MIS exam 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Hacking into an organization's email servers is a crime that can be prosecuted under the Stored Communications Act. A) True B) False

A) True

Which of the following is an example of data in process? More than one answer may be correct. A). A username that has been submitted for authentication B). A password that has been submitted for authentication C). Credit card information used to pay for an order placed on Amazon D). A company's organizational chart

A). A username that has been submitted for authentication B). A password that has been submitted for authentication C). Credit card information used to pay for an order placed on Amazon

The native cryptocurrency of the Cardano blockchain is called A). Ada. B). CAR. C). Carvana. D). CARD.

Correct Answer: A). Ada.

Started as a spoof to mock the investor speculation, ________ has become a surprisingly large cryptocurrency by market capitalization. A). Dogecoin (DOGE) B). Ethereum (ETH) C). Litecoin (LTC) D). Solana (SOL)

Correct Answer: A). Dogecoin (DOGE)

Binance's blockchain uses the ________ consensus mechanism. A). PoA B). PoW C). PoB D). PoS

Correct Answer: A). PoA

Searching for precedents or examples is the third step in the five-step process of conducting an ethical analysis. A). True B). False

Correct Answer: A). True

When a manager thinks of someone they truly admire, whether a mentor or a historical figure, and asks how that person would decide, they are following the Universalist Principle. A). True B). False

Correct Answer: A). True

When you revisit a website, your browser will send the website's cookie (a small text file) to the web server which uses this information to customize and optimize your experience. A). True B). False

Correct Answer: A). True

Because Solana (SOL) is a Proof-of-Stake (PoS) blockchain, it is very popular for creating ________ (NFTs) and as a platform for building applications. A). non-fungible tokens B). no-fun tests C). non-failing transformers D). net-funded transfers

Correct Answer: A). non-fungible tokens

What type of cookie is stored in temporary memory and is lost when the web browser is closed? A). session B). authentication C). standard D). persistent

Correct Answer: A). session

In an attempt to reduce cryptocurrency volatility, developers created ________, which are pegged or "tethered" to a less volatile asset such as gold or U.S. dollars. A). stablecoins B). Ethereums C). Cardanos D). barncoins

Correct Answer: A). stablecoins

An asset that retains its worth rather than depreciating over time, such as precious metals and fine art, are examples of A). store-of-value assets. B). proof-of-stake assets. C). wrapped coins. D). gas fees.

Correct Answer: A). store-of-value assets.

What role does AI play in helping programmers select programming languages and frameworks? A). AI determines the best price for program design. B). AI assists programmers by recommending the most suitable programming languages and frameworks. C). AI automatically writes documentation for programs. D). AI focuses on graphical design elements.

Correct Answer: B). AI assists programmers by recommending the most suitable programming languages and frameworks.

A form of protection for original works of literature is called a trademark. A). True B). False

Correct Answer: B). False

If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called an authorization box. A). True B). False

Correct Answer: B). False

Litecoin (LTC) resides on the Bitcoin blockchain. A). True B). False

Correct Answer: B). False

PATRIOT stands for Providing Appropriate Tools Required for International Online Trade. A). True B). False

Correct Answer: B). False

When managers must make a difficult choice that has a moral component, they should look to principles of ethical strategy. A). True B). False

Correct Answer: B). False

When the government grants an inventor the right to exclude others from the use of the invention for a period of time, this is called a copyright. A). True B). False

Correct Answer: B). False

In terms of the Internet, a cookie is A). software functions designed for specific tasks. B). a small text file stored on a user's hard disk. C). unsolicited email. D). devices that allow communication between hard drives and software.

Correct Answer: B). a small text file stored on a user's hard disk.

Small text files created by websites you visit that your web browser stores on your hard disk are called A). apps. B). cookies. C). spam. D). drivers.

Correct Answer: B). cookies.

