記憶度
7問
18問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
It is defined as a risk that which can potentially harm computer systems and organization
SECURITY THREAT
2
The cause of security threat could be _____ & ______.
PHYSICAL AND NON-PHYSICAL
3
It is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure
COMPUTER SYSTEM THREAT
4
It is a potential cause of an incident that may result in loss or physical damage to the computer systems.
PHYSICAL THREAT
5
What are the 3 categories of Physical Threat?
INTERNAL, EXTERNAL AND HUMAN
6
The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.
INTERNAL
7
These threats include Lightning, floods, earthquakes, etc
EXTERNAL
8
These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.
HUMAN
9
It target the software and data on the computer systems.
NON-PHYSICAL THREAT
10
To protect computer systems from threats, an organization must have _______________ in place.
LOGICAL SECURITY MEASURES
11
To protect against viruses, Trojans, worms, etc. an organization can use __________.
ANTI-VIRUS SOFTWARE
12
Unauthorized access to computer system resources can be prevented by the use of _______________.
AUTHENTICATION METHODS
13
It can be used to protect against denial of service attacks
INTRUSION-DETECTION/ PREVENTION SYSTEMS
14
What are the 5 common computer security threats?
INSTALLING UNVERIFIED SOFTWARE, MAN-IN-THE-MIDDLE ATTACKS, PHISHING & SPEAR PHISHING, LEAVING YOUR COMPUTER OR DEVICE UNATTENDED, VISITING WEBSITES WITHOUT SSL CERTIFICATES
15
When people don’t understand the ramifications of installing unverified software, they open their computer up to potential attacks.
INSTALLING UNVERIFIED SOFTWARE
16
These are somewhat similar to someone secretly and directly listening to a phone conversation through wire tapping or picking up another landline in the house.
MAN-IN-THE-MIDDLE ATTACKS
17
It is standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers).
SECURE SOCKETS LAYER (SSL)
18
Just as buildings and houses have a street address, webpages also have unique addresses to help people locate them. On the Internet, these addresses are called _______.
UNIFORM RESOURCE LOCATORS (URL)
19
These are notorious for trying to trick you into opening unknown attachments and links in emails.These attachments and links have the potential to add viruses and other malware to your system.
PHISHING ATTACKS
20
It is a more advanced form of phishing. It is a specific and targeted attack on one or a select number of victims.
SPEAR PHISHING
21
It is a phishing that attempts to scam masses of people.
REGULAR PHISHING
22
It has been one of the highest-praised antivirus programs available over the years because it doesn’t slow down your system, and it’s free
AVAST
23
If you’re looking for a paid antivirus option that comes with product support, we recommend ________ or ________. They’re both highly praised in the tech community and are powerful applications that keep up-to-date.
TRENDMICRO OR ESET
24
A type of industrial espionage that is controlled by and benefits private companies.
INDUSTRIAL ESPIONAGE
25
A type of industrial espionage that is governed by foreign states.
ECONOMIC ESPIONAGE
26
What are data at risk of corporate espionage?
TRADE SECRETS, CLIENT INFORMATION, FINANCIAL INFORMATION AND MARKETING INFORMATION
27
It generally means sensitive information about existing products or products under development. This information may help your rivals get a competitive advantage.
TRADE SECRETS
28
Data about your clients, including their financial information, can be exploited to steal your business. Another possible scenario is leaking illegally acquired data to damage your company’s reputation.
CLIENT INFORMATION
29
It is about your company can be used to offer better deals to your clients and partners, win bids, and even make better offers to your valuable employees.
FINANCIAL INFORMATION
30
With this information, competitors can prepare a timely answer for your marketing campaigns and make them ineffective.
MARKETING INFORMATION
31
These are hostile attempts to steal, compromise, change, or destroy information by gaining unauthorized access to an organization’s computer systems.
CYBER ATTACKS
32
Deploying malware or hacking into existing software to gain access to sensitive data
HACKING AND MALWARE
33
Imitating a trusted server to track valuable information or gain data through the transmission network.
EAVESDROPPING
34
Embedding malicious code into applocations to interdere with internal command and exploit a database.
SQL INJECTION
35
A fictional employee stealing data for other companies or governments.
OUTSIDE AGENT
36
An employee illegally accessing confidential data for personal advantage.
MALICIOUS EMPLOYEE
37
An employee who installs unauthorized applications, neglects password recommendations and fails to follow other security measures.
CARELESS EMPLOYEE
38
Usually a former employee who wants to harm the company reputationally or using other means.
DISGRUNTLED EMPLOYEE
39
Business partners or stakeholders who compromise security through neglect, misuse, or unauthorized access.
CARELESS THIRD PARTY
40
Which of the following includes in the 7 high-profile industrial espionage cases?
COCA-COLA, MONSANTO, GENERAL ELECTRIC AVIATION, AMAZON, TESLA, GOOGLE, VOLVO AND SCANIA
41
Which of the following includes in the 7 best practices to detect and prevent industrial espionage?
CONDUCT A RISK ASSESSMENT, ESTABLISH AN EFFECTIVE SECURITY POLICY, MONITOR EMPLOYEE ACTIVITY, DEVELOP A RELIABLE INCIDENT RESPONSE PLAN, SECURE YOUR INFRASTRUCTURE, THINK OF YOUR EMPLOYEES SECURITY-WISE, MANAGE DATA ACCESS WISELY
42
Include guidelines for computer network access, describe the architecture of your network security environment, and explain how security rules are implemented within it.
NETWORK SECURITY
43
Describe measures aimed at informing your personnel about your security procedures and mechanisms.
SECURITY AWARENESS
44
Define procedures for proper employee onboarding and termination in terms of security
EMPLOYEE ONBOARDING/ TERMINATION
45
Establish strict rules on how passwords must be created, stored, and managed in your organization.
PASSWORD MANAGEMENT
46
Specify procedures for providing access to various categories of data and systems for regular, privileged, and remote users.
ACCESS MANAGEMENT
47
Describe how your system activity is monitored, analyzed, and investigated.
AUDIT AND ACCOUNTABILITY
48
Develop a plan for what your personnel will do if a cybersecurity incident is detected.
INCIDENT RESPONSE