Protect Your Clients - A Practical Guide to Cybersecurity
What is the name for malware programs that record anything typed into the victim's computer? Brute-Force Password Cracker Keylogger Ransomware Spyware
Keylogger
A hacker who can be hired to assist your company with identifying weaknesses in the cybersecurity protections is known as a: White Hat Hacker. Grey Hat Hacker. Black Hat Hacker. Hacktivist.
White Hat Hacker. White hat hackers are hackers who sell their services and skills to "test" the firewalls and security methods your company has put in place. White hat hackers will not invade your company's security mechanisms without approval; while grey hat hackers will breach systems without permission before informing your company.
According to the National Cyber Security Alliance, what percentage of small or midsized companies go out of business within six months of being hacked? 30% 50% 60% 90%
60% The NCSA estimates that some 60% of small and midsize companies go bankrupt within a half year of being hacked. This is typically because the companies must pay for the forensics and insurance.
A Distributed Denial of Services (DDoS) attack oftentimes involves simultaneously using a large number of computers and digital devices to send an unsustainable amount of traffic to a single website. Those computers are controlled with assorted malwares that are controlled from a host computer. What do we call the collection of computers that performs the DDoS? A remote swarm A distributed strike A digital horde A botnet
A botnet The collection of computers and devices like phones and tablets is known as a botnet. It is usually a remotely controlled network of slave devices that can be sent en masse to a target site.
Marcus finds ways to exploit a company's weak security policies, then will send a message to the company president offering to help protect the company's network if they hire his security company. What is Marcus an example of? A white hat hacker A black hat hacker A grey hat hacker A hacktivist
A grey hat hacker
Which of the following is an example of a man-in-the-middle attack? A hacker threatens to release compromising documents if the victim does not provide passwords A hacker pretends to be a delivery driver to get past the front-desk security guards A hacker intercepts an email, produces a fake email in its place, and then sends the fake email to the original recipient A hacker calls victims and impersonates legitimate businesses to coax valuable information out of the victims
A hacker intercepts an email, produces a fake email in its place, and then sends the fake email to the original recipient
Which of these is an example of privilege escalation? A hacker installing a backdoor into the computer so they can control it remotely without needing to learn the password. A hacker clearing logs and erasing files to delete any proof that they were there. A hacker using a brute force program to crack a password, and using that password to steal documents. A hacker using a compromised email account to receive their own private password and account from the IT people at the company.
A hacker using a compromised email account to receive their own private password and account from the IT people at the company. Escalation is the stage where a hacker exploits their present permissions to gain greater access to the documents and files. Asking for a password and account from an unsuspecting supervisor or IT department will allow the hacker to operate within the company as a "legitimate" employee. Essentially, they would be shielded from suspicions because their credentials would appear legitimate.
Julietta has a network of computer bots that she can remotely control. Recently she had a disagreement with an online retail company. As revenge, she directs her bot-net to flood the company's website with page requests, slowing their website to a crawl and costing the retailer several thousand dollars in potential lost internet sales. What is Julietta an example of? A white hat hacker A blue hacker A grey hat hacker A hacktivist
A hacktivist
What is data mapping? Tracking individual data and documents once they are taken to assist FBI investigations into the cyber-attack A form of cyber-attack that installs software capable of tracing data as it is moved from device to device Copying data onto many devices to ensure limited impact from ransomware attacks A map of data storage, explaining where documents are stored and what devices contain which forms of information
A map of data storage, explaining where documents are stored and what devices contain which forms of information Data mapping involves knowing exactly where all a company's documents are held. Knowing where documents are kept will assist in rapid response to cyber attacks.
Tyrone received an email that read, "You are included in a settlement for overcharging at Local Gas Station." The email explained that the local gas station had lost a lawsuit for overcharging customers. Anyone who lived around Local Gas Station was to receive a $150 check, so long as they could prove they bought gasoline there in the past four months. The email asked for proof of address and a credit card number that investigators could cross-check with Local Gas Station purchase records. When Tyrone Googled "Local Gas Station lawsuit" there were no articles or information about any lawsuit. What is this email likely an example of? A contact spamming scheme A Quid Pro Quo arrangement A phishing scheme A doxing attack
A phishing scheme An email claiming to provide money in exchange for personal or financial information is often a clear example of a phishing scheme. By investigating the information a little, Tyrone was able to discover that the information in the email was not real.
