MIS Exam 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the significance of using a virtual private network (VPN) in a public wireless network, as mentioned in the article? a) A VPN allows you to access public Wi-Fi networks without any security concerns. b) A VPN encrypts your internet traffic, making it more secure when connected to unsecured public Wi-Fi. c) A VPN guarantees faster internet speed when using public Wi-Fi. d) A VPN helps public Wi-Fi networks recognize your device securely.

A VPN encrypts your internet traffic, making it more secure when connected to unsecured public Wi-Fi.

The article "Online Safety Basics" strongly suggests that all online users utilize Multi-factor Authentication. What is a multi-factor authenticator? - A system that detects when websites are being used by cybercriminals for sensitive information extraction. - A system that notifies users when a software update is needed. - A system that utilizes biometrics and security keys when you want to log onto a sensitive account. - A system that manages unique passwords through a manager application.

A system that utilizes biometrics and security keys when you want to log onto a sensitive account.

What age Demographic is most likely to fall victim of a phishing incident? Age group 10-20 2. Age group 30-40 3. Age group 40-50 4. Age group 50+

Age group 50+

What happens when someone's password manager gets compromised? - All the user's passwords are reset automatically. - All the user's passwords are leaked to the internet. - All the user's passwords are stolen very quickly at once. - All the user's passwords remain the same as beforehand.

All the user's passwords are stolen very quickly at once.

What is identified as the biggest risk when using a password manager? - Complexity in creating new passwords - Loss of login access to the password manager - An attacker gaining access to the device with the password manager - Security vulnerabilities in password managers

An attacker gaining access to the device with the password manager

What is a recommended security measure for copier,printer,fax devices according to the article? - Utilizing default passwords - Enabling two-factor authentication - Changing default passwords to strong passphrases - Avoiding encryption and overwriting

Changing default passwords to strong passphrases

How can employees, or users avoid Phishing scams? - Check senders email address for verifiable contact info. - Open data files that have only been sent by unauthorized users. - Don't be suspicious of links or download attachments. - Use a common password to secure your account

Check senders email address for verifiable contact info.

Which of the following statements regarding the use of personal devices for work purposes is NOT supported by the information provided? - 75% of employees find smartphones make them more productive at work. - Larger businesses typically use SIEM and MDR for cybersecurity. - Companies provide protection for personal devices. - Malware attacks on mobile devices have become more prevalent.

Companies provide protection for personal devices.

What is NOT a way in which a small business can protect their wifi? a. Turn off Bluetooth and WI-FI when when a device is not in use b. Have a WI-FI for customers and guests, and a separate one for business c. Physically secure the WI-FI equipment d. Connect to unknown WI-FI networks

Connect to unknown WI-FI networks

How can a computer virus impact your computer system? A) Increase system performance and speed up operations. B) Improve file organization and enhance data security. C) Corrupt or delete files, slow down system performance, and steal sensitive information. D) Enhance internet connectivity and provide additional features.

Corrupt or delete files, slow down system performance, and steal sensitive information.

What is the best thing an organization can do in order to tackle cybersecurity issues internally? - Pay an outside source to handle all of your cybersecurity issues and important data - Hire one person in your organization that will handle all things related to cybersecurity - Create company policies and procedures as well as requiring online safety education for all employees - Allow employees to use their own discretion when it comes to the organization's data

Create company policies and procedures as well as requiring online safety education for all employees

Select the answer choice that is NOT a misconception according to the article, "Common Cybersecurity Misconceptions Held By Small and Medium-Sized Organizations". - Cybersecurity requires a large financial investment. - Outsourcing work to a vendor will wash your hands of security liability in the case of a cyber incident. - Cybersecurity is not necessary for small and medium sized organizations. - My data (or the data I have access to) isn't valuable.

Cybersecurity is not necessary for small and medium sized organizations.

