Cybersecurity

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

From the following list, select all the possible warning signs of social engineering attacks.

Criminals often impersonate others and offer free giveaways in emails, texts, or webpages to encourage people to give up personal information or click a malicious link.v

How does a cybersecurity exploit threaten the safety of a system?

It is a tool or technique for taking advantage of a system vulnerability to cause harm.

Which of the following statements describes a keylogger most accurately?

It is surveillance malware that captures confidential information through keyboard input.

Describe the goals of the respond (RS) function of the NIST Cybersecurity Framework. More than one answer may be correct.

The RS function calls on organizations to create and employ procedures that allow quick action given a cybersecurity event to ensure proper steps are taken to mitigate damage and prevent a more manageable event from becoming a widespread attack on IT infrastructures.

Describe steps in cybersecurity risk analysis. More than one answer may be correct.

The first step in a risk analysis is identification and valuation of an organization's information assets. The second step is to estimate potential costs and losses per security incident, which include costs of malware attacks, fees and penalties associated with data breaches, and lost revenue. It is important to understand the probability of each type of security threat.

Why is it important to preserve the integrity of data, information, and systems?

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

What do all cybersecurity threats have in common?

They are connected to the loss of information, software, or hardware.

What is the goal of the planning phase of the plan-protect-respond cycle?

Understand common threats that an organization may face and determine how vulnerable they are to such threats.

What is the "DE" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?

detect function

Although bothersome, seeing multiple ads for products you have searched is never considered an invasion of privacy.

false

Authenticating the identity of a user, process, or device serves one purpose: to prevent unauthorized access to an organization's assets or resources.

false

California's SB-327 for IoT requires companies to anonymize collected data to protect consumer privacy.

false

In cybersecurity risk analysis, PML (probable maximum loss) is used to

help determine spending needed to adequately secure an organization's IT infrastructure.

What does the General Data Protection Regulation (GDPR) regulate?

how companies protect personal data

Which of the NIST Cybersecurity Framework functions investigates an organization's cybersecurity management in the context of their business needs and resources?

identify (ID) function

Cybersecurity threat mitigation is best defined as the policies, procedures, and tools that help an organization

identify cybersecurity threats, prevent them from being realized, and minimize damage from them.

An email that appears to be from a legitimate company is most likely to be a social engineering cybersecurity attack if

it contains a link to a free offer that seems too good to be true.

To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to

keep user logins and passwords confidential.

One surveillance technology that relies on how the user enters data is a

keylogger.

Which of the following is a goal of confidentiality as defined by the CIA triad?

making sure the right people have access to secure information

Which of the following acts is an example of social engineering?

manipulating people in order to obtain and misuse their personal information

What does the identify (ID) function of the NIST Cybersecurity Framework focus on?

organizational understanding of how to manage cybersecurity risks

Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?

outline specific recovery times for information technology to resume after an issue occurs

What part of the plan-protect-respond cycle is occurring when an organization limits access to sensitive documents on a server to only those with the required security clearance?

protect

Which threat to cybersecurity can only come from outside an organization?

ransomware

A cybersecurity exploit allows a hacker or intruder to

remotely access a network, gain privileges, and make unauthorized changes.

Which of the NIST Cybersecurity Framework functions calls for quick action on the part of an organization's cybersecurity team to mitigate damage to systems?

respond (RS) function

In what stage of the plan-protect-respond cycle forensic analysis conducted?

responding stage

If an organization's automated backup system is vulnerable to data loss or corruption, its cybersecurity vulnerability is a weakness or flaw in its

software.

What is the meaning of the term "social engineering" in the area of cybersecurity?

the act of manipulating or tricking people into sharing confidential, personal information

Which of these online functions are most susceptible to MitM attacks? More than one answer may be correct.

third-party financial services

What is the goal of the NIST Cybersecurity Framework Protect (PR) function?

to help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection

Hacking into an organization's email servers is a crime that can be prosecuted under the Stored Communications Act.

true

A benign Internet robot that gathers data is called a(n)

web crawler.

In which situation should the origin of information be authenticated to protect data integrity?

when electronic votes are submitted during an election

According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.

A company deactivates the username and passwords of former employees in bulk on a monthly basis.

Which of the following statements explains why a rootkit poses a cybersecurity threat? More than one answer may be correct.

A rootkit can easily be detected by the user.

