Securing Information Assignment

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?

43%

Which of the following statements about computer viruses are true?

A computer virus is software that infects computers and is created using computer code. Viruses can destroy programs or alter the operations of a computer or network.

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called

Ransomware

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called

cybercrime

Cyberattacks that originate and are executed by foreign governments is called state-sponsored . These attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack.

cyberwarfare

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a

firewall

Select the reasons a government may choose to get involved in state-sponsored cyberwarfare.

Cyberwarfare can cause widespread damage to IT infrastructure.- Cyberwarfare is relatively inexpensive when compared to traditional warfare.- Cyberwarfare is often difficult to trace and identify.

Malware is designed to do which of the following?

Destroy data Incapacitate networks and computers Steal information

Sharing infected files and opening an infected email attachment are ways that a computer

virus

Computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called _ -hat hackers

white

White hat hackers use the same techniques and tools that are used by illegitimate hackers. These tools include which of the following?

Back door programs Rootkits Social engineering

Which of the following are true of backup data?

Backups are performed on a regular schedule as determined by the practice. It can be used to restore lost or destroyed data. Copies of backup data should be stored at a location other than the office.

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Black Hat

Select the true statements about ransomware attacks.

Ransomware is malware that makes a computer's data inaccessible until a ransom is paid. One of the most popular methods used in ransomware attacks is through phishing. Ransomware attacks invade computers via Trojan Horse viruses, worms, or by a user opening a legitimate looking email.

Which of the following are considered cybercrimes?

Trojan horse viruses Computer hacking Digital identity theft

According to the National Institute of Standards Technology (NIST), cybersecurity personnel can take steps to ensure data and systems are protected. The first thing an organization should conduct is a cybersecurity risk assessment. The cybersecurity risk assessment is concerned with answering which of the following questions?

What are our organization's most important information technology assets? What are the internal and external vulnerabilities? What are the relevant threats and the threat sources to our organization?

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is

cyberattack

A deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

Businesses need to take steps to protect computer systems, data, and information from disasters.

natural

Malware is short for malicious software and is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user. Common types of malware include

Trojans Viruses Worms

Select what's true about how a Trojan infects a computer system.

Trojans are designed using some sort of social engineering tactic. Hackers use Trojans to create a backdoor into a user's system which allows them to spy on the computer's activities. Trojans are commonly used by hackers to gain access to systems and devices.

The NIST states that cybersecurity risk assessments are essential for determining which data should be protected. NIST stands for National Institute of ___ and Technology.

Standards

Select the true statements about keystroke loggers.

Can be hardware devices and software applications Software based keystroke loggers are often a Trojan that is installed without the user's knowledge Keystroke loggers can record passwords and confidential information

According to the Federal Emergency Management Agency (FEMA), which of the following are steps businesses can take to help protect systems, data, and information from natural disasters?

Create a business continuity plan Store data in different areas across the United States (geographic data redundancy) Utilize off-site cloud storage

Mohammed is experiencing issues with his work computer. He speaks to the IT department and they identify various symptoms of a computer virus. Symptoms of a computer virus include

Unexpected error messages The operating system may not launch properly Critical files may be automatically deleted


Ensembles d'études connexes

Ch 18. Heart and Cardiovascular Function

View Set

Thyroid Disorder online TEXTBOOK questions

View Set

IB 20th Century World History Unit 6 Review: The Second World War and the Americas 1933-1945

View Set

ELSEVIER: CHAPTER 1 MICROBIOLOGY (1-100)

View Set

architecture final: quiz questions

View Set

Public Speaking Final Exam (JCJC Burks)

View Set

Ch 11: Skull and Cranial Bones ~ Workbook

View Set