What should someone do when they suspect phishing or cyber crimes with a work/school email? Click the link attached 2. Delete and Report the email to IT 3. Click "Unsubscribe" from sender 4. Respond/Donate

Delete and Report the email to IT

How do you avoid Phishing on the internet? A. Don't click any link or open any email attachments send by an unverifiable sender B. Do not answer the phone for "Scam Likely" C. Enable the lock feature on all devicesUse a password manager

Don't click any link or open any email attachments send by an unverifiable sender

Which of the following is NOT a quick win for mobile devices? a. Update security software regularly b. Turn off discovery mode c. Download apps from an untrustworthy source d. Delete needed apps and update existing apps regularly

Download apps from an untrustworthy source

According to the article, what is something a job scammer might NOT do to steal from you? A) Ask you pay for unnecessary certifications B) Ask you to withdraw money from your bank account C) Paying for products to resell D) Having an in person interview

Having an in person interview

Which of the following is a step NOT recommended in the article for reducing cyber risk in small businesses? - Requiring passwords at least 12 characters with strong passwords that are complex. - Having a multi-factor authentication for important accounts. - Offering awareness and cybersecurity training to employees at least once a year. - Ignoring the need for cyber insurance due to its high price.

Ignoring the need for cyber insurance due to its high price.

What should you do if you paid a scammer? - Immediately contact the company you used to send the money, report the fraud, and ask to have the transaction reversed, if possible. - Count it as a loss and move on with your life. - Call the police. - Contact the scammer and ask them for your money back.

Immediately contact the company you used to send the money, report the fraud, and ask to have the transaction reversed, if possible.

Which of the following is NOT a way/method that adds an extra layer of security for your password? A) Multi-Factor Authentication B) Keeping the same universal password so it's easier to remember C) Two-Factor Authentication D) Using a password generator website to create random strong passwords

Keeping the same universal password so it's easier to remember

What option below is NOT recommended to keep your work safe according to the article "Stay Secure While You Work From Home"? - Have unique and long passwords, preventing easily accessible information. - Keeping your computer open in the office while away from it. - Not connecting to public wifis on work devices. - Not using work devices from home.

Keeping your computer open in the office while away from it.

How can one prevent a computer virus? A) Use public wifi whenever you need it B) Turn off automatic updates for your hardware, software, and apps. C) Streaming free movies off the internet D) Learn how to identify phishing

Learn how to identify phishing

Which of the following is a Quick Win for social network security based on the article? - Using identical passphrases across different accounts - Allowing unrestricted administrative access - Avoiding two-factor authentication - Limiting access and configuring privacy settings

Limiting access and configuring privacy settings

What is one misconception held by small and medium sized organizations and how can you "take action" on this misconception? - Cybersecurity requires a large financial investment. Take Action: Exercise the importance of cybersecurity to your employees so that they understand the investment is crucial. - My data (or the date I have access to) isn't valuable. Take Action: Assess the data you create, collect, store, access, transmit and then classify that data by its level of sensitivity so you can take appropriate steps to protect it. - Cyber breaches are covered by general liability insurance. Take Action: When considering your threat landscape, it is important not to overlook potential cybersecurity incidents that can come from within the organization and develop strategies to minimize those threats.

My data (or the date I have access to) isn't valuable. Take Action: Assess the data you create, collect, store, access, transmit and then classify that data by its level of sensitivity so you can take appropriate steps to protect it.

What is responsible for the greatest threat towards cyber security in a business? - New Technology is the greatest threat to cyber security - People impose the greatest threat to cyber security - Simple Passwords cause the greatest threat to cyber security - E-mail scams are the greatest threat to cyber security.

People are the greatest threat to cyber security.

Which of the following is NOT a recommended step to protect your informations that's discussed in the article? A) Post all your passwords to social media so you won't forget them B) Don't take the phishing bait C) Stay Informed D) Stop reusing passwords

Post all your passwords to social media so you won't forget them

What is the significance of public networks and hotspots, according to the article "Online Basics" - Public networks provide extra security and safety. - Public networks and hotspots are usually free and easy to access, making them safe options. - Public networks and hotspots can provide extra security in certain areas. - Public networks and hotspots mean that anyone is able to see what you are doing on your laptop or smartphone while you are connected to the networks

Public networks and hotspots mean that anyone is able to see what you are doing on your laptop or smartphone while you are connected to the networks

What is the first thing you should do when you suspect that your computer has a virus? - Delete all temporary files on the computer. - Ignore it. The virus will go away on its own eventually. - Using antivirus software, run a full-system scan on the computer. - Reinstall the computer's operating system with the help of a professional.

Reinstall the computer's operating system with the help of a professional.

According to the "Share with Care: Staying Safe on Social Media" article, how can you protect yourself from phishing attempts on social media? a. Click on suspicious links to investigate the site b. Report all messages from unknown sender c. Assume any suspicious message is phishing and delete it d. Share suspicious messages with friends for advice

Report all messages from unknown sender

What is NOT a way scammers try to get you interested? - Saying that you can be your own boss. - Saying that you can pay off your house by buying this program. - Saying that you can start your own business. - Saying that you can set your own schedule.

