Computer Science > EXAM > CIST 1601 Final Quiz | Questions with 100% Correct Answers (All)
CIST 1601 Final Quiz | Questions with 100% Correct Answers Technologies like GIS and IoE contribute to the growth of large data stores. What are two reasons that these technologies increase the need... for cybersecurity specialists? They collect sensitive information. They contain personal information Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information? black hat hackers Which statement best describes a motivation of hacktivists? They are part of a protest group behind a political cause. Which methods can be used to implement multifactor authentication? passwords and fingerprints Which technology can be implemented as part of an authentication system to verify the identification of employees? a smart card reader What are three states of data during which data is vulnerable? data in-process data in-transit stored data A security specialist is asked for advice on a security measure to prevent unauthorized hosts from accessing the home network of employees. Which measure would be most effective? Implement a firewall Which framework should be recommended for establishing a comprehensive information security management system in an organization? ISO/IEC 27000 What type of application attack occurs when data goes beyond the memory areas allocated to the application? buffer overflow An executive manager went to an important meeting. The secretary in the office receives a call from a person claiming that the executive manager is about to give an important presentation but the presentation files are corrupted. The caller sternly recommends that the secretary email the presentation right away to a personal email address. The caller also states that the executive is holding the secretary responsible for the success of this presentation. Which type of social engineering tactic would describe this scenario? Intimidation Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network? Worm What three best practices can help defend against social engineering attacks? Do not provide password resets in a chat window. Resist the urge to click on enticing web links. Educate employees regarding policies. A cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server crash. What is the type of attack the cyber criminal launches? DoS Which statement describes a distributed denial of service attack?" An attacker builds a botnet comprised of zombies A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised? Look for unauthorized accounts Which access control strategy allows an object owner to determine whether to allow access to the object? DAC Alice and Bob are using public key encryption to exchange a message. Which key should Alice use to encrypt a message to Bob? the public key of Bob An organization plans to implement security training to educate employees about security policies. What type of access control is the organization trying to implement? Administrative [Show More]
Last updated: 2 hours ago
Preview 3 out of 5 pages
Loading document previews ...
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
We Accept:
Connected school, study & course
About the document
Uploaded On
Jul 17, 2024
Number of pages
5
Written in
This document has been written for:
Uploaded
Jul 17, 2024
Downloads
0
Views
2
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·