CH5 Cybersecurity

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following statements refer to programs known as spiders, web crawlers, and bots? More than one answer may be correct.

"Good bots" have diverse functions and do not pose security risks. Internet robots are used for both legitimate and malicious purposes. Malicious bots create security risks by compromising a user's control of the computer.

Who performs probable maximum loss calculations?

A company's cybersecurity analysts

What do the three categories of the Detect (DE) function of the NIST Cybersecurity Framework include?

Analysis, observation, detection correct Reason: Correct. The DE function suggests guidelines for analyzing cybersecurity events, monitoring all IT systems, and the institution of procedures for detecting incidences.

Who are the prime targets of MitM attacks? More than one answer may be correct.

Anyone who logs in to shop online Anyone who uses online financial applications Software as a source (SaaS) businesses

Who does California's SB-327 for IoT Security aim to protect and who bears the responsibility?

California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with makers of devices that connect with the Internet.

How does cybersecurity help preserve the integrity of data, information, and systems? More than one answer may be correct.

Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. Cybersecurity threat mitigation includes measures to protect the consistency, accuracy, and dependability of these assets. Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity.

are cybersecurity breaches that make a computer or online service unavailable to its users.

DDOS attacks correct Reason: Correct. Distributed Denial of Service (DDOS) attacks usually deny people the use of their computer or resource by flooding it with non-nonsensical or superfluous requests from multiple online sources.

Which of the following is an example of event that may occur during the respond stage of the plan-protect-respond cycle? More than one answer may be correct.

Determining the impact of a security breach Communicating with all appropriate parties Executing the appropriate response plans

Which function of the NIST Cybersecurity Framework involves an organization gaining deeper understanding of cybersecurity management in the context of their business needs and resources?

Identify (ID) function correct Reason: Correct. The ID function, the first of five in the framework, helps organizations better understand efforts needed to manage risks specific to their IT infrastructures.

In which function of the NIST Cybersecurity Framework does an organization's cybersecurity team take quick action to mitigate damage to systems?

Respond (RS) function correct Reason: Correct. In the RS function, the cybersecurity team quickly employs procedures upon detection of a cybersecurity event in order to lessen damage caused by the event.

In what stage of the plan-protect-respond cycle is the cause of an incident investigated?

Responding stage

What is the goal of the planning phase of the plan-protect-respond cycle?

Understand the steps needed to design effective information security architecture. correct Reason: Correct. Planning provides the information needed to design effective information security architecture.

Which of the following is an example of data in transit? More than one answer may be correct.

A person uses an app on their smartphone to check their bank balance. At home, a person sends a photo taken on their smartphone to display on their smart TV.

How does a rootkit pose a cybersecurity threat? More than one answer may be correct.

A range of malicious actions is possible because the invader has the same access as the computer's owner or user. Installed on a computer's operating system, a rootkit bypasses security functions.

To get to the bottom of the odd computer problems she was having, Priya listed these symptoms: files mysteriously disappearing, system configurations unexpectedly altered, and two icons showing up for applications she did not download. What malware could have been installed on Priya's computer?

A rootkit correct Reason: Correct. These symptoms point to an outside user controlling the computer through its operating system.

What is the correct definition of a cybersecurity exploit?

A tool or technique for taking advantage of a cybersecurity vulnerability to break into a system and cause harm. correct Reason: Correct. Examples of cybersecurity exploits include specially designed code, command sequences, and open-source exploit kits.

Which of the following is an example of data in process? More than one answer may be correct.

A username that has been submitted for authentication A password that has been submitted for authentication A food order placed through Uber Eats

When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality? More than one answer may be correct.

Access control Authentication

According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.

Access to important data is limited so that only certain employees are able to modify that data. During an acquisition, logistics data are securely transferred to the acquiring company's servers.

Select all options that describe steps in cybersecurity risk analysis.

Assign value to assets Estimate the likelihood of occurrence of threats Estimate potential losses

Which of the elements of the CIA triad does serve in maintaining a properly functioning, error-free operating system?

Availability

Select all options that describe the goals of the Respond (RS) function of the NIST Cybersecurity Framework

Be able to quickly analyze a detected cybersecurity issue Establish procedures that enable action in the event of a cybersecurity incident Be prepared to swiftly mitigate harm caused by a cybersecurity event

Select all options that describe the goals of the Respond (RS) function of the NIST Cybersecurity Framework.

Be able to quickly analyze a detected cybersecurity issue Establish procedures that enable action in the event of a cybersecurity incident Be prepared to swiftly mitigate harm caused by a cybersecurity event

Who does California's SB-327 for IoT Security aim to protect and who bears the responsibility?

California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with makers of devices that connect with the Internet. correct Reason: Correct. As a measure of consumer protection, California's SB-327 for IoT Security requires that manufacturers of devices able to connect to the Internet include features that prevent unauthorized access or use of the information contained within, for instance.

