Methods of Securing Info quiz notes

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Text jury compiled a list of cyber security statistics that show the impact of different malware and network attacks

91% of cyber attacks are launched with a fishing email 85% of daily email attachments are harmful for their intended recipient 38% of malicious attachments are masked as Microsoft office files

Why do organizations need to determine their highest priority security risk

An organization may not have the resources to protect all of its data Level of protection provided may be determined by the priority level

Alyssa says that no one would risk selling operable or effective malware programs even on the dark web why is she wrong

Criminal hackers do make money by selling actual malware

Which of the following would be included in a risk assessment executive summary that was prepared to help executives make informed decisions about security

If a cyber security attack were to breach are security the medical information and social security numbers of all of our patients would be available Does our organization has multiple government contracts we need to worry about threats from other countries governments who seek to gain sensitive information regarding the US government

Describe Trojan malware more than one answer may be correct

It can often be found attached to free downloads and apps It is often used to find passwords destroyed data or to bypass firewalls It is like a virus but does not replicate itself

How does a firewall work?

It determines what internet traffic can leave or enter a network or computer

How does a network address translation type of firewall work

It hides internal IP addresses

Why might a government choose to get involved in state sponsors cyber warfare

It is relatively inexpensive compared to traditional warfare It is often difficult to trace and identify It can cause widespread damage to it infring structure

A cyber criminal uses spyware to record all actions typed on a keyboard this type of spyware is called an

Keystroke Walker

Which of these statements about packet sniffers are true

Legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal information

From the following list select types of tests that white hat hackers perform on their client's it infrastructure

Penetration testing vulnerability testing Testing of In-Place security systems

The security firewall serving vantages email program catches an impressive number of both irrelevant and illegitimate messages to the point where employees usually do not even see them occasionally however and unsolicited message will catch managing partner Carl's eye because one message looks to come from a potential new client he is interested but careful aware that the boutique consulting firm has a very targeted market system and clients usually do not appear out of thin air what type of security concern is causing Carl suspicion

Phishing

What methods are used to launch a ransomware attack

Phishing Trojan horse

Which of the following are true about spearfishing attacks

Spearfishing is a type of attack designed to Target specific individuals Spearfishing attacks can occur via email search engines or social media

In a deal as attack what happens after a hacker has established a botnet

The hacker now has a group of network computers under their control The hacker uses software to gain unauthorized access to a network of computers The hacker direct zombie computer to simultaneously contact a Target IP address

Muhammad is experiencing issues with his work computer he speaks to the IT department and they identify various symptoms of a computer virus what are the symptoms of a computer virus

The operating system may not launch properly Critical files may be automatically deleted The user may receive unexpected error messages

Which statement describes the sponsored warfare

It originates with foreign governments It is launched or executed by a foreign government or a third party It can be used to send warnings or create conflict between countries

What are keystroke loggers

Keystroke loggers can be hardware devices and software applications Keystroke loggers can record passwords and confidential information Organizations often install keystroke loggers to monitor user behavior

Sharing infected files and opening an infected email attachment are ways that a computer _ can infect a digital device

Spread computer viruses

What is the only way to guarantee that computers and networks are safe from cyber attacks

Take them offline


संबंधित स्टडी सेट्स

Social Media: Our Connected World Unit 10 Social Media and the Work Force Part 2

View Set

Mastering A&P practice questions exam 3

View Set

850. David Goggins # Kids Explain What Is Love

View Set

Y5SEM2 - Dental Research Theory ( Rany + Vuthy) MCQs 2018-2019

View Set

Diversity In the American Experience Ch 1

View Set

Language Arts 11 B Unit Test Review

View Set

STATES RIGHTS: Tenth Amendment (limited by DCC & Supremacy Clause)

View Set