When conducting an ethical analysis, what is the last step you should take? A). searching for precedents B). deciding and preparing for consequences C). determining the affected D). listing possible options

Correct Answer: B). deciding and preparing for consequences

Music files and video games are examples of what kind of property in the eyes of the law? A). trade secrets B). intellectual property C). personal property D). real property

Correct Answer: B). intellectual property

A consensus mechanism that typically requires those who wish to add a block to put up a number of the blockchain's native coins as collateral is referred to as a proof of ________ mechanism. A). authority B). stake C). blend D). work

Correct Answer: B). stake

Which principle of ethical conduct calls for allocating rewards equitably according to individuals' productivity? A). the Principle of Virtue B). the Principle of Distributive Justice C). the Universalist Principle D). the Utilitarian Principle

Correct Answer: B). the Principle of Distributive Justice

What is the ethical consideration related to how chatbots handle abusive language and controversial content? A). Allowing chatbots to respond aggressively to abusive language B). Ensuring chatbots do not engage in controversial discussions C). Properly training chatbots to respond appropriately D). Encouraging chatbots to escalate conflicts

Correct Answer: C). Properly training chatbots to respond appropriately

If all parties want to update a smart contract, they have to build an additional contract, called A). a DOGE agreement. B). an Ethereum amendment. C). a proxy contract. D). a store-of-value.

Correct Answer: C). a proxy contract.

The use of computer models that are designed to simulate human thought processes is referred to as ________ computing and is often used in complex environments where solutions may be ambiguous or difficult to uncover. A). psychological B). memory C). cognitive D). psychosomatic

Correct Answer: C). cognitive

So that investors have confidence in a stablecoin, developers must ________ the stablecoin. A). blockchain B). consolidate C). collateralize D). illustrate

Correct Answer: C). collateralize

What is the fourth step in a five-step ethical analysis? A). searching for precedents B). determining the affected C). listing options D). getting the facts

Correct Answer: C). listing options

Circle LTD, the developer of USDC, routinely publishes the results of third-party audits of its collateralization. Many believe that this makes USDC the safest ________ for investors. A). blockchain B). NFT C). stablecoin D). Ethereum

Correct Answer: C). stablecoin

Which 1986 law makes it illegal to intercept calls or messages without a warrant? A). the Digital Millennium Copyright Act B). the Federal Information Security Management Act C). the Electronic Communications Privacy Act D). the Children's Internet Protection Act

Correct Answer: C). the Electronic Communications Privacy Act

After mining the genesis block and an estimated 1 million Bitcoin, ________ apparently disappeared from Bitcoin in July 2010. A). Bettina Schmidt, the wife of Chancellor Helmut Schmidt B). Shark Tank star Mark Cuban C). Elon Musk, who went on to start the Boring Company D). A person or persons who called themselves Satoshi Nakamoto

Correct Answer: D). A person or persons who called themselves Satoshi Nakamoto

Which provision of the USA PATRIOT Act was not renewed after it expired in 2015 nor covered by the subsequent USA Freedom Act? A). The National Security Agency must now protect email and VoIP communications. B). Public schools and libraries do not have to comply with policies imposed by the government under the Children's Internet Protection Act. C). Warrants are now required to obtain information about online and offline communications related to terrorist activities. D). The National Security Agency may not collect mass phone data from United States residents and citizens.

Correct Answer: D). The National Security Agency may not collect mass phone data from United States residents and citizens.

Unlike coins, NFTs do not reside on one specific A). URL. B). website. C). network. D). blockchain.

Correct Answer: D). blockchain

Which of the following is a technology that attempts to ensure that, once the software is constructed, it cannot be altered? A). quantum computing B). FSD C). bluetooth D). blockchain

Correct Answer: D). blockchain

When making an ethical analysis, what is the last thing a manager should do before making a decision and preparing for the consequences? A). searching for precedents B). listing options C). getting pertinent facts D). determining who is affected

Correct Answer: D). determining who is affected

The same artist might paint two very similar paintings, but each will still be unique in some way. This means that they are non- A). formable. B). franked. C). framing. D). fungible.

