MOAT :(

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following statements about safe and appropriate e-mail usage is FALSE:

: B. E-mail users should always Reply to SPAM and request to be removed from their mailing list

Which of the following statements about Social Engineering is FALSE:

: C. Social Engineering is only done by phone or e-mail, never in person.

Which of the following is NOT a best practice to prevent being visually hacked?

B. Ask people to not look at your screen.

How many states have at least one information privacy and security regulation in place?

C. 48

In regards to Internet risks, which of the following BEST describes the term 'Bot':

C. A situation where a PC becomes a "robot" that can be controlled by software someone else (usually cybercriminals, hackers or Spammers) placed on the PC.

Physical security controls may include all of the following, except:

C. Allowing unknown or unauthorized individuals to piggy-back with authorized personnel walking into your facility.

To proactively prevent electronic funds transfer and online fraud, best practices include all of the following, except:

C. Always keep PC on and connected to ensure Internet access

What is dumpster diving?

C. An information stealing technique that involves searching through an organization's (or an individual's) trash and looking for sensitive and valuable information

Successful ways identity thieves can steal your identity include all of the following, except:

C. Arm Boarding

When searching and browsing the Internet, best practices you should always follow include all of the following, except:

C. Clicking on unfamiliar links to find out what they really are

When using a copy machine to copy sensitive data, all of the following are best practices, except:

C. It is ok to leave a copy machine unattended while copying sensitive information if you will be gone less than 5 minutes

Best practices for preventing SPAM-related problems include all of the following, except:

C. Never report SPAM to your IT staff or Internet Service Provider (ISP) as they have more important issues to handle.

Which of the following statements about the BankBot is NOT true:

C. One only needs to worry about BankBot if they work in the banking industry

Companies are now paying about how much, on average, per compromised record from a data breach?

D. $200+

Most viruses depend on:

D. All of the above

Best practices when traveling with a mobile device include all of the following, except:

D. Always connect to free unsecure Wi-Fi hotspots when possible

Before sending any e-mail or other electronic message, you should do all of the following, except:

D. Consider BCC-ing everyone on your contact list, so everyone gets your e-mail.

When you are disposing of sensitive paper-based information, it is best to:

D. Cross-cut shred documents before throwing them away or recycling

Identity theft involves the unlawful acquisition and use of someone's personal identifiable information (PII), which can include all of the following, except:

D. Eye Color

What should you do if you receive a new/unexpected e-mail appearing to be from your credit card company?

D. Look on the back of your card for your credit card issuer's 800 number and call to confirm whether the e-mail is legitimate or not

Which of the following is not an example of crimeware:

D. Picjacking - an attacker hacks a website and replaces all the photos on the websites with new ones that are confusing with the websites content.

Which of the following definitions about Cyber-attacks is FALSE:

D. Smishing: Type of phishing attack using snail-mail and requires the victim to send back their personal information on a fake form.

Which of the following statements about Spyware is NOT true:

D. Spyware is very obvious to detect once it has been placed on a PC/mobile device

Which of the following is not likely going to result in a data breach:

D. Understanding and actively complying with adequate information security/privacy policies and procedures

Some of the risks involved with file-sharing include all of the following, except:

D. You can't be held liable nor prosecuted if pirated software, copyrighted material or pornography is downloaded, shared or stored on your PC

Characteristics of a Strong Password include all of the following, except:

E. A word or words found in a dictionary (any language)

To ensure a safer Internet experience, you should be aware of and apply the following best practices:

E. All of the above

Which of the following is or may be a consequence of a security breach:

E. All of the above

When participating on social networking sites you should always follow each of these risk mitigation tips, except:

E. Believe everything you read or view online is always true and factual

When is it a good idea to have your browser, program or application 'save' your passwords:

E. It is never a good idea to save a password

Sensitive information should be:

E. all of the above

Which of the following is NOT considered erratic and unusual computer program behavior

F. All of the above are considered erratic and unusual computer program behavior

Which of the following is not one of the top ten scams shared by the BBB in 2017?

F. All of the above are real top ten scams used by criminals in 2017

Which of the following has never been hacked:

F. All of the above can and have been hacked

Which of the following definitions about e-mail options is correct:

F. Both C and D are correct

If you notice any suspicious events or activities involving your e-mail or other Internet account, you should consider doing all of the following steps, except:

F. Keep quiet about the incident and do not inform your contacts that your account has been compromised - no need to worry them or alert them

As you browse the Internet, "cookie crumbs" of information about your Internet activities and information about you and your PC can potentially be collected and stored, including all of the following except:

F. Pictures stored on your computer's hard drive

Which of the following incidents should be reported to your organization's IT and/or Security team:

G. All of the above incidents should be reported to your organization's IT and/or security team.

Which of the following can be 'too much information' to share on social media?

G. All of the above may be too much information to be shared on Social Media.

If you encounter an unfamiliar pop-up message warning you of a virus or error on your PC, you should:

G. Both C and D are correct

Suspicious e-mails that you suspect may be phishing should be reported to your IT staff immediately.

True


Ensembles d'études connexes

Unit 5: Heredity, Meiosis, and Genetics Pt. 2

View Set

Check Your Understanding Assignment 3

View Set

BUS 204 Ch. 16 Employment Discrimination

View Set

Molecular Biology Ch 8-13 (Fall 2021- Petrik)

View Set

Evolve: Fundamentals Basics of Nursing Practice

View Set

OB 1 Practice Exam Questions (Saunders)

View Set

MH-Chapter 27: Community Mental Health Nursing

View Set

2017 National Electrical Code Article 210 Branch Circuits.

View Set