MIS Exam 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

An individual user profile on a social network site is an example of an online identity.

True

Which of the following is an example of a secure password storage method?

Using a password manager with strong encryption

The CIA triad is comprised of which of the following items?

All of the answers

What is the difference between a DoS and DDoS attack?

A DoS attack aims to deny service to legitimate users, while a DDoS attack overwhelms the target with a flood of traffic

A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what?

A patch

What does the term "zero-day vulnerability" refer to?

A software vulnerability that is unknown to the vendor and has no available patch

Which of the following examples illustrates how malware might be concealed?

An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware

Module two

Analyzing and visualizing data

Module 3

Automating data operations

How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?

Connect with a VPN service

Which of the statements correctly describes cybersecurity?

Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks

Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?

False

Which of the following methods is used to check the integrity of data?

Hashes or checksums

Strong passwords should follow which of the following rules?

Include special characters (e.g., @, #, $) and Use a mix of uppercase and lowercase letters

Why might internal security threats cause greater damage to an organization than external security threats?

Internal users have direct access to the infrastructure devices

Which of the following characteristics describe a worm?

Is self-replicating and Travels to new computers without any intervention or knowledge of the user

Which of the following is an example of a phishing attack?

Manipulating website URLs to redirect users to fake login pages

Why do IoT devices pose a greater security risk than other computing devices on a network?

Most IoT devices do not receive frequent software updates

How can you keep your personal browsing history hidden from other users on a shared computer?

Operate the web browser in private browser mode

What type of attack allows an attacker to use a brute-force approach?

Password Cracking

A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?

Patient Records

Module 4

Protecting data

Which of the following is a common method to prevent data loss

Regular data backups

Which of the following is an example of two-factor authentication?

Smart card and PIN

Module one

Storing and retrieving data

What is the purpose of a firewall in a network?

To block unauthorized access to the network

What is the purpose of a security incident response plan?

To minimize the impact of security incidents and facilitate their recovery


Ensembles d'études connexes

Chapter 8 Communications and Networks

View Set

Quiz 3 Prokaryotic and Eukaryotic Cells

View Set

Physics Final Review Chapter 1-7

View Set