Correct Answer: D). fungible

What does the Wiretap Act aim to protect against? A). interception of calls and messages without a warrant B). cyberthreats to government information and assets C). terrorist activities and communications D). identity theft and unlawful access to stored communications

Correct Answer: D). identity theft and unlawful access to stored communications

Like Bitcoin and Litecoin, the Dogecoin blockchain is a ________ blockchain. A). proof-of-stake (PoS) B). gas fee C). proof-of-authority (PoA) D). proof-of-work (PoW)

Correct Answer: D). proof-of-work (PoW)

Of the following principles, which states that a manager must attempt to determine if a decision is fair for all employees involved? A). the Principle of Virtue B). the Principle of Distributive Justice C). the Utilitarian Principle D). the Universalist Principle

Correct Answer: D). the Universalist Principle

What contributes to the likelihood of accuracy and detail in AI chatbot responses? A). longer operational time of the AI chatbot B). limited usage of deep learning C). decreasing user interactions with the AI chatbot D). utilization of natural language understanding (NLU)

Correct Answer: D). utilization of natural language understanding (NLU)

How do AI content detection tools help combat plagiarism involving AI chatbots? A). by analyzing AI-generated text for authenticity B). by creating unique AI-generated content C). by developing alternative AI chatbots D). by providing detailed AI-generated reports

Correct Answer:A). by analyzing AI-generated text for authenticity

What is a key benefit of AI in managerial business environments? A). Reduces the need for managers B). Facilitates the analysis of large data sets for better decision-making C). Ensures all business tasks are performed manually D). Decreases productivity by automating tasks

Correct Answer:B). Facilitates the analysis of large data sets for better decision-making

Select three true statements regarding smart contracts. A). A smart contract is an agreement where the terms are written on a blockchain. B). Once a smart contract is written on the blockchain, the contract cannot be changed. C). Once the parameters of the contract are applied to the blockchain, the contract executes automatically. D). Smart contracts are most commonly built on the Bitcoin (BTC) blockchain.

Correct Answers: A). A smart contract is an agreement where the terms are written on a blockchain. B). Once a smart contract is written on the blockchain, the contract cannot be changed. C). Once the parameters of the contract are applied to the blockchain, the contract executes automatically.

Which of the following are popular college majors/emphasis areas for college students interested in preparing for a career in AI? A). Artificial Intelligence B). Computer Science C). Business Marketing D). Behavioral Psychology

Correct Answers: A). Artificial Intelligence B). Computer Science

Which of the following aspects of technological transparency should be considered when discussing AI-assisted chatbots? A). Consequences of interacting with AI software B). AI chatbot information privacy and security C). AI chatbot data collection and usage D). Specific design aspects of the algorithm used by the AI chatbot

Correct Answers: A). Consequences of interacting with AI software B). AI chatbot information privacy and security C). AI chatbot data collection and usage 4o mini

The FTC acknowledged that AI has the potential to advance almost every industry, but with all of this potential comes with some negative risks that must be addressed. Concerning AI, which of the following does the FTC urge organizations to provide evidence of? A). Explain how algorithms make decisions. B). Ensure that decisions are fair, robust, and empirically sound. C). Hold themselves accountable for compliance, ethics, fairness, and non-discrimination. D). Participate in nondisclosure.

Correct Answers: A). Explain how algorithms make decisions. B). Ensure that decisions are fair, robust, and empirically sound. C). Hold themselves accountable for compliance, ethics, fairness, and non-discrimination.

Which of the following are true regarding how Generative AI systems differ from Traditional AI in terms of training data? A). Gen AI often uses data collected from the internet B). Traditional AI uses curated data for specific purposes C). Gen AI is trained on specific rules and constructs D). Traditional AI uses random data samples

Correct Answers: A). Gen AI often uses data collected from the internet B). Traditional AI uses curated data for specific purposes

What were the notable achievements in the field of AI between 2012 and 2020? A). Google's neural network learned to identify cats using internet images. B). Autonomous weapons were universally banned. C). Facebook's AI chatbots developed their own language. D). Alibaba's AI surpassed human performance in a reading comprehension test.

Correct Answers: A). Google's neural network learned to identify cats using internet images. C). Facebook's AI chatbots developed their own language. D). Alibaba's AI surpassed human performance in a reading comprehension test.

