MIS Exam 3
An individual user profile on a social network site is an example of an online identity.
True
Which of the following is an example of a secure password storage method?
Using a password manager with strong encryption
The CIA triad is comprised of which of the following items?
All of the answers
What is the difference between a DoS and DDoS attack?
A DoS attack aims to deny service to legitimate users, while a DDoS attack overwhelms the target with a flood of traffic
A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what?
A patch
What does the term "zero-day vulnerability" refer to?
A software vulnerability that is unknown to the vendor and has no available patch
Which of the following examples illustrates how malware might be concealed?
An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware
Module two
Analyzing and visualizing data
Module 3
Automating data operations
How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?
Connect with a VPN service
Which of the statements correctly describes cybersecurity?
Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks
Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?
False
Which of the following methods is used to check the integrity of data?
Hashes or checksums
Strong passwords should follow which of the following rules?
Include special characters (e.g., @, #, $) and Use a mix of uppercase and lowercase letters
Why might internal security threats cause greater damage to an organization than external security threats?
Internal users have direct access to the infrastructure devices
Which of the following characteristics describe a worm?
Is self-replicating and Travels to new computers without any intervention or knowledge of the user
Which of the following is an example of a phishing attack?
Manipulating website URLs to redirect users to fake login pages
Why do IoT devices pose a greater security risk than other computing devices on a network?
Most IoT devices do not receive frequent software updates
How can you keep your personal browsing history hidden from other users on a shared computer?
Operate the web browser in private browser mode
What type of attack allows an attacker to use a brute-force approach?
Password Cracking
A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
Patient Records
Module 4
Protecting data
Which of the following is a common method to prevent data loss
Regular data backups
Which of the following is an example of two-factor authentication?
Smart card and PIN
Module one
Storing and retrieving data
What is the purpose of a firewall in a network?
To block unauthorized access to the network
What is the purpose of a security incident response plan?
To minimize the impact of security incidents and facilitate their recovery