Most organizations require employees to login in to view files that are posted to a shared drive, allowing different access to the files based on employee position within the organization and preventing unauthorized employees or other people from accessing all files. This is an example of which of the following tools that ensure confidentiality? More than one answer may be correct.

Authentication, encryption, and access controls are all tools that corporations use to ensure their information remains confidential.

Which of the following statements best illustrates why a rootkit is described as creating a back door?

Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.

Why is data that is located in the RAM of a device considered data in transit?

RAM only holds data and instructions temporarily; nothing is permanently stored in RAM.

Which of these statements support the assertion that MitMo is a growing security risk? More than one answer may be correct.

The sheer numbers of mobile devices, which function similarly to computers, gives cybercriminals another broadly available opportunity.

Which of the following is an example of a task that might be completed during the planning stage of the plan-protect-respond cycle? More than one answer may be correct.

Understanding what flaws exist and the current state of vulnerability and penetration testing are all examples of tasks that need to be completed during the planning stage of the plan-protect-respond cycle.

Why is establishing authentication procedures a common cybersecurity goal?

Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.

Which of the following is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?

Which of the following is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?

Who is responsible for calculating probable maximum loss?

a company's cybersecurity analysts

Software-based keyloggers often infect a system through

a malicious email or link opened by an unsuspecting user.

Conrad was disturbed to find evidence of applications he did not download, system configurations unexpectedly altered, and files mysteriously that disappeared and moved. Which cybersecurity threat best explains the problems he was having?

a rootkit

The Stored Communications Act prohibits which activity?

accessing the communications of an organization without authorization

Which of the following would be prohibited under the Electronic Communications Protection Act?

an employee leaking confidential emails they were not authorized to receive

What is a cybersecurity threat?

an event or condition that can lead to IT asset loss and the negative consequences of such loss

What are the three categories of the detect (DE) function of the NIST Cybersecurity Framework?

analysis, observation, detection

Social engineering is used to target people whom

are not cautious about giving out confidential or sensitive information.

Which of the elements of the CIA triad does properly maintaining all hardware serve?

availability

Spyware's basic function is to

capture the user's account data, passwords, keystrokes, and more.

Where are data in transit found?

on a cellular network

Ransomware is typically introduced into a network by a ________ and to an individual computer by a Trojan horse.

worm

Which of the following is an example of data in transit? More than one answer may be correct.

1.A person transfers documents between their laptop and mobile device. 2.A record of patients' medical histories is saved in a cloud-based data center. 3.A text message is stored on a user's mobile device.

From the following list, select all of the ways in which cybersecurity helps preserve the integrity of data, information, and systems.

1.Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets. 2Cybersecurity tools focus on protecting these assets while they are being transmitted, since this is when their integrity is vulnerable.

A man-in-the-mobile and a man-in-the-middle attack have what similar qualities? More than one answer may be correct.

1.Disrupting of the device operating system is a common symptom of the attack. 2.The malware relies on programming computer code.

Which of the following is an example of a tool that could be used to ensure data integrity? More than one answer may be correct.

1.checksums are used to detect errors that are introduced during transmission or storage 2.data input that is frequently reviewed by AI 3.hard copies of important datasets are kept in a locked warehouse

Which of the following is an example of data at rest? More than one answer may be correct.

1.data in a fitness tracker app that is shared with friends and family 2.an email being sent 3.backup files stored on an offsite server

The purpose of adware is to ________. More than one answer may be correct.

1.display ads to users based on their browsing behaviors 2.inhibit the occurrence of many pop-up and banner ads

Describe the categories of the Recover (RC) function of the NIST Cybersecurity Framework. More than one answer may be correct.

1.improvements to cybersecurity plans 2.improvements to cybersecurity plans

What are causes of the costs estimated included during a risk analysis? More than one answer may be correct.

1.system downtime 2.remote workers

Which of the following must remain confidential to achieve cybersecurity goals? More than one answer may be correct.

1.the specifications of the organization's IT systems 2.the value of the organization's systems, data, and information


संबंधित स्टडी सेट्स

PEDS Ch 50 Behavior/ Development

View Set

Materials and methods chapter test 2

View Set

Chapter 2 Ethics and Public Speaking

View Set

Ricci → Ch. 1: Perspectives on Maternal and Child Health Care PrepU

View Set