Computer Science > EXAM > CIST 1601 Final Quiz | Questions with 100% Correct Answers (All)

CIST 1601 Final Quiz | Questions with 100% Correct Answers

Document Content and Description Below

CIST 1601 Final Quiz | Questions with 100% Correct Answers Technologies like GIS and IoE contribute to the growth of large data stores. What are two reasons that these technologies increase the need... for cybersecurity specialists? They collect sensitive information. They contain personal information Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information? black hat hackers Which statement best describes a motivation of hacktivists? They are part of a protest group behind a political cause. Which methods can be used to implement multifactor authentication? passwords and fingerprints Which technology can be implemented as part of an authentication system to verify the identification of employees? a smart card reader What are three states of data during which data is vulnerable? data in-process data in-transit stored data A security specialist is asked for advice on a security measure to prevent unauthorized hosts from accessing the home network of employees. Which measure would be most effective? Implement a firewall Which framework should be recommended for establishing a comprehensive information security management system in an organization? ISO/IEC 27000 What type of application attack occurs when data goes beyond the memory areas allocated to the application? buffer overflow An executive manager went to an important meeting. The secretary in the office receives a call from a person claiming that the executive manager is about to give an important presentation but the presentation files are corrupted. The caller sternly recommends that the secretary email the presentation right away to a personal email address. The caller also states that the executive is holding the secretary responsible for the success of this presentation. Which type of social engineering tactic would describe this scenario? Intimidation Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network? Worm What three best practices can help defend against social engineering attacks? Do not provide password resets in a chat window. Resist the urge to click on enticing web links. Educate employees regarding policies. A cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server crash. What is the type of attack the cyber criminal launches? DoS Which statement describes a distributed denial of service attack?" An attacker builds a botnet comprised of zombies A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised? Look for unauthorized accounts Which access control strategy allows an object owner to determine whether to allow access to the object? DAC Alice and Bob are using public key encryption to exchange a message. Which key should Alice use to encrypt a message to Bob? the public key of Bob An organization plans to implement security training to educate employees about security policies. What type of access control is the organization trying to implement? Administrative [Show More]

Last updated: 3 hours ago

Preview 3 out of 5 pages

Add to cart

Instant download

We Accept:

We Accept
loader

Loading document previews ...

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

We Accept:

We Accept

Reviews( 0 )

$10.50

Add to cart

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
5
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 17, 2024

Number of pages

5

Written in

Seller


seller-icon
Nurse Henny

Member since 1 year

5 Documents Sold


Additional information

This document has been written for:

Uploaded

Jul 17, 2024

Downloads

 0

Views

 5

Document Keyword Tags

Recommended For You

Get more on EXAM »

$10.50
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·