The five categories of the Respond (RS) function of the NIST Cybersecurity Framework include planning, analysis, and mitigation. From the list below, select the remaining two categories.

Communication Improvements to cybersecurity response plans

Which of the following statements explain why a computer virus is so named? More than one answer may be correct.

Computer viruses have the ability to reproduce themselves within a system. An invaded computer inadvertently plays host to the malware.

Select all options that describe the device features mandated by California's SB-327 for IoT Security.

Constructed to protect the device and any data it stores Appropriate to the intended use of the device Suitable for the type of data the device will contain and relay

Select all options that describe the device features mandated by California's SB-327 for IoT Security.

Constructed to protect the device and any data it stores Suitable for the type of data the device will contain and relay Appropriate to the intended use of the device

Which of the following are reasons why states are making cybersecurity measures a high priority? More than one answer may be correct.

Data and technology continue to be at risk from cyber threats. New technologies continue to advance at a rapid rate.

Which of the following is an example of a tool that could be used to ensure data integrity? More than one answer may be correct.

Data correction codes are used to ensure the data retrieved are the same as when it was stored. Data are regularly backed up.

Which of the following is considered a cybersecurity threat to data at rest? More than one answer may be correct.

Data will be viewed by unauthorized users. Data will be stolen.

What is the "DE" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?

Detect function correct Reason: Correct. The DE function is the Detect function of the framework, which involves identifying a cybersecurity event in a timely fashion.

Which of the following statements accurately describes spyware? More than one answer may be correct.

Downloading software or documents from unvetted sources is one way spyware can be installed. Spyware captures private information by monitoring how users interact online.

Your grandfather learns that his identity has been stolen, and you suspect that social engineering attacks are responsible. To help him protect his personal information, you tell him how to recognize the most common attacks. From the following list, select all the possible warning signs.

E-mails or texts that ask him to click a given link for more information or a free download. E-mails or web pages that ask him to provide personal information to enter a contest or receive a free offer. Strange e-mails from his friends, family members, or seemingly trustworthy organizations.

Remote employees of a corporation are required to log into their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools that ensure confidentiality? More than one answer may be correct.

Encryption Access control Authentication

What is the goal of the protect stage in the plan-protect-respond cycle? More than one answer may be correct.

Ensure uninterrupted delivery of vital services. Limit the impact of a security breach.

Which 3 of the following are considered best practiced for ensuring that data are available?

Ensuring that the data server has an appropriate amount of bandwidth. Having standby equipment available to take over in a situation where the main system fails. Storing data on multiple hard drives.

From the following list, select 2 types of cybersecurity vulnerabilities.

Flaws in system security designs that could lead to an accidental compromise. Weaknesses in system security procedures that could be intentionally compromised.

Select all options that describe the goals of the National Institute of Standards Technology (NIST) Cybersecurity Framework.

Give guidance to organizations who wish to understand potential security breaches Create an atmosphere where organizations can effectively discuss cybersecurity risks internally and with those outside of the organization Help organizations develop appropriate policies and procedures to mitigate data breaches

Which 3 of the following are assets that can be impacted by a cybersecurity threat?

Hardware Software Information

Which of the following is an example of a task that might be completed during the planning stage of the plan-protect-respond cycle? More than one answer may be correct.

Having an authorized user attempt to hack into the system to determine vulnerabilities. Determine what security flaws exist. Determine the degree of vulnerability that exists.

Which 3 of the following are considered best practiced for ensuring that data are available?

Having standby equipment available to take over in a situation where the main system fails. Storing data on multiple hard drives. Ensuring that the data server has an appropriate amount of bandwidth.

Select all options that describe standards set forth by the General Data Protection Regulation (GDPR) for compliance by companies who handle individuals' data.

Hire a data protection officer Notify citizens of data breaches Make collected data anonymous

From the following list, select all options that describe the purposes of a cybersecurity risk analysis.

Identify a company's assets Determine how to respond to a potential loss Calculate potential loss due to security threats

Why is preserving the integrity of data, information, and systems an important cybersecurity goal?

If the consistency, accuracy, or dependability of these assets has been compromised, they lose their usefulness and value. correct Reason: Correct. The main objective of cybersecurity goals is to protect these assets not only from being stolen or attacked, but also from being compromised in ways that can harm an organization's operations.

Which of the following are considered cybersecurity breaches? More than one option may be correct.

Impersonation Spyware Viruses Distributed Denial of Service (DDOS)

Select all options that describe the categories of the Recover (RC) function of the NIST Cybersecurity Framework.

Improvements to cybersecurity plans Communication with all stakeholders Restoration of impaired systems

Data at rest or storage can be found in which of the following places? More than one answer may be correct.

