be used to send warnings or to create conflict between countries.

What are the specific advantages of a PERT network chart? More than one answer may be correct.

-It shows the interconnectivity of different processes. -It identifies which activities can be completed concurrently.

TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. Which three of the following are correct?

-Ninety-one percent of cyberattacks are launched with a phishing email. -Eighty-five percent of daily email attachments are harmful for their intended recipient. -Thirty-eight percent of malicious attachments are masked as Microsoft Office files.

Of the following statements, which apply to spyware? More than one answer may be correct.

-Spyware harvests private information by monitoring how users interact online. -Downloads from unvetted websites can be a vector for spyware.

Mohammed is experiencing issues with his work computer. He speaks to the IT department and they identify various symptoms of a computer virus. What are symptoms of a computer virus? More than one answer may be correct.

-The operating system may not launch properly. -Critical files may be automatically deleted -The user may receive unexpected error messages.

What can occur for project activities on a critical path that include slack time? More than one answer may be selected.

-They can be allocated fewer resources. -They can be deemed a lower priority.

Describe privacy concerns associated with cookies. More than one answer may be correct.

-Websites that use cookies can collect information about surfing habits and sell that information to a variety of third parties. -Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. -Corporate and government entities can use cookies to monitor your surfing behavior.

From the following list, select all the situations that involve information privacy rights.

-Your neighbor has a history of abusing children. Do you and others living in the neighborhood (or about to move in) have a right to know this? -You allow an employee to take two-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment? -One of your new hires has a large Twitter following under a pseudonym. Should you let your boss know?

Which of the following names a type of cybersecurity threat? More than one answer may be correct

-an event or act that may lead to asset loss -a condition that may lead to asset loss -a harmful result or consequence of asset loss

California's SB-327 for IoT Security mandates that security features of Internet-ready devices must be ________. More than one answer may be correct.

-appropriate to the intended use of the device -suitable for the type of data the device will contain and relay -constructed to protect the device and any data it stores

What are three ways in which building a Gantt chart improves project management?

-by providing a framework to develop PERT -by showing estimated timelines -by visually displaying concurrent processes

From the following list, select the two vital functions performed by project management software.

-calculating a project's duration and schedule -communicating changes, developments, and progress

In addition to planning, analysis, and mitigation, select the remaining two categories of the respond (RS) function of the NIST Cybersecurity Framework from the list below.

-communication -improvements to cybersecurity response plans

In the context of California's SB-327 for IoT Security, an "Internet-connected device" ________. More than one answer may be correct.

-connects to the Internet -has a Bluetooth address -has an Internet Protocol (IP) address

You and a friend have two rooms in an apartment to paint on the same day. You finish your room and your friend does not. A project manager would say that the job is affected by which scheduling dependency? More than one answer may be correct.

-discretionary -finish-to-finish

From the following list, select all the information that project managers need to construct a basic Gantt chart.

-each activity or task of the project -the start time of each activity or task -the duration of each activity or task

From the following list, select all the effective methods of encouraging ethical computer use in the workplace.

-employee monitoring software -remote desktop software -setting a good example

Which of the following are tactics that can be used to stay safe when browsing the Internet?

-only entering personal information at sites that use a secure http protocol (designated as https://) -connecting to a VPN before going on to the Internet -choosing Incognito mode when using Google Chrome as your browser

The PMBOK identifies six risk assessment processes, including risk management planning, risk identification, and qualitative risk analysis. Which of the following processes complete this list?

-quantitative risk analysis -risk response planning -risk monitoring and control

Describe the categories of the Recover (RC) function of the NIST Cybersecurity Framework. More than one answer may be correct.

-restoration of impaired systems -improvements to cybersecurity plans -communication with all stakeholders

What is earned value management (EVM) used to track? More than one answer may be selected.

-scope -costs -time

Which of these tasks is malware designed to do? More than one answer may be correct.

-steal information -destroy data -incapacitate networks and computers

Why do computer hackers use trojans to invade devices? More than one answer may be correct.

-to spy on the victim's computer activities -to steal the victim's confidential data -to interrupt network connections

In which of the following scenarios would a Program Manager use a PERT chart to describe the status of a project? More than one answer may be selected.

-when providing an update to their manager regarding the status of their project -for their own understanding of what activities were completed, in progress, or yet to be begun

How many dimensions or categories can the ethical concerns of the digital age be divided into?

5

To assist project managers with determining and evaluating potential risk, the project management body of knowledge (PMBOK) identifies ________ processes.

6

Which of the following are examples of spear phishing?

