MIS 2113 Exam 4
What is not an INPUT for a computer?
printer
A GB is roughly...
1 billion bytes
A medical office employee sends emails to patients about their recents visits to the facility. What information would out the privacy of the patients at risk if it was included in the email?
Patient Records
Keylogger Is it People, Process, or Technology?
People
A spear-phishing attempt designed to steal personal information and sell it on the black market Indicate the proper People/Process/Technology and the corresponding CIA item.
People - Confidentiality
Confidentiality
Set of rules that limits access to information, Authentication and Authorization
What is an example of a secure password storage method?
Using a password manager with strong encryption
What is an example of a password that would take a long time for an attacker to guess or break?
mk$$cittykat104#
Which components of a computer are at its core and determine how 'good' it is?
CPU, Cache, RAM
What is the difference between a DoS and DDoS attack?
A DoS attack aims to deny service to legitimate users, while a DDoS attack overwhelms the target with a flood of traffic
A set of changes done to any program or application with the aim of updating, fixing or improving is often referred to as what?
A patch
What does the term "zero-day vulnerability" refer to?
A software vulnerability that is unknown to the vendor and has no available patch.
What is an example of how malware might be concealed?
An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.
Integrity
Assurance that information is trustworthy and accurate over the lifecycle of the data, data must not change in transit or altered by unauthorized people.
Reliable access to data (CIA?)
Availability
Limit access to data (CIA?)
Confidentiality
The CIA triad is comprised of which of the following items?
Confidentiality, Integrity, Availability
How can you prevent others from eavesdropping on network traffic when operating a PC on a public wifi hotspot?
Connect with a VPN service
What store files on your computer that enable companies to track your web viewing and target specific ads at you?
Cookies
To ensure you have a proper password, what rules should you follow?
Create a password 12-15 characters in length, keep it weird
Which of the statements correctly describes cybersecurity?
Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks.
Technology Example
Encryption/Backup
"A data breach does not impact the reputation of an organization" Is this statement true or false?
False
Availability
Guarantee of reliable access by authorized people, backups
Which of the following methods is used to check the integrity of data?
Hashes or checksums
Strong passwords should follow which rules?
Include special characters, Use a mix of uppercase and lowercase letters
What is the fastest and cheapest way to make your computer faster?
Increase RAM
Data is accurate (CIA?)
Integrity
Why might internal security threats cause greater damage to an organization than external security threats?
Internal users have direct access to the infrastructure devices
What characteristic describes a worm?
Travels to new computers without any intervention or knowledge of the user, is self-replicating.
What is an example of a phishing attack?
Manipulating website URLs to redirect users to fake login pages
Why do IoT devices pose a greater risk than other computing devices on a network?
Most IoT devices do not receive frequent software updates.
What is not an OUTPUT for a computer?
Mouse
How can you keep your personal browsing history hidden from other users on a shared computer?
Operate the web browser in private browser mode.
What is windows 10 n example of?
Operating system
What type of attack allows an attacker use a brute-force approach?
Password cracking
Software updates, encryption, backup, and redundancy are examples of:
Preventing attacks on technology
Password Policy Is it People, Process, or Technology?
Process
A policy requiring all data to be verified for accuracy Indicate the proper People/Process/Technology and the corresponding CIA item.
Process - Integrity
You are working on an Excel assignment. What will your computer use store the Excel file so that the CPU/processor can execute the operations you are requesting?
RAM
Which of the following is a common method to prevent data loss?
Regular data backups
Process Example
Rule indicating what websites and employee may view
Which of the following is an example of two-factor authentication?
Smart card and pin
People example
Spear Phishing Attempt
An attack targeted at an individual is:
Spear phishing attack
Zero Day Exploit Is it People, Process, or Technology?
Technology
A zero day exploit used to shut down a nuclear power plant Indicate the proper People/Process/Technology and the corresponding CIA item.
Technology - Availability
What is the purpose of a firewall network?
To block unauthorized access to the network
What is the purpose of a security incident response plan?
To minimize the impact of security incidents and facilitate their recovery.
"With careful planning and consideration, some risks can be completely eliminated" Is this statement true or false?
false
True or False: Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the internet is your neighbor right?
false
True or False: An individual user profile on a social network site is an example of an online identity.
true