In the cloud On an external hard drive

From the following list, select 3 types of events and conditions that are considered cybersecurity threats.

Intentional events Misuse or abuse of IT assets Unintentional, accidental, and incidental events

Which of the following is prohibited by the Computer Fraud and Abuse Act? More than one answer may be correct

Intentionally destroying a computer Cyber blackmail

A movie streaming company is offering an online deal on HD movies to new customers who live in a certain country. How can authentication help the company protect its assets and resources from fraudulent use of the deal? More than one answer may be correct.

It can verify that the customer lives in the correct country. It can grant the customer access to the appropriate movies. It can verify that the customer is new to the company or service.

Which of the following surveillance technologies relies on how data are entered into a system?

Keyloggers correct Reason: Correct. Keyloggers monitor keyboard input to capture private information.

Applying for credit or even a mortgage online is a straightforward process. After creating an account with a unique user name and password, a customer reads a privacy statement, reviews the security policy, and accepts the terms of use. Then they proceed to log in and fill out an application, answering detailed questions about household income, employment, and more. What cybersecurity risk is particularly relevant to this process?

Man-in-the-middle (MitM) attack correct Reason: Correct. In this attack, bad actors place themselves between users (customers) and the legitimate function of the application.

From the following list, select 3 types of events and conditions that are considered cybersecurity threats.

Misuse or abuse of IT assets Intentional events Unintentional, accidental, and incidental events

Where are data in transit found?

On a cellular network correct Reason: Correct. Data transmitted through a cellular network are considered data in transit.

Why is MitMo a growing security risk? More than one answer may be correct.

People use mobile devices in many of the same ways they use computers. Smartphones and other mobile devices are everywhere.

Which of the following is an example of an event that may occur during the protect stage of the plan-protect-respond cycle? More than one answer may be correct.

Perform routine maintenance on organizational resources. Determine levels of access control. Require all employees to attend training that outlines the different types of security threats their organization faces.

Which of these defining components mitigate cybersecurity threats? Select all the correct options.

Policies and procedures used to protect systems and data. Policies, tools, and strategies used to reduce damage from threats. Security tools and oversight used to identify security threats.

Which of these defining components mitigate cybersecurity threats? Select all the correct options.

Policies, tools, and strategies used to reduce damage from threats. Security tools and oversight used to identify security threats. Policies and procedures used to protect systems and data.

Which function of the National Institute of Standards Technology (NIST) Cybersecurity Framework involves an organization analyzing cybersecurity risk and reducing potential damage to IT infrastructures?

Protect (PR) function

Which of the following are areas covered by state-specific cybersecurity laws? More than one answer may be correct

Protecting elections from cyber threats. Ensuring state and local governments are protected from cybersecurity threats. Addressing security needs of smart devices.

Malware that encrypts the victims data files and then demands that a payment is made to the hacker is called __.

Ransomware

Which of these threats to cybersecurity typically comes from an external source and usually request payment in return for a decryption program?

Ransomware correct Reason: Correct. Ransomware is malware that invades a computer or system from the outside and makes its data inaccessible until the organization pays a ransom to the cybercriminals.

In which function of the NIST Cybersecurity Framework are an organization's cybersecurity plans corrected due to a cybersecurity event?

Recover (RC) function

What is the National Institute of Standards Technology (NIST) Cybersecurity Framework?

The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.

Accessing the communications of an organization without authorization was made a criminal violation by which federal cybersecurity law?

The Stored Communications Act Reason: Correct. The Stored Communications Act (Title II of the Electronic Communications Protection Act) criminalizes the intentional unauthorized access of a communications organization.

For a cybersecurity plan to succeed, which of the following must remain confidential? Select all correct answer options.

The logins and passwords of authorized users Private or sensitive data and information The organization's digital or computer systems

For a cybersecurity plan to succeed, which of the following must remain confidential? Select all correct answer options.

The organization's digital or computer systems Private or sensitive data and information The logins and passwords of authorized users

What do many social engineering attacks have in common?

They are conducted via e-mails that offer a reward in exchange for clicking a given link.

Members of a project team at a mid-size company are trained in online safety, and their network is protected by a firewall. But the worst-case scenario has happened: a competitor has obtained protected information, possibly directly from a member's computer. George, the firm's system manager, sees some evidence of a Trojan horse that was engineered to steal passwords. What first steps should he and his security team take to uncover the source? More than one answer may be correct.

They should comb through e-mails with an eye to a message with a clickable link. The security team should examine everyone's activity log, looking for any downloaded files or programs.

What is the overall goal of the General Data Protection Regulation (GDPR)?

To ensure EU companies protect the privacy and personal data of EU citizens

How are data in process different from data at rest or data in transit?

Unlike data in transit or storage, it can be found in a device's RAM or CPU. correct Reason: Correct. Data in process are generally held in the random-access memory of a device.

