CH12 Quiz - Methods of Securing Information
How does a Network Address Translation (NAT) type of firewall work?
It hides internal IP addresses.
What is the only way to guarantee that computers and networks are safe from cyberattacks?
Take them offline.
When should an organization answer the question "Is this the highest priority security risk?"
before data security strategies are created
What is the difference between a DDoS attack and a DoS attack?
A DoS is carried out with one source device and a DDoS attack is carried out with many source devices.
Which of the following are examples of spear phishing?
An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device.
A ________ deliberately modifies the normal operations of a computer or network through the use of malicious code.
cyberattack
A form of spyware that records all actions typed on a keyboard is called a keystroke
logger.
What type of firewall would filter messages coming from a specific, predefined IP address to a spam filter?
packet filter
Specialized hardware or software that capture packets transmitted over a network are called packet
sniffers.
What is the primary, underlying goal or purpose of state-sponsored cyberwarfare?
to protect or pursue national security interests