Which three of the following statements are true regarding Dai (DAI)? A). It is pegged to the U.S. dollar. B). It uses game theory and over-collateralization with Ethereum to ensure its value. C). If the price of Ethereum drops precipitously, the value of DAI could also fall. D). DAI is the native coin of its own blockchain.

Correct Answers: A). It is pegged to the U.S. dollar. B). It uses game theory and over-collateralization with Ethereum to ensure its value. C). If the price of Ethereum drops precipitously, the value of DAI could also fall.

Which of the following are popular AI career fields? A). Machine Learning Engineer B). Data Scientist C). AI Engineer D). AI Ethical Reasoning

Correct Answers: A). Machine Learning Engineer B). Data Scientist C). AI Engineer D). AI Ethical Reasoning

In what ways does AI assist with code refactoring? A). Restructuring code without changing its functionality B). Creating new functionalities for applications C). Recommending improvements to code quality D). Translating code between programming languages

Correct Answers: A). Restructuring code without changing its functionality B). Creating new functionalities for applications C). Recommending improvements to code quality

What roles does historical data play in AI modeling? A). Training AI to identify fraud patterns B). Creating databases for future AI training C). Enhancing predictions in sales forecasts D). Generating instant transactional decisions

Correct Answers: A). Training AI to identify fraud patterns C). Enhancing predictions in sales forecasts D). Generating instant transactional decisions

Select the true statements about supervised learning. A). Uses data class labels within datasets that specify what the data represents. B). In supervised learning, class labels are used to create the classification model. C). A classification model is designed when machine learning allocates a label value to a specific class and then seeks to recognize these values to decide what categories they fit into. D). Classification problems are not often investigated with supervised learning.

Correct Answers: A). Uses data class labels within datasets that specify what the data represents. B). In supervised learning, class labels are used to create the classification model. C). A classification model is designed when machine learning allocates a label value to a specific class and then seeks to recognize these values to decide what categories they fit into.

What are potential misuses of AI that need to be guarded against? A). Using AI for deepfakes B). Employing AI in efficient data processing C). AI-enabled cyberattacks D). AI surveillance applications

Correct Answers: A). Using AI for deepfakes C). AI-enabled cyberattacks D). AI surveillance applications 4o mini

Select three common means of tethering stablecoins. A). collateralize with a corresponding currency B). collateralize with cryptocurrency C). collateralize with noncurrency assets D). collateralize with intangible assets

Correct Answers: A). collateralize with a corresponding currency B). collateralize with cryptocurrency C). collateralize with noncurrency assets 4o

Which of the following services are provided by cloud computing networks? A). processing B). storage C). software applications D). internet access

Correct Answers: A). processing B). storage C). software applications D). internet access

Choose three methods by which investors buy, sell, and store cryptocurrencies. A). through the use of wallets B). through a cryptocurrency exchange C). through the use of a peer-to-peer exchange D). through CAT-4 Ethernet

Correct Answers: A). through the use of wallets B). through a cryptocurrency exchange C). through the use of a peer-to-peer exchange

Which of the following are considered popular AI chatbots? A). Caktus AI B). AI Powered Bing C). ChatGPT D). Google AI

Correct Answers: B). AI Powered Bing C). ChatGPT

Which of the following are cloud-based AI applications? A). IoT B). AIaaS C). Chatbots D). IaaS

Correct Answers: B). AIaaS C). Chatbots

Which of the following are true statements about trust in AI platforms? A). In a recent study by Deloitte, 67% of executives responded they are "not comfortable" using data from advanced AI systems. B). Creating transparency is an important step in building trust in AI platforms. C). Collaboration can help to build trust in AI platforms. D). A survey by the Stevens Institute of Technology found that nearly 40% of respondents worry that AI will eventually become uncontrollable.

Correct Answers: B). Creating transparency is an important step in building trust in AI platforms. C). Collaboration can help to build trust in AI platforms.

Question: Which of the following is an example of data in transit? More than one answer may be correct. A) A person uses an app on their smartphone to pay a bill. B) A person transfers documents between their laptop and mobile device. C) A record of patients' medical histories is saved in a cloud-based data center. D) A text message is stored on a user's mobile device.

