Securing Information Assignment
Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?
43%
Which of the following statements about computer viruses are true?
A computer virus is software that infects computers and is created using computer code. Viruses can destroy programs or alter the operations of a computer or network.
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called
Ransomware
A crime in which a computer is the object of the crime or is used to commit a criminal offense is called
cybercrime
Cyberattacks that originate and are executed by foreign governments is called state-sponsored . These attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack.
cyberwarfare
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a
firewall
Select the reasons a government may choose to get involved in state-sponsored cyberwarfare.
Cyberwarfare can cause widespread damage to IT infrastructure.- Cyberwarfare is relatively inexpensive when compared to traditional warfare.- Cyberwarfare is often difficult to trace and identify.
Malware is designed to do which of the following?
Destroy data Incapacitate networks and computers Steal information
Sharing infected files and opening an infected email attachment are ways that a computer
virus
Computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called _ -hat hackers
white
White hat hackers use the same techniques and tools that are used by illegitimate hackers. These tools include which of the following?
Back door programs Rootkits Social engineering
Which of the following are true of backup data?
Backups are performed on a regular schedule as determined by the practice. It can be used to restore lost or destroyed data. Copies of backup data should be stored at a location other than the office.
What type of hacker breaks into computer systems with the intent of causing damage or stealing data?
Black Hat
Select the true statements about ransomware attacks.
Ransomware is malware that makes a computer's data inaccessible until a ransom is paid. One of the most popular methods used in ransomware attacks is through phishing. Ransomware attacks invade computers via Trojan Horse viruses, worms, or by a user opening a legitimate looking email.
Which of the following are considered cybercrimes?
Trojan horse viruses Computer hacking Digital identity theft
According to the National Institute of Standards Technology (NIST), cybersecurity personnel can take steps to ensure data and systems are protected. The first thing an organization should conduct is a cybersecurity risk assessment. The cybersecurity risk assessment is concerned with answering which of the following questions?
What are our organization's most important information technology assets? What are the internal and external vulnerabilities? What are the relevant threats and the threat sources to our organization?
A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is
cyberattack
A deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.
cyberattacks
Businesses need to take steps to protect computer systems, data, and information from disasters.
natural
Malware is short for malicious software and is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user. Common types of malware include
Trojans Viruses Worms
Select what's true about how a Trojan infects a computer system.
Trojans are designed using some sort of social engineering tactic. Hackers use Trojans to create a backdoor into a user's system which allows them to spy on the computer's activities. Trojans are commonly used by hackers to gain access to systems and devices.
The NIST states that cybersecurity risk assessments are essential for determining which data should be protected. NIST stands for National Institute of ___ and Technology.
Standards
Select the true statements about keystroke loggers.
Can be hardware devices and software applications Software based keystroke loggers are often a Trojan that is installed without the user's knowledge Keystroke loggers can record passwords and confidential information
According to the Federal Emergency Management Agency (FEMA), which of the following are steps businesses can take to help protect systems, data, and information from natural disasters?
Create a business continuity plan Store data in different areas across the United States (geographic data redundancy) Utilize off-site cloud storage
Mohammed is experiencing issues with his work computer. He speaks to the IT department and they identify various symptoms of a computer virus. Symptoms of a computer virus include
Unexpected error messages The operating system may not launch properly Critical files may be automatically deleted