Methods of Securing Information Exercise

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

describe computer viruses

- a software - can take over an operating system -destroy a computer's programs

which of the following is an example of spear phishing

- an email is sent to employees at a specific company instructed them to click on a link that deploys malware to their device

How do managers use personal computers for their business needs?

- communicating via email - creating and using databases and spreadsheets

The acronym DDoS stands for

- distributed denial of service

tips to avoid falling victim to a social engineering attack

- make sure to research the facts constrained in an email message - slow down and think about the scenario - be mindful of web searches to make sure you are landing on legitimate sites

what is the purpose of social engineering in conjunction with ransomware

- tricks victims into allowing access to data

examples of cybercrimes

- trojan horse viruses - computer hacking - digital identity theft

_______ deliberately modifies the normal operations of a computer or network through the use of malicious code

cyberattack

"white-hat testing" refers to paying hackers to hack into one's own private networks and applications

false

how does a firewall work?

it determines what internet traffic can leave or enter a network or computer

what is a characteristic shared by all devices that can be infected by a computer virus

they are connected to the internet

someone commits a cyberattack when they intentionally use malicious code to modify the normal operations of a computer or network via the internet

true


Ensembles d'études connexes

Sociology of the Family Chapter 3

View Set

112, Lean Six Sigma Green Belt, Six Sigma SJC, USAF GREENBELT, Lean Six Sigma Green Belt

View Set

Accounting Unit One Managerial Accounting

View Set

Chapter 4 - Activity - Based Costing

View Set