MIS exam 4 practice
A medical office employee sends emails to patients about their recent visit to a facility. What info would put the privacy of the patients at risk if included in email?
Patient records
An individual user profile on a social network site is an example of an online identity
True
With careful planning and consideration some risks can be completely eliminated
True
which of the following is an example of a secure password storage method
Using a password manager with strong encryption
Which of the following passwords would most likely take the longest for an attacker to guess or break?
mk$$cittykat104#
What describes a worm
Travels to new computers without any intervention or knowledge of the user, is self replicating.
What is the difference between a DoS attack, and a DDos attack
A DoS attack aims to deny service to legitimate users, while a DDos attack overwhelms the target with a flood or traffic.
Changes done to any program with the aim of updating, fixing or improving it is
A parch
What does the term "zero day vulnerability refer to?"
A software vulnerability that is unknown to the vendor and has no available patch.
Which of the following indicates how malware might be concealed
An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.
The CIA triad is
Confidentiality, integrity, avalibility
How can you prevent others from ease dropping on network traffic when operating a PC on public WiFi hotspot
Connect with a VPN service
Which of the statements correctly describes cybersecurity
Cybersecurity protects INDIVIDUALS, ORGANIZATIONS AND GOVERNMENT from digital attacks.
A data breach does not impact the reputation of an organization
False
Your neighbor tells you they don't have an online identity. They have no social media accounts and only use the internet to browse. Is your neighbor right?
False
Which of the following methods is used to check the integrity of the data?
Hashes or checksums
Strong passwords should follow which of the following rules?
Include special characters, use a mix of upper and lower case.
Why might internal security threats cause greater damage to an organization than external security threats?
Internal users have direct access to the infrastructure devices
Which of the following is an example of a phishing attack
Manipulating website URLs to redirect users to fake login pages
Why do IoT devices pose a greater security risk than other computing devices on a network
Most IoT devices do not receive frequent software updates
How do you keep your personal browsing history hidden from other users on a shared computer
Operate the web in a private browser mode
What type of attack uses brute force approach
Password cracking
Which of the following is a common method to prevent data loss?
Regular data backups
What is an example of two factor authentication
Smart card and PIN
What is the purpose of a firewall in a network?
To block unauthorized access to the network.
What is the purpose of a security incident response plan
To minimize the impact of security incidents and facilitate their recovery