Practice Quiz - Cybersecurity

Ace your homework & exams now with Quizwiz!

The deactivation of access to corporate systems and documents after an employee leaves a company is an example of which tool that ensure confidentiality? More than one answer may be correct.

Access control, authentication, encryption, physical security

Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?

Allow normal business operations to continue as soon as possible after an issue occurs

The infection of a digital device by a computer virus happens in stages. What is the second step in the process?

An action such as running or operating a file to activate a virus.

Social engineering is used to target people whom

Are not cautious about giving out confidential or sensitive information

Which of the elements of the CIA triad does properly maintaining all hardware serve?

Availability

Spyware's basic function is to

Capture the user's account data, passwords, keystrokes, and more

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a (blank) attack.

DoS

Man-in-the-Mobile (MitMo) occurs when

Malware infects smartphones and other mobile devices.

Which statement best explains why rootkits can be difficult to detect?

Many types of rootkits are designed to bypass installed security software.

Social engineering hacks are designed to get a victim to divulge which of the following types of information?

Passwords, account information

Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.

The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.

What is the goal of the NIST Cybersecurity Framework Protect (PR) Function?

To help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection.

What is the primary, underlying goal or purpose of state-sponsored cyberwarfare?

To protect or pursue security interests

From the following list, select the common types of malware used today.

Viruses, worms, trojans

Which of the follow is an example of a tool that could be used to ensure data integrity? More than one answer may be correct.

checksums are used to detect erroes that are introduced during transmission or storage

Specialized hardware or software that captures packets transmitted over a network are called packet

sniffers

Select three accurate statements that use correct terminology to describe the process denial-of-service (DoS) attacks.

-A hacker uses software to infect computers, including laptops, desktops, tablets, and Internet of Things (IoT) devices, turning each computer into a zombie -A denial-of-service (DoS) attack takes place when a hacker gains unauthorized access to and control of a network of Internet-controlled computers -A group of computers under the control of a hacker is called a distributed net.

Why do organizations need to determine their highest priority security risk? More than one answer may be correct.

-An organization may not have the resources to protect all of its data -The level of protection provided may be determined by the priority level -Leaving some data unprotected will trick hackers into stealing low priority information

What are keystroke loggers? More than one answer may be correct.

-Keystroke loggers can be hardware devices and software applications -Keystroke loggers can record passwords and confidential information -Organizations often install keystroke loggers to monitor user behavior -Keystroke loggers cannot be used to monitor employees

To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to

Keep user logins and passwords confidential


Related study sets

Ch. 16 health assessment -Assessing eyes

View Set

Bio15-Female Reproductive System (#2 Physiology)

View Set

Stats 1430 Chapter 5 Probability Rules and Conditional Probability

View Set

NURS 215 - Exam 3 - Chapters 14, 15, 19

View Set