SB Methods of Securing Information CBIS

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called ______

cyberattack

Keystroke loggers are used to

record keystrokes. (they aren't used for ransomware attacks)

Rootkits are typically used to allow hackers to do which of the following?

• Remotely control the operations of a computer. • Create a backdoor into a computer

Used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network ___ Translation provides a type of firewall protection by hiding internal IP addresses.

Access

True or False: Computer viruses are not frequently disguised as attachments of funny images, greeting cards, or audio and video files.

False

According to National Institute for Standards _________ , once a cybersecurity risk assessment has been conducted and the various questions in the risk assessment have been answered, an organization will be able to decide what to protect.

Technology

There are multiple ways ransomware attacks can be launched. Which of the following are methods a ransomware attack can be launched?

Trojan Horse Phishing

Put the steps for how a virus infects a digital device in the correct order.

1. The virus arrives via email attachment, file download, or by visiting a website that has been infected 2. An action such as running or opening a file activates the virus 3. The infection spreads to other computers via infected email, files, or contact with infected web sites 4. The payload or the component of a virus that executes the malicious activity hits the computer and other infected devices

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _____ attack.

DoS A distributed denial-of-service (DoS) attack takes place when a hacker gains unauthorized access and control of a network of computers that are connected to the Internet.

The technology that provides a type of firewall protection by hiding internal IP addresses is called _____.

Network Address Translation (NAT) is used to protect data. -It was developed by Cisco and is used by firewalls, routers, and computers that are part of a network and are connected to the Internet.

Cyberattacks that originate and are executed by foreign governments is called state-sponsored _________ . These attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack.

cyberwarfare

DDoS attacks are designed to

disrupt network activity

Select the true statements about white hat hackers.

• Breach and attack simulation technologies are used to automate hacking and threat/infiltration analysis. • The goal of white hat hackers is to find gaps in network security and to test security defenses. • Use the same techniques and tools that are used by illegitimate hackers.

Select what's true about spear phishing attacks.

• Spear phishing is a type of email scam that is directed toward a specific person or organization. • Spear phishing attacks are designed to steal data and some attacks may also be designed to install malicious software on a device.

There are multiple ways ransomware attacks can be launched. Which of the following are methods a ransomware attack can be launched?

• Trojan Horse • Phishing


Ensembles d'études connexes

Ch. 28: Growth and Development of the School-Age Child

View Set

Chapter 2: Basic Principles of Drug Action and Drug Interactions

View Set

MGMT 159: Ch. 6 Entrepreneurship & Starting a Small Business

View Set

Mental Health Exam 1 Prep-U Ch's 2, 5, 6, 7, 8, 10, 13, 14, 15, 16, 17, 18, 20, 24

View Set

Antibiotic Routes of Administration Available

View Set

Employment and Disability Final Exam

View Set

Topic: TBI/Brain Death/Organ Donation (Ch. 56, 9, & 46) (Unit 4)

View Set