MIS exam 4 practice

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A medical office employee sends emails to patients about their recent visit to a facility. What info would put the privacy of the patients at risk if included in email?

Patient records

An individual user profile on a social network site is an example of an online identity

True

With careful planning and consideration some risks can be completely eliminated

True

which of the following is an example of a secure password storage method

Using a password manager with strong encryption

Which of the following passwords would most likely take the longest for an attacker to guess or break?

mk$$cittykat104#

What describes a worm

Travels to new computers without any intervention or knowledge of the user, is self replicating.

What is the difference between a DoS attack, and a DDos attack

A DoS attack aims to deny service to legitimate users, while a DDos attack overwhelms the target with a flood or traffic.

Changes done to any program with the aim of updating, fixing or improving it is

A parch

What does the term "zero day vulnerability refer to?"

A software vulnerability that is unknown to the vendor and has no available patch.

Which of the following indicates how malware might be concealed

An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.

The CIA triad is

Confidentiality, integrity, avalibility

How can you prevent others from ease dropping on network traffic when operating a PC on public WiFi hotspot

Connect with a VPN service

Which of the statements correctly describes cybersecurity

Cybersecurity protects INDIVIDUALS, ORGANIZATIONS AND GOVERNMENT from digital attacks.

A data breach does not impact the reputation of an organization

False

Your neighbor tells you they don't have an online identity. They have no social media accounts and only use the internet to browse. Is your neighbor right?

False

Which of the following methods is used to check the integrity of the data?

Hashes or checksums

Strong passwords should follow which of the following rules?

Include special characters, use a mix of upper and lower case.

Why might internal security threats cause greater damage to an organization than external security threats?

Internal users have direct access to the infrastructure devices

Which of the following is an example of a phishing attack

Manipulating website URLs to redirect users to fake login pages

Why do IoT devices pose a greater security risk than other computing devices on a network

Most IoT devices do not receive frequent software updates

How do you keep your personal browsing history hidden from other users on a shared computer

Operate the web in a private browser mode

What type of attack uses brute force approach

Password cracking

Which of the following is a common method to prevent data loss?

Regular data backups

What is an example of two factor authentication

Smart card and PIN

What is the purpose of a firewall in a network?

To block unauthorized access to the network.

What is the purpose of a security incident response plan

To minimize the impact of security incidents and facilitate their recovery


Ensembles d'études connexes

neurochemistry & physiology of addiction

View Set

Nutrition Midterm (Possible Exam Questions) (Covers Modules 1-3)

View Set

4.9 - Functional Interfaces & Java Lambda Expressions

View Set

Chapter 14: The Family, the State, and Social Policy

View Set

Combo with E-Commerce and 2 others

View Set