INFO 360 CyberSecurity

Ace your homework & exams now with Quizwiz!

According to the CIA triad, in which of the following examples is an organization ensuring data integrity?

-A company deactivates the username and passwords of former employees in bulk on a monthly basis. -The pay scale documents that human resources uses to determine salary are made available to all employees.

Which of these statements support the assertion that MitMo is a growing security risk?

-Computer-based viruses do not translate to mobile network malware. -Much of established malware can be directly used to infect mobile devices.

Which of the following is an example of an event that may occur during the protect stage of the plan-protect-respond cycle?

-Provide employees with information regarding the specific types of security threats their organization faces. -Make sure resources are protected through routine maintenance. -Determine what data hackers would be able to access during a cybersecurity threat.

Of the following statements, which apply to spyware?

-Spyware can be copied and passed from user to user. -A common way that users are exposed to spyware is through browsing history.

The term virus is a useful way to identify this malware for which of the following reasons?

-Viruses invade a network or biological organism in order to control them. -A computer system or a host body typically builds resistance to a virus over time.

Which of the following is an example of an event that may occur during the respond stage of the plan-protect-respond cycle?

-communicating with law enforcement -ensuring the appropriate recovery activities occur -figuring out which areas of the organization were affected by the security breach

Describe the compliance standards set forth by the General Data Protection Regulation (GDPR) for companies who handle individuals' data.

-notify citizens of data breaches -ensure system security updates are installed regularly

From the following list, select all situations that lead you to suspect the presence of adware.

Almost anything you select while shopping at an online retailer comes with suggestions "you might also like" and "frequently purchased together."

Which of the elements of the CIA triad does properly maintaining all hardware serve?

Availablity

Select the primary components of cybersecurity threat mitigation.

IT staff training initiatives that prevent cyberbullying

A digital music streaming company is promoting its service in a new country with a special discount for residents. How can the company use authentication to help prevent people from exploiting or abusing the deal?

It can prevent the customer from trying to record streamed music.

Why are probable loss calculations important?

Organizations have limited funds to use toward system protections.

Which is the most common characteristic of social engineering cybersecurity attacks?

They are conducted via emails that offer a reward in exchange for clicking a given link.

The Stored Communications Act prohibits which activity?

accessing the communications of an organization without authorization

Malicious bots are cybersecurity risks because they

can reproduce and link to an outside server.

In the context of California's SB-327 for IoT Security, an "Internet-connected device" ________.

has a video camera for online meetings

Ransomware basically holds a target hostage because it

makes the target's own data inaccessible.

Which function of the NIST Cybersecurity Framework calls for an organization to implement plans for resilience?

recover (RC) function

A cybersecurity exploit allows a hacker or intruder to

remotely access a network, gain privileges, and make unauthorized changes.

California's SB-327 for IoT Security mandates that security features of Internet-ready devices must be ________.

transferable from one device to another for any given user


Related study sets

Unit 4 - Economy, Society and Politics (1846-1885)

View Set

Chapter 45: Caring for Clients with Disorders of the Upper Gastrointestinal Tract

View Set

Health Assessment Exam #4 Practice Questions

View Set

Exhaustive & Repetitive Ch. 1-5; CS 1336 (C++)

View Set

Ch. 4 Physical Science study guide - Atomic Structure

View Set

True/False Westing Game Questions

View Set

accounting 201 chapter 5: receivables and sales

View Set

Chapter 10 Organizational Change and Leadership Processes

View Set