Correct answer: A) A person uses an app on their smartphone to pay a bill. C) A record of patients' medical histories is saved in a cloud-based data center.

Question: Which of the following is an example of a task that might be completed during the planning stage of the plan-protect-respond cycle? More than one answer may be correct. A) Determine security weaknesses B) Determine existing vulnerabilities by having an employee attempt to hack into a system C) Figure out where vulnerabilities within your systems currently exist D) Develop a business continuity plan for instances where data are hacked

Correct answer: A) Determine security weaknesses C) Figure out where vulnerabilities within your systems currently exist

Question: Of the following statements, which apply to spyware? More than one answer may be correct. A) Spyware harvests private information by monitoring how users interact online. B) Downloads from unvetted websites can be a vector for spyware. C) Spyware can be copied and passed from user to user. D) A common way that users are exposed to spyware is through browsing history.

Correct answer: A) Spyware harvests private information by monitoring how users interact online. B) Downloads from unvetted websites can be a vector for spyware. C) Spyware can be copied and passed from user to user. D) A common way that users are exposed to spyware is through browsing history.

Question: What do all cybersecurity threats have in common? A) They are connected to the loss of information, software, or hardware. B) Their specific causes are not as important as their potential for ongoing harm. C) They are created by hackers and other people seeking to do harm. D) Their impact is entirely preventable with proper assessment and actions.

Correct answer: A) They are connected to the loss of information, software, or hardware.

What is a primary reason that organizations adopt hybrid environments? Multiple Choice A). To balance scalability and data compliance needs B). To eliminate the need for on-premises resources C). To simplify IT management D). To reduce the flexibility of IT systems

Correct answer: A). To balance scalability and data compliance needs

The Stored Communications Act prohibits which activity? Multiple Choice A). accessing the communications of an organization without authorization B). using a computer to commit extortion C). using a wiretap to record a phone conversation when explicit permission isn't granted D). employers monitoring employee behavior while on personal mobile devices

Correct answer: A). accessing the communications of an organization without authorization

A corporation that was recently the victim of hacking that was caused by a high-level employee falling for a phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle? Multiple Choice This example represents the integrity phase of the CIA triad, not the plan-protect-respond cycle. respond protect plan

Correct answer: respond

Check All That Apply viruses spyware impersonation Distributed Denial of Service (DDOS) security patches

Correct answer: viruses spyware impersonation Distributed Denial of Service (DDOS)

Which statement accurately describes the need to keep sensitive data, information, and systems confidential? A). It is both a major goal and a requirement for cybersecurity. B). It requires that all cybersecurity plans focus on data encryption. C). It is the primary goal of every cybersecurity plan or program. D). It ensures that cybersecurity is the top priority of any organization.

Correct answer: A) It is both a major goal and a requirement for cybersecurity.

According to the National Institute of Standards Technology (NIST), the RS function of the framework includes communications with internal and external stakeholders. Multiple Choice: A) True B) False

Correct answer: A) True

Authenticating the identity of a user, process, or device serves one purpose: to prevent unauthorized access to an organization's assets or resources. Multiple Choice: A) True B) False

Correct answer: A) True

Multiple Choice: A) when electronic votes are submitted during an election B) when a bank customer checks her account balance at an ATM C) when a news website subscriber logs in to access articles D) when a store cashier enters a coupon code for a purchase

Correct answer: A) when electronic votes are submitted during an election

Adrian and Frank began the online process of applying for a short-term loan for their business. They created an account with a username and password, looked over the privacy statement, reviewed the security policy, and accepted the terms of use. After logging on, however, they became increasingly uncomfortable answering so many detailed questions about income, employment, and more. What specific risk might they have remembered from studying cybersecurity? A). Bots and crawlers B). Man-in-the-middle (MitM) C). Adware D). Ransomware

Correct answer: B) Man-in-the-middle (MitM)

What does the Identify (ID) function of the NIST Cybersecurity Framework focus on? A). Organizational implementation of an action plan in the event of a cybersecurity breach B). Organizational understanding of how to manage cybersecurity risks C). Organizational detection of cybersecurity events in a timely fashion D). Organizational development of a plan of restoration in the event of a cybersecurity breach

Correct answer: B) Organizational understanding of how to manage cybersecurity risks.

