Cybersecurity

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Data erasure software uses standards that are called:

Algorithms

To protect against identity theft, the US government recommends to:

All of These

Choose all that apply. Acceptable use policy (AUP) is a general policy that:

All of these

Jailbreaking or rooting is a process that gives the user additional privileges on his portable device, what are the consequences to performing this process?

All of these

Legitimate and secure websites are recognized by?

All of these

Phishing can be evaded by:

All of these

Which of the following is a benefit of utilizing antivirus software?

All of these

Which of these attacks targets employees today?

All of these

Awareness training is essential for which type of businesses?

All type of businesses

When trading or dumping a personal computer, data can be cleaned by:

By using a disk wiping program that meets DoD standards

What are the three main types of data classifications discussed in this course?

Restricted data, private data, public data

Data classification is based on:

Sensitivity of data

____ is a more sophisticated form of phishing in which the attacker gathers more information about the targets before attempting to scam them.

Spear Phishing

Commercial VPN tunnels are preferred over free ones.

True

In a phishing attack, hackers will pose as a legitimate entity for higher chances of success.

True

Personal data should be dumped with care, the same as work related data.

True

Removable devices such as a USB thumb drive are considered a threat.

True

Spear phishing emails appear to be coming from a known person or contact.

True

The two forms of identity theft are: true name & account takeover

True

You can use your email account to track your lost smartphone/tablet

True

A worm spreading on the network can be stopped by:

Disconnect all infected computers from the network

Why are hackers targeting employees with limited access instead of executives?

Employees are considered the weak link in the security chain

Facebook, Twitter, LinkedIn are highly secure social media platforms that prevent social engineering.

False

Free internet provided by public places such as airports is considered safe to use for sensitive data.

False

New smartphones are protected against malware and viruses.

False

Public places such as airports are considered safe to use portable devices.

False

Running a computer in administrative mode can prevent attacks and viruses.

False

To create a strong password, we should use dictionary words and substitute alpha characters with special characters.

False

When scanning sensitive personal documents, it is more secure to use the office scanner.

False

By stealing PII, an attacker can perform what?

Identity Theft

Which of the following does not belong to an AUP policy?

Ignore others' copyrights and intellectual property

If an organization allows BYOD, how can employees make sure that their device is secured?

Install "system updates" regularly

If your children use your smartphone or tablet for games, it is recommended to:

Install a parental control application

When using social media, it is advised to:

Keep personal information and activities private

Which web browser used master password to secure all your saved passwords?

Mozilla Firefox

Statements that are "Too good to be true" or have a "Sense of urgency" are used in which type of attacks?

Phishing

Tailgating, dumpster diving, and shoulder surfing are forms of which type of attacks?

Physical security attacks

A small business has suffered from a cyber-attack, what could be the resultant damage?

Possible bankrupt in the next 6 months

To protect against malwares and viruses, it is recommended to:

Removal of administrative rights for all users


Set pelajaran terkait

test one ms, test 2 med surge 3, RESPIRTORY TEST 3, test, Test 5 practice questions, med-surg chapter 31 test bank, Iggy Chapter 45, 40 MedSurg, A&C Med Surg 10th Ch 38, Iggy Chapter 35, Iggy10th Ch 33, A&C Med Surg Iggy Ch 10, Chapter 11: Concepts o...

View Set

Examples of questions from the textbook Quiz 3

View Set

Computers in Healthcare Admin. Final Exam

View Set

Lesson 5: Small Business, Entrepreneurship, and Franchises

View Set

303 Practice Exam - need to study

View Set

Sociology Exam 2 -- Important Terms

View Set

Chapter 3: Corporate Social Responsibility and Citizens

View Set