Saying that you can pay off your house by buying this program.

What is one of the primary advantages of using a password manager? - Simulating multi-factor authentication (MFA) - Making it easier to guess passwords - Creating identical passwords for all sites and services - Compatibility with all devices

Simulating multi-factor authentication

According to the article, what is one of the primary advantages of using a password manager? - Simulating multi-factor authentication (MFA) - Making it easier to guess passwords - Creating identical passwords for all sites and services - Compatibility with all devices

Simulating multi-factor authentication (MFA)

Which of the following is NOT a step in protecting your home's cyber security? - Multi Factor Authentication - Sticky Note Method - 12 Character Password - Limiting the number of Authorized Users

Sticky Note Method

Which of the following is NOT a characteristic of password managers? - They are a perfectly random set of 12-characters or longer. - They include one piece of personal information. - They cannot be guessed at or hash cracked by any known method. - They can be different for every website and service.

They include one piece of personal information.

What is the primary advantage of using a password manager for online security? a) To store passwords in an easily accessible document b) To create and manage strong, unique passwords for different accounts c) To share passwords securely with friends and family d) To encrypt your entire device's data

To create and manage strong, unique passwords for different accounts

What is the purpose of Microsoft's Cybersecurity Awareness Month? A. To reset everyone's devices B. To help security professionals educate their employees on protecting their identity and devices C. For employers to hire more people who specialize in cybersecurity D. To help people understand how to work their devices and discover features that aren'tconventional

To help security professionals educate their employees on protecting their identity and devices

What is the purpose of using a Virtual Private Network (VPN) or a personal hotspot while on the go based on the "Travel Tips" article? a. To make public Wi-Fi networks more convenient to use b. To protect your personal information when using public Wi-Fi c. To share your location securely with friend and family d. To access your email and banking accounts more easily

To protect your personal information when using public Wi-Fi

What precautions should you take when using a personal mobile device when going from work to home networks? - Using a number passcode - Use strong passwords and using antivirus software on your device - Relying on the company's cybersecurity systems for protection. - Don't use public networks

Use strong passwords and using antivirus software on your device

Which of these statements are NOT one of the four basic cybersecurity behaviors to have for avoiding computer viruses? - Turn on multi-factor authentication for all accounts. - Be able to recognize phishing when it happens. - Keep automatic updates on for all hardware, software, and apps. - Use the same simple password for all accounts on your computer.

Use the same simple password for all accounts on your computer.

According to the "Stay Secure While You Work From Home" article, what option is NOT listed to keep your logins safe? - Using an 8-character password. - Using a 12-character password. - Making your password unique, and not easy to guess. - Using a one-time access code when offered.

Using an 8-character password

Why is it important to require employees to undergo cybersecurity training rather than just letting another outside source control company data? - Using an outside company/organization to manage data does not always erase liability in the case of a security breach - It is too expensive to pay for an outside cybersecurity company - Real cybersecurity companies do not exist - You do not want to give anyone outside of the organization any sensitive information or data

Using an outside company/organization to manage data does not always erase liability in the case of a security breach

According to the article, how can individuals avoid falling victims to job scams? A) Pay any requested fees to secure a job. B) Never report job scams to authorities. C) Verify the company or person's reputation online. D) Deposit checks received from potential employers.

Verify the company or person's reputation online.

What are the negatives of working from home? - Keeping safe and staying away from Covid-19 and other illnesses. - Working from home causes bad habits and personal devices do not have as many security measures as the ones at a business, causing people to download bad software and/or apps. - Productivity and morale are increased when working from home. Dressing however you desire.

Working from home causes bad habits and personal devices do not have as many security measures as the ones at a business, causing people to download bad software and/or apps.

Can malware attacks happen on your mobile device? - Yes, malware attacks on mobile devices rose by 15% - No, malware attacks dropped by 15% - Yes, malware attacks on mobile devices can happen but rarely - No, malware attacks never happen on mobile devices

Yes, malware attacks on mobile devices rose by 15%


Kaugnay na mga set ng pag-aaral

Bullying and Violence in the Workplace

View Set

Unit 5 (chapter 21) History of Graphic Design

View Set

Pharmacology Test 4 chapters 13, 26, 28, 29

View Set