MIS 2113 Exam 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is not an INPUT for a computer?

printer

A GB is roughly...

1 billion bytes

A medical office employee sends emails to patients about their recents visits to the facility. What information would out the privacy of the patients at risk if it was included in the email?

Patient Records

Keylogger Is it People, Process, or Technology?

People

A spear-phishing attempt designed to steal personal information and sell it on the black market Indicate the proper People/Process/Technology and the corresponding CIA item.

People - Confidentiality

Confidentiality

Set of rules that limits access to information, Authentication and Authorization

What is an example of a secure password storage method?

Using a password manager with strong encryption

What is an example of a password that would take a long time for an attacker to guess or break?

mk$$cittykat104#

Which components of a computer are at its core and determine how 'good' it is?

CPU, Cache, RAM

What is the difference between a DoS and DDoS attack?

A DoS attack aims to deny service to legitimate users, while a DDoS attack overwhelms the target with a flood of traffic

A set of changes done to any program or application with the aim of updating, fixing or improving is often referred to as what?

A patch

What does the term "zero-day vulnerability" refer to?

A software vulnerability that is unknown to the vendor and has no available patch.

What is an example of how malware might be concealed?

An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.

Integrity

Assurance that information is trustworthy and accurate over the lifecycle of the data, data must not change in transit or altered by unauthorized people.

Reliable access to data (CIA?)

Availability

Limit access to data (CIA?)

Confidentiality

The CIA triad is comprised of which of the following items?

Confidentiality, Integrity, Availability

How can you prevent others from eavesdropping on network traffic when operating a PC on a public wifi hotspot?

Connect with a VPN service

What store files on your computer that enable companies to track your web viewing and target specific ads at you?

Cookies

To ensure you have a proper password, what rules should you follow?

Create a password 12-15 characters in length, keep it weird

Which of the statements correctly describes cybersecurity?

Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks.

Technology Example

Encryption/Backup

"A data breach does not impact the reputation of an organization" Is this statement true or false?

False

Availability

Guarantee of reliable access by authorized people, backups

Which of the following methods is used to check the integrity of data?

Hashes or checksums

Strong passwords should follow which rules?

Include special characters, Use a mix of uppercase and lowercase letters

What is the fastest and cheapest way to make your computer faster?

Increase RAM

Data is accurate (CIA?)

Integrity

Why might internal security threats cause greater damage to an organization than external security threats?

Internal users have direct access to the infrastructure devices

What characteristic describes a worm?

Travels to new computers without any intervention or knowledge of the user, is self-replicating.

What is an example of a phishing attack?

Manipulating website URLs to redirect users to fake login pages

Why do IoT devices pose a greater risk than other computing devices on a network?

Most IoT devices do not receive frequent software updates.

What is not an OUTPUT for a computer?

Mouse

How can you keep your personal browsing history hidden from other users on a shared computer?

Operate the web browser in private browser mode.

What is windows 10 n example of?

Operating system

What type of attack allows an attacker use a brute-force approach?

Password cracking

Software updates, encryption, backup, and redundancy are examples of:

Preventing attacks on technology

Password Policy Is it People, Process, or Technology?

Process

A policy requiring all data to be verified for accuracy Indicate the proper People/Process/Technology and the corresponding CIA item.

Process - Integrity

You are working on an Excel assignment. What will your computer use store the Excel file so that the CPU/processor can execute the operations you are requesting?

RAM

Which of the following is a common method to prevent data loss?

Regular data backups

Process Example

Rule indicating what websites and employee may view

Which of the following is an example of two-factor authentication?

Smart card and pin

People example

Spear Phishing Attempt

An attack targeted at an individual is:

Spear phishing attack

Zero Day Exploit Is it People, Process, or Technology?

Technology

A zero day exploit used to shut down a nuclear power plant Indicate the proper People/Process/Technology and the corresponding CIA item.

Technology - Availability

What is the purpose of a firewall network?

To block unauthorized access to the network

What is the purpose of a security incident response plan?

To minimize the impact of security incidents and facilitate their recovery.

"With careful planning and consideration, some risks can be completely eliminated" Is this statement true or false?

false

True or False: Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the internet is your neighbor right?

false

True or False: An individual user profile on a social network site is an example of an online identity.

true


Conjuntos de estudio relacionados

Microeconomics - midterm 3 multiple choice

View Set

GCSE psychology quiz on prejudice and discrimination

View Set

Understanding Economics Chapter 11 Questions

View Set

a level chemistry inorganic paper

View Set

Chapter 16: Control of Gene Expression

View Set