What is the purpose of the National Institute of Standards and Technology (NIST) Cybersecurity Framework? A). The NIST Cybersecurity Framework is a set of mandatory rules for organizations to follow in order to protect themselves against cybersecurity risks. B). The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks. C). The NIST Cybersecurity Framework is a system of computers that monitors national cybersecurity threats and relays the information to businesses and other organizations. D). The NIST Cybersecurity Framework is a cybersecurity software package available to organizations from NIST intended to bolster firewall capabilities.

Correct answer: B) The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.

In cybersecurity risk analysis, PML (probable maximum loss) is used to Multiple Choice A). determine the cost of replacing hardware such as computers due to employee negligence. B). help determine spending needed to adequately secure an organization's IT infrastructure. C). following a data breach, PML is used to determine the extent of the damage. D). determine the depreciation of a company's assets, such as computer hardware.

Correct answer: B). help determine spending needed to adequately secure an organization's IT infrastructure.

What are the three categories of the detect (DE) function of the NIST Cybersecurity Framework? A). Manage, protect, maintain B). Restoration, corrections to procedures, communication C). Analysis, observation, detection D). Planning, mitigation, corrections to systems

Correct answer: C) Analysis, observation, detection

What does the General Data Protection Regulation (GDPR) regulate? A). How the government protects health data B). How individuals share personal data on social media C). How companies protect personal data D). How voting organizations maintain voter ballots

Correct answer: C) How companies protect personal data.

Bad actors seeking to create computer viruses primarily must know how to: A). Set up messages to carry Trojan horses. B). Bypass operating system guardrails. C). Program code. D). Understand network components.

Correct answer: C) Program code.

Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information? A). DDOS attacks B). Spyware C). Viruses D). Packet sniffers

Correct answer: C) Viruses

Who is protected by California's SB-327 for IoT Security and who is accountable for ensuring the guidelines are met? Multiple Choice A). California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with Internet service providers. B). California's SB-327 for IoT Security helps to protect companies; the responsibility lies with Internet service providers. C). California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with makers of devices that connect with the Internet. D). California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with companies who provide Internet security software.

Correct answer: C). California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with makers of devices that connect with the Internet.

What is the primary role of Intrusion Detection Systems (IDS) in cybersecurity? Multiple Choice A). Serve as the only security measure within IT environments. B). Control both incoming and outgoing network traffic. C). Generate alerts for suspicious activities. D). Generate financial reports on cybersecurity effectiveness.

Correct answer: C). Generate alerts for suspicious activities.

What is the "RS" function in the National Institute of Standards and Technology (NIST) Cybersecurity Framework? A). Restrict function B). Reset function C). Restore function D). Respond function

Correct answer: D) Respond function

What is the goal of the NIST Cybersecurity Framework Protect (PR) function? A). To help protect organizations from lawsuits spawned by data breaches by offering legal advice B). To help protect organizations from insider trading by offering guidelines on employee ethics C). To help protect consumers who buy and use devices that connect to the Internet by offering organizations best practice guidelines D). To help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection

Correct answer: D) To help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection.

Where are data in transit found? Multiple Choice A). on a hard drive B). on a smart appliance C). in the cloud D). on a cellular network

Correct answer: D). on a cellular network

Which of the following are ways in which cybersecurity helps preserve the integrity of data, information, and systems? A) Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets. B) Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. C) Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity. D) Cybersecurity tools focus on protecting these assets while they are being transmitted, since this is when their integrity is vulnerable.

Correct answers: A) Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets. B) Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. C) Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity. D) Cybersecurity tools focus on protecting these assets while they are being transmitted, since this is when their integrity is vulnerable.

