Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Philosophy
Study Set
Ethics in Information Technology Study Set 2
Quiz 3: Cyberattacks and Cybersecurity
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
Malware that stops you from using your computer or accessing your data until you meet certain demands is known as which of the following?
Question 42
Multiple Choice
Which type of exploit is defined as the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization?
Question 43
Multiple Choice
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?
Question 44
Multiple Choice
An antivirus software scans for a specific sequence of bytes that indicates the presence of specific malware. This sequence of bytes is known as which of the following?
Question 45
Multiple Choice
The act of fraudulently using email to try to get the recipient to reveal personal data is known as which of the following?
Question 46
Multiple Choice
Which of the following enables remote users to securely access an organization's collection of computing and storage devices and share data remotely?
Question 47
Multiple Choice
Which organization offers a number of security-related policy templates that can help an organization quickly develop effective security policies?
Question 48
Essay
State the purpose of an IT security audit and briefly discuss the key elements of such an audit.
Question 49
Multiple Choice
Many organizations use software to provide a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts. What is this type of software known as?
Question 50
Essay
Briefly describe ransomware and how a computer typically becomes infected with this type of malware.
Question 51
Multiple Choice
A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner is known as which of the following?
Question 52
Multiple Choice
A business policy that permits employees to use their own mobile devices to access company computing resources and applications is known as which of the following?
Question 53
Multiple Choice
The most common computer security precaution taken by businesses is the installation of which of the following?
Question 54
Multiple Choice
What type of attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in?
Question 55
Essay
Identify and briefly discuss five reasons why the number, variety, and impact of security incidents is increasing.
Question 56
Essay
Briefly explain why many organizations are choosing to outsource their network security operations to a managed security service provider (MSSP).
Question 57
Essay
Define computer forensics and briefly describe how one may prepare for a role as a computer forensics investigator.
Question 58
Multiple Choice
Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following?