Joon noticed that her office computer was responding much more slowly than usual. It had been acting sluggish since she had opened a strange attachment sent to her via email from her coworker. What is likely the cause of Joon's computer troubles? A keylogger A logic bomb A worm virus Spyware
A worm virus
Harry Hacker was able to infect a computer in a business' Human Resources department with a virus and installed a backdoor into HR's compromised computer. Which of the following pieces of information would help Harry in later hacking attempts? A file with all the company's employee's Social Security Numbers An email to HR from an IT employee explaining how to reset a password A spreadsheet containing employee passwords and profile names All the above
All the above
A real estate agent's email account was compromised. The hacker was able to send an email to a client explaining that "last-minute closing changes" required a "correction" to a bank account number being used to hold closing cost funds. The client followed the email's instructions and transferred the money to pay for closing costs to the updated bank account. When the client was contacted by the real estate agent and learned that the earlier email was a spoof, they soon discovered that the transferred money had been removed from the account and was unrecoverable. What would this sort of attack be considered? Attack on confidentiality Attack on availability Attack on integrity Advanced persistent threat
Attack on integrity This would be an example of an attack on integrity because it uses the credibility of the real estate agent's email account to convince the client to change closing information.
Melissa read a newspaper article that the nearby local park was a notorious location for cyber eavesdropping. What does this mean? Someone will be looking over Melissa's shoulder to watch whatever she is typing on her smartphone Talking on a mobile device while in the park can be heard by everyone else in the park Hackers can steal anything on any digital device when it is within the park's boundaries Attackers are monitoring activity from devices that automatically connect to their unsecured wifi network
Attackers are monitoring activity from devices that automatically connect to their unsecured wifi network
How often does cybersecurity change, and how often should you refresh your training in the material? Constantly, and refresh knowledge regularly. Constantly, and you should be knowledgeable enough after one training. Slowly, and a single training is oftentimes sufficient. Never, and training is unnecessary.
Constantly, and refresh knowledge regularly.
Wendy is a broker who just had her email account compromised. She learned about the break-in after seeing a spam email sent from her account and assumed that the hacker had accessed every single document in her email folders. What should Wendy do next? Avoid telling the clients until she is certain that the hacker copied her clients' data. Contact her clients through trusted numbers and explain that any information they have sent her may be compromised. Do nothing and act as though nothing has happened. Lie to her clients and tell them that the spam wasn't from her email address.
Contact her clients through trusted numbers and explain that any information they have sent her may be compromised.
Paula's computer has been infected with a malware virus that replicates itself in the background and slowly sends itself out to other devices through her email applications. Which of the following should Paula take as a sign that her computer may be infected? Her computer takes significantly longer to turn on Her antivirus software is up-to-date, but the last patch was more than a week old Searches on the internet all result in a message reading "network connectivity error" She has been receiving significantly more spam emails than usual
Her computer takes significantly longer to turn on If a computer is up-to-date on the patches, there is little reason to suspect that something has infiltrated your systems. Viruses that replicate themselves tend to slow the computer in a handful of ways by filling the memory or RAM. Checking your email outbox or trash bin (some viruses will automatically delete spam emails sent from your computer, but traces can sometimes be found in the trash bin) periodically will help locate possible infections.
Which of the following best describes baiting? Sending an email with the subject line, "YOU ARE A WINNER!" Searching for unsecured wifi networks to use as the source for an attack Intentionally leaving a trojan-infected USB device on the sidewalk Directing a client to transfer their closing funds to an escrow company
Intentionally leaving a trojan-infected USB device on the sidewalk Baiting is oftentimes a very simple form of social engineering where a cd, laptop, or USB stick is left in the open to tempt the victim into using the device.
