Practice Quiz - Cybersecurity
The deactivation of access to corporate systems and documents after an employee leaves a company is an example of which tool that ensure confidentiality? More than one answer may be correct.
Access control, authentication, encryption, physical security
Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?
Allow normal business operations to continue as soon as possible after an issue occurs
The infection of a digital device by a computer virus happens in stages. What is the second step in the process?
An action such as running or operating a file to activate a virus.
Social engineering is used to target people whom
Are not cautious about giving out confidential or sensitive information
Which of the elements of the CIA triad does properly maintaining all hardware serve?
Availability
Spyware's basic function is to
Capture the user's account data, passwords, keystrokes, and more
A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a (blank) attack.
DoS
Man-in-the-Mobile (MitMo) occurs when
Malware infects smartphones and other mobile devices.
Which statement best explains why rootkits can be difficult to detect?
Many types of rootkits are designed to bypass installed security software.
Social engineering hacks are designed to get a victim to divulge which of the following types of information?
Passwords, account information
Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.
The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.
What is the goal of the NIST Cybersecurity Framework Protect (PR) Function?
To help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection.
What is the primary, underlying goal or purpose of state-sponsored cyberwarfare?
To protect or pursue security interests
From the following list, select the common types of malware used today.
Viruses, worms, trojans
Which of the follow is an example of a tool that could be used to ensure data integrity? More than one answer may be correct.
checksums are used to detect erroes that are introduced during transmission or storage
Specialized hardware or software that captures packets transmitted over a network are called packet
sniffers
Select three accurate statements that use correct terminology to describe the process denial-of-service (DoS) attacks.
-A hacker uses software to infect computers, including laptops, desktops, tablets, and Internet of Things (IoT) devices, turning each computer into a zombie -A denial-of-service (DoS) attack takes place when a hacker gains unauthorized access to and control of a network of Internet-controlled computers -A group of computers under the control of a hacker is called a distributed net.
Why do organizations need to determine their highest priority security risk? More than one answer may be correct.
-An organization may not have the resources to protect all of its data -The level of protection provided may be determined by the priority level -Leaving some data unprotected will trick hackers into stealing low priority information
What are keystroke loggers? More than one answer may be correct.
-Keystroke loggers can be hardware devices and software applications -Keystroke loggers can record passwords and confidential information -Organizations often install keystroke loggers to monitor user behavior -Keystroke loggers cannot be used to monitor employees
To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to
Keep user logins and passwords confidential