Chapter 4 Study Guide
Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised.
50; do
The most current form of ransomware demands payment in the form of _________.
Bitcoins
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.
Cyberterrorism
Hackers would use a botnet to perform a _________.
DDoS
A(n) _________ is located between two firewalls.
DMZ
_________ is an access control.
Encryption
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.
Espionage
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
Increasing skills necessary to be a computer hacker
_________ collects personal information about users without their consent.
Spyware
A URL that begins with https uses _________.
TLS
_________ is a remote attack requiring user action.
Virus
You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake.
a human error; unintentional
Which of the following was NOT used in the cyberattack on Ukraine?
a logic bomb
Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs.
around
A _________ site is the least expensive option.
cold
Typing in your password to access a system is an example of something the user _________.
knows
A _________ is an intellectual work that is not based on public information.
trade secret
If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.
transference
A _________ site typically does not include the actual application the company needs to get the business back up and running immediately.
warm