ISQS Exam 2
According to the prep material, the estimated cost of the average data breach rose to _________ in 2015.
$3.79 million
How do you avoid Phishing and Social Engineering attacks?
-Do not click -Inform the IT team or MSP
A solid security awareness program should cover what topics?
-Phishing and Social Engineering -Access, Passwords and Connection -Device security -Physical security
Best practices to increase physical security are:
-lock your device before you leave the desk -store documents in a locked cabinet -properly discard information
According to the prep materials, ____ of all cyber attacks are successful.
50%
What percent of cyber attacks are caused by human error?
90%
Password complexity is superior to password length when it comes to strong passwords. T/F
False
Cyberattacks are usually aimed to
access, change or destroy sensitive information, extorting money from users or interrupting normal business processes
Ransomware is designed to:
extort money by blocking access to files or the computer system until the ransom is paid
Malware is designed to:
gain unauthorized access or to cause damage to a computer
Successful cybersecurity approach has:
multiple layers of protection across the computers, networks, programs or data
Cybersecurity is
the practice of protecting systems, networks and programs from digital attacks
Social Engineering is designed to:
trick you into revealing sensitive information by making you click on links, download malware or trust a malicious software
What three main entities must be protected?
Computers, smart devices and routers; networks and the cloud
What is the most common type of cyber attack?
Phishing
Phishing is designed to:
send fake emails that seem that they came from reputable sources in order to steal sensitive data.