Cybersecurity BCOR

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?

43 percent

According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct

A corporation backs up all of its data to a cloud server every night An organization has a formal policy for alerting the IT department when employees leave the company

Explain how the trojan "EventBot" works. More than one answer may be correct.

Aimed at Android devices Steals financial information Reads and intercepts SMS messages

Which of the following threats to cybersecurity come from internal sources?

An accidental erasure of data An attack by an authorized user The leakage of sensitive information

n a DDoS attack, network computers that have been infected by a virus from more than one source computer act as zombies and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for

Distributed Denial of Service

From the following list, select all the possible warning signs of social engineering attacks

Emails or texts containing links to more info or a free download Emails or web pages that request personal information in exchange for a free offer Strange emails from known, trusted personal contacts or organizations

Describe the goals of the respond (RS) function of the NIST Cybersecurity Framework. More than one answer may be correct.

Establish procedures that enable action in the event of a cybersecurity incident Be able to quickly analyze a detected cybersecurity issue Be prepared to swiftly mitigate harm caused by a cybersecurity event

A man-in-the-mobile and a man-in-the-middle attack have what similar qualities? More than one answer may be correct.

Harvesting personal information is the goal of each cyber intrusion The user may not know the malware has infected the device

How does a Network Address Translation (NAT) type of firewall work?

It hides internal IP addresses

Describe trojan malware.

It is often found attached to free downloads and apps It is often used to find passwords, destroy data, or to bypass firewalls It is like a virus but does not replicate itself

Which of the following statements describes a keylogger most accurately?

It is surveillance malware that captures confidential information through keyboard input

Which of these statements about packet sniffers are true? More than one answer may be correct.

Legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal information

Man-in-the-mobile (MitMo) occurs when

Malware infects smartphones and other mobile devices

From the following list, select all the primary components of cybersecurity threat mitigation.

Policies and procedures for threat prevention Tools for threat identification Policies, tools, and strategies for threat "curing" or minimization

Which of the National Institute of Standards Technology (NIST) Cybersecurity Framework functions entails an analysis of cybersecurity risk and reduction of potential damage to IT infrastructures?

Protect (PR) function

Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.

The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks

Which of the following statements explains why a rootkit poses a cybersecurity threat? More than one answer may be correct.

The invader has the same access as the host, the comp's owner or user A rootkit bypasses security functions because it is installed on the operating system

How does spyware potentially harm the individual user?

This malware steals confidential information from the user

What is the purpose of social engineering in conjunction with ransomware?

Tricks victims into allowing access to data

What does the General Data Protection Regulation (GDPR) regulate?

how companies protect personal data

An email that appears to be from a legitimate company is most likely to be a social engineering cybersecurity attack if

it contains a link to a free offer that seems too good to be true

The security firewall serving Vantage's email program catches an impressive number of both irrelevant and illegitimate messages, to the point where employees usually do not even see them. Occasionally, however, an unsolicited message will catch managing partner Carl's eye. Because one new message looks to come from a potential new client, he's interested but careful, aware that the boutique consulting firm has a very targeted marketing system and clients usually do not appear out of thin air. What type of security concern is causing Carl's suspicion?

phishing

From the following list, select the techniques and tools that are used by both white-hat hackers and illegitimate hackers.

rootkits social engineering back door programs

According to the identify (ID) function of the NIST Cybersecurity Framework, what allows an organization to prioritize its efforts where cybersecurity risk is involved?

understanding of its business environment and resources

Ransomware is typically introduced into a network by a ________ and to an individual computer by a Trojan horse.

worm

Which of the following would be included in a risk assessment executive summary that was prepared to help executives make informed decisions about security? More than one answer may be correct.

If a cyberattack were able to breach our security, the medical information and social security numbers of all the patients would be available. Because our organization has multiple government contracts, we need to worry about threats from other countries' governments who seek to fain sensitive information regarding the U.S government All employees are required to go through biannual cybersecurity training. Additional training is required when new threats that could affect our organization become known.

From the following list, select all of the ways in which cybersecurity helps preserve the integrity of data, information, and systems.

Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes

Why are probable loss calculations important?

Organizations have limited funds to use toward system protections.

A university's network was severely compromised by a systemwide attack that made accessing records impossible. All files were encrypted and the tech team didn't have the key. Administrators received what was essentially a ransom note: the network would be restored after they paid a million dollars to an unknown actor. Which factors most strongly influenced university administrators' decision whether or not to comply? More than one answer may be correct.

Whether the university's tech support team could decrypt the files themselves Whether law enforcement could be identified and force the bad actor to decrypt the files


Kaugnay na mga set ng pag-aaral

course point chapter 14 preoperative nursing management

View Set

COMM 3610 COMM, Tech, and Society Discussion "Key" Questions and Terms

View Set

NU310 (prepU: arrhythmias and conduction problems)

View Set