暗記メーカー
ログイン
IT- ICT Security
  • Anndrea S. Galupo

  • 問題数 48 • 11/25/2023

    記憶度

    完璧

    7

    覚えた

    18

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    It is defined as a risk that which can potentially harm computer systems and organization

    SECURITY THREAT

  • 2

    The cause of security threat could be _____ & ______.

    PHYSICAL AND NON-PHYSICAL

  • 3

    It is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure

    COMPUTER SYSTEM THREAT

  • 4

    It is a potential cause of an incident that may result in loss or physical damage to the computer systems.

    PHYSICAL THREAT

  • 5

    What are the 3 categories of Physical Threat?

    INTERNAL, EXTERNAL AND HUMAN

  • 6

    The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.

    INTERNAL

  • 7

    These threats include Lightning, floods, earthquakes, etc

    EXTERNAL

  • 8

    These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.

    HUMAN

  • 9

    It target the software and data on the computer systems.

    NON-PHYSICAL THREAT

  • 10

    To protect computer systems from threats, an organization must have _______________ in place.

    LOGICAL SECURITY MEASURES

  • 11

    To protect against viruses, Trojans, worms, etc. an organization can use __________.

    ANTI-VIRUS SOFTWARE

  • 12

    Unauthorized access to computer system resources can be prevented by the use of _______________.

    AUTHENTICATION METHODS

  • 13

    It can be used to protect against denial of service attacks

    INTRUSION-DETECTION/ PREVENTION SYSTEMS

  • 14

    What are the 5 common computer security threats?

    INSTALLING UNVERIFIED SOFTWARE, MAN-IN-THE-MIDDLE ATTACKS, PHISHING & SPEAR PHISHING, LEAVING YOUR COMPUTER OR DEVICE UNATTENDED, VISITING WEBSITES WITHOUT SSL CERTIFICATES

  • 15

    When people don’t understand the ramifications of installing unverified software, they open their computer up to potential attacks.

    INSTALLING UNVERIFIED SOFTWARE

  • 16

    These are somewhat similar to someone secretly and directly listening to a phone conversation through wire tapping or picking up another landline in the house.

    MAN-IN-THE-MIDDLE ATTACKS

  • 17

    It is standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers).

    SECURE SOCKETS LAYER (SSL)

  • 18

    Just as buildings and houses have a street address, webpages also have unique addresses to help people locate them. On the Internet, these addresses are called _______.

    UNIFORM RESOURCE LOCATORS (URL)

  • 19

    These are notorious for trying to trick you into opening unknown attachments and links in emails.These attachments and links have the potential to add viruses and other malware to your system.

    PHISHING ATTACKS

  • 20

    It is a more advanced form of phishing. It is a specific and targeted attack on one or a select number of victims.

    SPEAR PHISHING

  • 21

    It is a phishing that attempts to scam masses of people.

    REGULAR PHISHING

  • 22

    It has been one of the highest-praised antivirus programs available over the years because it doesn’t slow down your system, and it’s free

    AVAST

  • 23

    If you’re looking for a paid antivirus option that comes with product support, we recommend ________ or ________. They’re both highly praised in the tech community and are powerful applications that keep up-to-date.

    TRENDMICRO OR ESET

  • 24

    A type of industrial espionage that is controlled by and benefits private companies.

    INDUSTRIAL ESPIONAGE

  • 25

    A type of industrial espionage that is governed by foreign states.

    ECONOMIC ESPIONAGE

  • 26

    What are data at risk of corporate espionage?

    TRADE SECRETS, CLIENT INFORMATION, FINANCIAL INFORMATION AND MARKETING INFORMATION

  • 27

    It generally means sensitive information about existing products or products under development. This information may help your rivals get a competitive advantage.

    TRADE SECRETS

  • 28

    Data about your clients, including their financial information, can be exploited to steal your business. Another possible scenario is leaking illegally acquired data to damage your company’s reputation.

    CLIENT INFORMATION

  • 29

    It is about your company can be used to offer better deals to your clients and partners, win bids, and even make better offers to your valuable employees.

    FINANCIAL INFORMATION

  • 30

    With this information, competitors can prepare a timely answer for your marketing campaigns and make them ineffective.

    MARKETING INFORMATION

  • 31

    These are hostile attempts to steal, compromise, change, or destroy information by gaining unauthorized access to an organization’s computer systems.

    CYBER ATTACKS

  • 32

    Deploying malware or hacking into existing software to gain access to sensitive data

    HACKING AND MALWARE

  • 33

    Imitating a trusted server to track valuable information or gain data through the transmission network.

    EAVESDROPPING

  • 34

    Embedding malicious code into applocations to interdere with internal command and exploit a database.

    SQL INJECTION

  • 35

    A fictional employee stealing data for other companies or governments.

    OUTSIDE AGENT

  • 36

    An employee illegally accessing confidential data for personal advantage.

    MALICIOUS EMPLOYEE

  • 37

    An employee who installs unauthorized applications, neglects password recommendations and fails to follow other security measures.

    CARELESS EMPLOYEE

  • 38

    Usually a former employee who wants to harm the company reputationally or using other means.

    DISGRUNTLED EMPLOYEE

  • 39

    Business partners or stakeholders who compromise security through neglect, misuse, or unauthorized access.

    CARELESS THIRD PARTY

  • 40

    Which of the following includes in the 7 high-profile industrial espionage cases?

    COCA-COLA, MONSANTO, GENERAL ELECTRIC AVIATION, AMAZON, TESLA, GOOGLE, VOLVO AND SCANIA

  • 41

    Which of the following includes in the 7 best practices to detect and prevent industrial espionage?

    CONDUCT A RISK ASSESSMENT, ESTABLISH AN EFFECTIVE SECURITY POLICY, MONITOR EMPLOYEE ACTIVITY, DEVELOP A RELIABLE INCIDENT RESPONSE PLAN, SECURE YOUR INFRASTRUCTURE, THINK OF YOUR EMPLOYEES SECURITY-WISE, MANAGE DATA ACCESS WISELY

  • 42

    Include guidelines for computer network access, describe the architecture of your network security environment, and explain how security rules are implemented within it.

    NETWORK SECURITY

  • 43

    Describe measures aimed at informing your personnel about your security procedures and mechanisms.

    SECURITY AWARENESS

  • 44

    Define procedures for proper employee onboarding and termination in terms of security

    EMPLOYEE ONBOARDING/ TERMINATION

  • 45

    Establish strict rules on how passwords must be created, stored, and managed in your organization.

    PASSWORD MANAGEMENT

  • 46

    Specify procedures for providing access to various categories of data and systems for regular, privileged, and remote users.

    ACCESS MANAGEMENT

  • 47

    Describe how your system activity is monitored, analyzed, and investigated.

    AUDIT AND ACCOUNTABILITY

  • 48

    Develop a plan for what your personnel will do if a cybersecurity incident is detected.

    INCIDENT RESPONSE