Cybersecurity
Data erasure software uses standards that are called:
Algorithms
To protect against identity theft, the US government recommends to:
All of These
Choose all that apply. Acceptable use policy (AUP) is a general policy that:
All of these
Jailbreaking or rooting is a process that gives the user additional privileges on his portable device, what are the consequences to performing this process?
All of these
Legitimate and secure websites are recognized by?
All of these
Phishing can be evaded by:
All of these
Which of the following is a benefit of utilizing antivirus software?
All of these
Which of these attacks targets employees today?
All of these
Awareness training is essential for which type of businesses?
All type of businesses
When trading or dumping a personal computer, data can be cleaned by:
By using a disk wiping program that meets DoD standards
What are the three main types of data classifications discussed in this course?
Restricted data, private data, public data
Data classification is based on:
Sensitivity of data
____ is a more sophisticated form of phishing in which the attacker gathers more information about the targets before attempting to scam them.
Spear Phishing
Commercial VPN tunnels are preferred over free ones.
True
In a phishing attack, hackers will pose as a legitimate entity for higher chances of success.
True
Personal data should be dumped with care, the same as work related data.
True
Removable devices such as a USB thumb drive are considered a threat.
True
Spear phishing emails appear to be coming from a known person or contact.
True
The two forms of identity theft are: true name & account takeover
True
You can use your email account to track your lost smartphone/tablet
True
A worm spreading on the network can be stopped by:
Disconnect all infected computers from the network
Why are hackers targeting employees with limited access instead of executives?
Employees are considered the weak link in the security chain
Facebook, Twitter, LinkedIn are highly secure social media platforms that prevent social engineering.
False
Free internet provided by public places such as airports is considered safe to use for sensitive data.
False
New smartphones are protected against malware and viruses.
False
Public places such as airports are considered safe to use portable devices.
False
Running a computer in administrative mode can prevent attacks and viruses.
False
To create a strong password, we should use dictionary words and substitute alpha characters with special characters.
False
When scanning sensitive personal documents, it is more secure to use the office scanner.
False
By stealing PII, an attacker can perform what?
Identity Theft
Which of the following does not belong to an AUP policy?
Ignore others' copyrights and intellectual property
If an organization allows BYOD, how can employees make sure that their device is secured?
Install "system updates" regularly
If your children use your smartphone or tablet for games, it is recommended to:
Install a parental control application
When using social media, it is advised to:
Keep personal information and activities private
Which web browser used master password to secure all your saved passwords?
Mozilla Firefox
Statements that are "Too good to be true" or have a "Sense of urgency" are used in which type of attacks?
Phishing
Tailgating, dumpster diving, and shoulder surfing are forms of which type of attacks?
Physical security attacks
A small business has suffered from a cyber-attack, what could be the resultant damage?
Possible bankrupt in the next 6 months
To protect against malwares and viruses, it is recommended to:
Removal of administrative rights for all users