Describe steps in cybersecurity risk analysis. Check All That Apply A). Assign value to assets B). Estimate potential losses C). Estimate the likelihood of occurrence of threats D). Train employees on cybersecurity

Correct answers: A). Assign value to assets B). Estimate potential losses C). Estimate the likelihood of occurrence of threats D). Train employees on cybersecurity

Which of the following is a best practice for ensuring that data are available? Check All That Apply A). Keeping current with all system upgrades B). Limiting access to those who have the appropriate clearance C). Preventing bottlenecks D). Using two-factor authentication

Correct answers: A). Keeping current with all system upgrades B). Limiting access to those who have the appropriate clearance C). Preventing bottlenecks D). Using two-factor authentication

Describe the categories of the Recover (RC) function of the NIST Cybersecurity Framework. Check All That Apply A). Restoration of impaired systems B). Improvements to cybersecurity plans C). Communication with all stakeholders D). Mitigate system damage caused by a cybersecurity event

Correct answers: A). Restoration of impaired systems B). Improvements to cybersecurity plans C). Communication with all stakeholders D). Mitigate system damage caused by a cybersecurity event

Which of the following are areas covered by state-specific cybersecurity laws? More than one answer may be correct. Check All That Apply A). increasing cybersecurity at the state and local level B). addressing security needs of mobile devices C). protecting critical infrastructure from cyber threats D). outlining specific ways individuals' data must be protected

Correct answers: A). increasing cybersecurity at the state and local level C). protecting critical infrastructure from cyber threats

What is the importance of Identity-First Approaches in cybersecurity? Check All That Apply A). Reducing hardware costs B). Protecting against unauthorized access C). Managing the identification of individuals with IT system access D). Ensuring compliance with all software licenses

Correct answers: B). Protecting against unauthorized access C). Managing the identification of individuals with IT system access

Which of these statements support the assertion that MitMo is a growing security risk? More than one answer may be correct. Check All That Apply The world is flooded with smartphones and other mobile devices. Mobile devices function in many of the same ways that computers do. Computer-based viruses do not translate to mobile network malware. Much of established malware can be directly used to infect mobile devices.

Correct answers: The world is flooded with smartphones and other mobile devices. Mobile devices function in many of the same ways that computers do.

What makes biometric verification a preferred method of identity verification? A). Its convenience B). The uniqueness of biometric features C). Its reliance on easily guessable data D). The difficulty in replicating biometric features

Correct answers: A, B, and D Its convenience: Biometrics offer a quick and easy method of verification, often requiring only a fingerprint, face scan, or retina scan. The uniqueness of biometric features: Each person's biometric features (like fingerprints or facial patterns) are unique, making it difficult to duplicate. The difficulty in replicating biometric features: Biometrics are hard to replicate or forge, which increases security compared to traditional methods.

What are benefits of integrating Generative AI (GenAI) into cybersecurity strategies? A). Productivity gains B). Increased software costs C). Skills gap reduction D). Enhanced monitoring for threats

Correct answers: A, C, D

Which technologies are commonly implemented as part of cybersecurity measures to defend IT resources? A). Firewalls B). Multifactor Authentication C). Data Analysis Tools D). Intrusion Prevention Systems (IPS)

Correct answers: B, C, D Multifactor Authentication Data Analysis Tools Intrusion Prevention Systems (IPS)

Computer viruses can be either chip technology or code. Here is the multiple-choice format for your question: Multiple Choice A). True B). False

The correct answer is False.

Which of the NIST Cybersecurity Framework functions calls for quick action on the part of an organization's cybersecurity team to mitigate damage to systems? Multiple Choice recover (RC) function detect (DE) function respond (RS) function protect (PR) function

The correct answer is: C). Respond (RS) function

According to the National Institute of Standards Technology (NIST), the PR function of the framework involves public relations in the form of communications between organizations and their stakeholders, specifically after a cybersecurity event. Multiple Choice A). True B). False

True


संबंधित स्टडी सेट्स

intro to public speaking mid term

View Set

An Update on Demineralization/Remineralization CE

View Set

Chapter 19: Documenting and Reporting

View Set

Chapter 5: Analyzing the Audience

View Set

Families and Children (Chapter 9)

View Set