From the following list, select 2 types of cybersecurity vulnerabilities.

Weaknesses in system security procedures that could be intentionally compromised. Flaws in system security designs that could lead to an accidental compromise.

Which of the following browsing situations may reveal that adware is at work? More than one answer may be correct.

You have been looking for a new winter coat, and three out of five ads popping up on your browser currently show the type of coat you have been considering. Shortly after you buy and download a writing enhancement program, you begin seeing ads for special keyboards, styluses, and other assistive technology. In searching the term database management, the first item you see in the results list is an ad for a particular online database.

Suppose an organization's system is vulnerable to losing information because its automated backup of data is insufficient or substandard. This type of cybersecurity vulnerability is ______.

a weakness in application software correct Reason: Correct. To address this type of vulnerability, the organization should fix or replace the problematic software-in this case, the automatic backup program.

The purpose of spyware is to ______.

capture the user's account data, passwords, key strokes, and more

The essential function of malicious bots is to ______.

control an individual computer by self-replicating and connecting to a central server correct Reason: Correct. Bots that function as malware adversely affect a computer by gaining control of it.

A Trojan horse achieves its purposes through ______.

deceptive access correct Reason: Correct. This type of malware is used to gain unauthorized access to a computer by appearing to come from a legitimate source.

Ransomware basically holds a target hostage because it ___ .

encrypts the victim's data

The main characteristics that define cybersecurity threats are ______.

events that can lead to IT asset loss, conditions that can lead to IT asset loss, and the consequences of such loss

The term "cybersecurity threat mitigation" refers to all of the policies, procedures, and tools used to ______.

guard against threats such as security incidents, data breaches, and unauthorized network access, and reduce any harm they cause

The term "cybersecurity threat mitigation" refers to all of the policies, procedures, and tools used to ______.

guard against threats such as security incidents, data breaches, and unauthorized network access, and reduce any harm they cause correct Reason: Correct. Cybersecurity threat mitigation includes the policies and procedures used to prevent and identify threats as well as to address or "cure" any damage they do.

From the following list, select all the examples of internal threats to cybersecurity.

he leakage of sensitive information An accidental erasure of data An attack by an authorized user

In cybersecurity, the probable maximum loss (PML) is used to______.

help determine spending needed to adequately secure an organization's IT infrastructure correct Reason: Correct. PML calculations involve determining the greatest price a data breach might cost a company. Upon that calculation, cybersecurity analysts can determine the appropriate spending to prevent such a breach.

The goal of the NIST Cybersecurity Framework Protect (PR) function is to ______.

help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection

The need to keep sensitive data, information, and systems confidential ______.

is both a major goal and a requirement for cybersecurity correct Reason: Correct. Protecting confidential assets from being stolen and thus exposed to unauthorized people is both a major goal of cybersecurity and necessary for achieving other cybersecurity goals.

The cybersecurity risks known as Man-in-the-mobile (MitMo) are realized when ______.

malware infects smartphones and other mobile devices correct Reason: Correct. MitMo refers to security risks specific to mobile devices.

A computer virus is______.

malware that, when executed, adversely affects performance or damages programs

Adware specifically functions to ______.

present advertisements to users based on their browsing behaviors correct Reason: Correct. The purpose of adware is to collect users' browsing history and then display targeted ads to

A keylogger can be accurately described as ______.

technology that captures keyboard input on several types of devices to glean confidential information correct Reason: Correct. A keylogger is surveillance hardware or software that records keystrokes on computers, smartphones, and other devices.

A cybersecurity exploit is ______.

the means by which a hacker capitalizes on a cybersecurity vulnerability to gain access to and harm a system correct Reason: Correct. Examples of cybersecurity exploits include specially designed code, command sequences, and open-source exploit kits.

The Identify (ID) function of the NIST Cybersecurity Framework focuses on organizational______.

understanding of how to manage cybersecurity risks correct Reason: Correct. The Identify (ID) function aims to create an organizational awareness of associated risks in the context of their business and resources.

Establishing authentication procedures is a common cybersecurity goal because ______.

verifying that prospective users are authorized to access resources is the first step in keeping unauthorized users out correct Reason: Correct. An organization's systems, data, and other resources are protected by denying access to any user, process, or device that cannot be identified or that has not been specifically authorized.


Conjuntos de estudio relacionados

Chapter Four: Consolidated Financial Statements and Outside Ownership

View Set

Math Practice 5-5 Problem Solving: Writing to Explain

View Set

CYBR 3100 Final Exam Review (Chapter 6-12)

View Set

The Old Testament-Ancestors of Faith

View Set

Maternity chapter 21: Intrapartum Nursing Assessment

View Set

Tableau Interview Questions for Exam 1

View Set

Section 4: Unit 8: Ethical Conduct Requirements for Licencees Exam

View Set