Marty got access to a company's internal server after he sent a Trojan virus to one of the employees in an email. He has been using the server to compromise other devices in the network and create a botnet out of the server's assorted computers. What stage of the cyber chain is Marty in? Lateral movement Denial of service Exploitation Exfiltration
Lateral movement
Which of the following would be an example of baiting? Leaving a USB drive in a public place containing virus files labeled "Confidential" Spoofing a website and linking victims to the false website through a compromised email Setting up a public WiFi connection and monitoring people who connect to the systems Spamming emails with trojan viruses hidden in the attachments
Leaving a USB drive in a public place containing virus files labeled "Confidential"
Liam's computer was struck with a ransomware virus. The computer locked up and displayed a message that reads, "Pay XYZ bank $10,000 by January 1, or the data will be deleted." Liam paid the money and the computer unlocked without any further complications. What should he do now? Nothing, Liam has paid the ransom, so the issue is resolved. Liam should look through his files to make sure none are missing Liam should contact his clients and inform them that he was struck with ransomware, but that he paid the ransom and the documents are unharmed. Liam should treat every document on the computer as though they were compromised or copied.
Liam should treat every document on the computer as though they were compromised or copied. Ransomware attacks potentially compromise every single document that was contained on the computer. There are no guarantees that the documents are unharmed and no proof that the client data is safe.
Which of the following is TRUE about password protections on a smartphone? Password crackers do not exist for mobile devices, so a smartphone password does not need to be as complicated. Passwords that require a pattern to be swiped on the phone are the strongest. 123456 is a strong password because a six-character password has thousands of possibilities. None of the above
None of the above
Which of the following is NOT one of the four components of a valid electronic signature? Only one party needs to consent to doing business electronically There must be a record of the transaction that is retained The electronically signed document is associated with the record The signing party has intent to sign the electronic document
Only one party needs to consent to doing business electronically For a valid electronic signature, both parties must intend to use electronic records for the transaction throughout the process; withdrawing consent will prevent the parties from proceeding with electronic documentation.
Susan received an email with the subject line, "You'll never believe this!" Intrigued, she clicked on the email and opened the attachment. Immediately, her computer locks itself and displays a message that reads, "Send $15,000 to XYZ bank account 03430 by June 2 or all your files will be erased." What has Susan become a victim of? Ransomware DDoS attack A logic bomb A quid pro quo attack
Ransomware
Which of the following is NOT a form of malware (malicious software)? Worms Trojans Spyware SQL injection
SQL injection
Business email compromise (BEC) is the term describing a large, organized effort to defraud and deceive CEOs and CFOs of large businesses. BEC typically involves spoofed emails and accounts to trick the CEO into responding with passwords or valuable information. BEC is a variation of which of the following? Trojan Horse Baiting Spear phishing Pretexting
Spear phishing Business Email Compromises are a form of spear phishing, which is a form of social engineering phishing attack. BEC is a more targeted variation though, sometimes known as whaling, since it's a form of phishing for the largest targets.
Modern technology has begun to link digital consumer goods, such as cell phones, smart printers, and computers, allowing machines to learn your patterns or otherwise connect all devices together for ease of use. What is the term we use for this network? The Digital Network The device-web The Internet of Things The Smart Connect
The Internet of Things The Internet of Things refers to the connected web of consumer digital devices. While the Internet of Things can be convenient and assist a company's efficiency, it also opens up different avenues for hackers to exploit vulnerabilities within that digital network.
ABC Realty company received a strange email from their bank the week before that simply read, "Urgent!" All 15 of the ABC employees opened the email and found nothing in it but a strange file that did nothing when opened. All the computers were operating perfectly normal for a few weeks. Eventually the employees forgot about the strange email. When everyone returned after New Year's Day, every document on all the computers had been changed into a trojan virus file. What likely happened to ABC? The computers were subject to a zero-day infection at the same time. The original email contained a worm that was slowly replicating itself over months. The original email contained a Logic Bomb that was set to go off on New Year's Day. The hacker installed backdoors on all the computers and waited until January 1 to damage the company.
The original email contained a Logic Bomb that was set to go off on New Year's Day. By nature of the sudden, coordinated attack on the computers, it is likely that ABC was hit with a Logic Bomb that was set to "explode" and replace all files at a specific date.
All of the following are broad descriptions of cyber-attacks EXCEPT attacks on personnel. attacks on integrity. attacks on confidentiality. attacks on availability.
attacks on personnel. Attacks on availability, confidentiality, and integrity are the broad descriptions of cyberattacks. Attacks on availability limit access to networks, attacks on integrity limits the credibility of your systems;,and attacks on confidentiality are violations of your company's privacy.
A hacking attack that exploits weaknesses or vulnerabilities in the code of software or an update to software is called a dropper. a zero-day attack. Man-in-the Middle Attack. tailgating.
a zero-day attack.