An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device.

How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?

Data integrity is more easily preserved if users must be authorized to access data and make changes.

Determine which of the following is an example of data that has integrity.

Data that are used to set sales goals for account executives are stored on a secure server; managers are allowed read-only access to the sales data for the reps they directly manage.

Which type of chart commonly used by project managers is a horizontal bar chart that shows project activities on the y-axis and time on the x-axis?

Gantt chart

How does a firewall work?

It determines what Internet traffic can leave or enter a network or computer.

By displaying activities that have slack, a _________ can help speed the completion of an entire project by directing resources to critical activities.

PERT chart

________ software allows managers to take control of an employee's computer remotely and record the computer's mouse and keyboard entries.

Remote desktop

The ________ step of an ethical analysis involves asking whether the decision will impact the privacy or property rights of any individuals or corporations.

Second

Which of the following laws allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant?

The USA PATRIOT Act/USA Freedom Act

Why is it important to preserve the integrity of data, information, and systems?

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

How do breach and attack simulation technologies help white-hat hackers test security?

They execute thousands of attack techniques continuously to reveal weaknesses.

As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or

Tiny Banker Trojan.

Which situation involves a computer ethics violation that you should report to your employer?

You pass a coworker's computer screen and see him surfing through child pornography.

Which project management tool is so important that nearly all PM software includes support systems for it, to ensure that all stakeholders are kept informed of a project's status?

a communications plan

The Universalist Principle states that

a decision must be fair for all involved.

Software-based keyloggers often infect a system through

a malicious email or link opened by an unsuspecting user.

Which of the following is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?

attempting to exploit flaws from the outside, simulating attacks that a hacker would try

A ________ deliberately modifies the normal operations of a computer or network through the use of malicious code.

cyberattack

When making an ethical analysis, you should get all the pertinent facts and then

determine the affected.

Which of the following actions would violate an organization's prohibitions on the personal use of company computers as well as the law in most countries?

distributing company-owned software without authorization

A PERT network chart describes the ________ of each project activity in terms of optimistic or best-case scenario (O), pessimistic (P), and expected or most likely (E or M)

duration

Which of the following is generally not protected by an organization's network firewall?

files stored in a cloud-based system, such as Dropbox or Google drive

Because they allow stakeholders a simple visualization of an entire project, project managers commonly use

flowcharts

Which of the NIST Cybersecurity Framework functions investigates an organization's cybersecurity management in the context of their business needs and resources?

identify (ID) function

Cybersecurity threat mitigation is best defined as the policies, procedures, and tools that help an organization

identify cybersecurity threats, prevent them from being realized, and minimize damage from them.

What is a misunderstanding that can be clarified by a flowchart?

lack of payment from the client

A form of spyware that records all actions typed on a keyboard is called a keystroke

logger

Which of the following is a goal of confidentiality as defined by the CIA triad?

making sure the right people have access to secure information

Along with employees themselves, those most responsible for ethical employee behavior are

managers

How have businesses reduced the likelihood of experiencing a data breach?

moving data storage to a cloud service provider such as Amazon Web Services

What is the basic formula for estimating risk exposure?

multiply risk probability by risk impact

A cybersecurity exploit allows a hacker or intruder to

remotely access a network, gain privileges, and make unauthorized changes.

By entering a project's limiting factors into a project management software system, a manager can receive ________ recommendations.

resource leveling

For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?

security weaknesses in operating systems or application software

What are third-party cookies?

small text files created by websites other than those visited by web customers

Which law or set of laws was created to implement two World Intellectual Property Organization (WIPO) treaties and to update copyright laws regulating digital material?

the Digital Millennium Copyright Act (DMCA)

The Act that protects person-to-person wire, oral, and electronic communications is

the Wiretap Act.

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ________ cookies.

third party

You own a pool installation business and need a list of high-income houses with large backyards. You buy the list from a data marketing company. What is this called?

third-party data purchase

What is the purpose of social engineering in conjunction with ransomware?

tricks victims into allowing access to data

A program that appears to be legitimate but executes an unwanted activity when activated is called a

trojan

Making an ethical decision will most likely result in

unintended consequences.

Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?

viruses

The NIST Cybersecurity Framework is a

voluntary guide for organizations.

Which computer experts help an organization ensure that its information system is protected against intrusions by testing the system's security measures?

white-hat hackers


Conjuntos de estudio relacionados

Chapter 37: Nursing Care of the Child With an Infection

View Set

BAS 282: Strategic Planning: Homework

View Set

Chapter 6 Functions Review Questions

View Set