eadfe adf ae

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The purpose of spyware is to ______.

capture the user's account data, passwords, key strokes, and more

Ransomware basically holds a target hostage because it ___ .

encrypts the victim's data

Which of the following are considered cybersecurity breaches?

Distributed Denial of Service (DDOS) Viruses Spyware Impersonation

Why is preserving the integrity of data, information, and systems an important cybersecurity goal?

If the consistency, accuracy, or dependability of these assets has been compromised, they lose their usefulness and value.

From the following list, select all the examples of internal threats to cybersecurity.

The leakage of sensitive information An attack by an authorized user An accidental erasure of data

The essential function of malicious bots is to ______.

control an individual computer by self-replicating and connecting to a central server

Which of the following surveillance technologies relies on how data are entered into a system?

keyloggers

Adware specifically functions to ______.

present advertisements to users based on their browsing behaviors

The cybersecurity term "social engineering" is best defined as ______.

the act of manipulating or tricking people into sharing their confidential, personal information

Establishing authentication procedures is a common cybersecurity goal because ______.

verifying that prospective users are authorized to access resources is the first step in keeping unauthorized users out

What is the correct definition of a cybersecurity exploit?

A tool or technique for taking advantage of a cybersecurity vulnerability to break into a system and cause harm.

From the following list, select all the examples of internal threats to cybersecurity.

An accidental erasure of data An attack by an authorized user The leakage of sensitive information

Select all options that describe the goals of the Respond (RS) function of the NIST Cybersecurity Framework.

Be able to quickly analyze a detected cybersecurity issue Be prepared to swiftly mitigate harm caused by a cybersecurity event Establish procedures that enable action in the event of a cybersecurity incident

The five categories of the Respond (RS) function of the NIST Cybersecurity Framework include planning, analysis, and mitigation. From the list below, select the remaining two categories.

Communication Improvements to cybersecurity response plans

How does cybersecurity help preserve the integrity of data, information, and systems? More than one answer may be correct.

Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity. Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. Cybersecurity threat mitigation includes measures to protect the consistency, accuracy, and dependability of these assets.

______ are cybersecurity breaches that make a computer or online service unavailable to its users.

DDOS attacks

Which of the following statements accurately describes spyware? More than one answer may be correct.

Downloading software or documents from unvetted sources is one way spyware can be installed. Spyware captures private information by monitoring how users interact online.

Your grandfather learns that his identity has been stolen, and you suspect that social engineering attacks are responsible. To help him protect his personal information, you tell him how to recognize the most common attacks. From the following list, select all the possible warning signs.

E-mails or web pages that ask him to provide personal information to enter a contest or receive a free offer. E-mails or texts that ask him to click a given link for more information or a free download. Strange e-mails from his friends, family members, or seemingly trustworthy organizations.

From the following list, select all types of events and conditions that are considered cybersecurity threats.

Intentional events Misuse or abuse of IT assets Errors, weaknesses, or defects in IT assets Failure of IT assets Unintentional, accidental, and incidental events

A movie streaming company is offering an online deal on HD movies to new customers who live in a certain country. How can authentication help the company protect its assets and resources from fraudulent use of the deal? More than one answer may be correct.

It can verify that the customer is new to the company or service. It can grant the customer access to the appropriate movies. It can verify that the customer lives in the correct country

Which of the following statements refer to programs known as spiders, web crawlers, and bots? More than one answer may be correct.

Malicious bots create security risks by compromising a user's control of the computer. "Good bots" have diverse functions and do not pose security risks. Internet robots are used for both legitimate and malicious purposes.

For a cybersecurity plan to succeed, which of the following must remain confidential? Select all correct answer options.

Private or sensitive data and information The organization's digital or computer systems The logins and passwords of authorized users

Which of these threats to cybersecurity can only come from an external source?

Ransomware

Which of these defining components mitigate cybersecurity threats? Select all the correct options.

Security tools and oversight used to identify security threats. Policies, tools, and strategies used to reduce damage from threats. Policies and procedures used to protect systems and data.

Which of the following browsing situations may reveal that adware is at work? More than one answer may be correct.

Shortly after you buy and download a writing enhancement program, you begin seeing ads for special keyboards, styluses, and other assistive technology. You have been looking for a new winter coat, and three out of five ads popping up on your browser currently show the type of coat you have been considering. In searching the term database management, the first item you see in the results list is an ad for a particular online database.

Which of the following are considered cybersecurity breaches? More than one option may be correct.

Spyware Viruses Distributed Denial of Service (DDOS) Impersonation

Which of the following statements accurately describes spyware? More than one answer may be correct.

Spyware captures private information by monitoring how users interact online. Downloading software or documents from unvetted sources is one way spyware can be installed.

What do many social engineering attacks have in common?

They are conducted via e-mails that offer a reward in exchange for clicking a given link.

From the following list, select all types of cybersecurity vulnerabilities.

Weaknesses or flaws in a system's security design Weaknesses in system security procedures Security weaknesses in an operating system or application software Weaknesses or flaws in system security control Weaknesses or flaws in system security implementation

Suppose an organization's system is vulnerable to losing information because its automated backup of data is insufficient or substandard. This type of cybersecurity vulnerability is ______.

a weakness in application software

The main characteristics that define cybersecurity threats are ______.

events that can lead to IT asset loss, conditions that can lead to IT asset loss, and the consequences of such loss

The term "cybersecurity threat mitigation" refers to all of the policies, procedures, and tools used to ______.

guard against threats such as security incidents, data breaches, and unauthorized network access, and reduce any harm they cause

The need to keep sensitive data, information, and systems confidential ______.

is both a major goal and a requirement for cybersecurity

A cybersecurity exploit is ______.

the means by which a hacker capitalizes on a cybersecurity vulnerability to gain access to and harm a system

In cybersecurity, the term "social engineering" refers to ______.

the unlawful manipulation of people in order to obtain and misuse their personal information


Ensembles d'études connexes

CHAPTER 25 International Law and Global Commerce

View Set

Psychological research and scientific method - A2 Psychology

View Set

social - Key question, how can knowledge of social psychology be used to reduce prejudice in situations such as crowd behaviour and rioting?

View Set

Complex Numbers in Polar Form - Products, Quotients, and Converting

View Set