Beruflich Dokumente
Kultur Dokumente
Flag question
Question text
Select one:
Securing cyber advantages over a business competitor
Home and business security, using motion sensors and monitored by a security vendor
Strategic Defence Initiative (SDI)
Protecting networks, devices, and data from unauthorized access
Question 2
Correct
1 points out of 1
Flag question
Question text
Select one:
A program that has flaws in it
Code that does not behave in the manner intended by its author
An unwanted file or program that can cause harm to, or compromise data on, a
computer
Untested code that a vendor releases to the public
Question 3
Correct
1 points out of 1
Flag question
Question text
Select one:
A cooperative method used to develop and improve code
A group of engineers who come together to talk code
A movement by which engineers are coerced into writing code a specific way
An exploitation of a relationship or interaction to trick a person into divulging sensitive
or personal information
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
Any information that someone can use to identify you
A government-issued number that is used to identify a citizen, mostly for tax purposes
A means of identifying the author of information
Personal preferences, such as favourite settings in applications
Question 5
Correct
1 points out of 1
Flag question
Question text
Question 1
Correct
1 points out of 1
Flag question
Question text
Identify an example of a password that best follows the password guidelines in this
lesson.
Select one:
PasswordAndAllThat
1234567890
J&JwutH2f@P0W
qwerty123
Question 2
Correct
1 points out of 1
Flag question
Question text
Question 3
Correct
1 points out of 1
Flag question
Question text
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
Encrypt the backup data for an extra layer of protection.
Always back up your data in the cloud.
Use multiple backup vendors for redundancy.
Keep a backup device physically connected to the host computer 100% of the time.
Question 5
Correct
1 points out of 1
Flag question
Question text
Select one:
Use something that you would never forget, like the name of your family pet.
Never leave your password on a sticky note stuck to your monitor. Instead, hide it
under your keyboard.
Use a predictable pattern of numbers or letters.
Use a combination of seemingly random upper and lowercase letters, numbers, and
special characters that is easy to remember but difficult to guess.
Question 1
Correct
1 points out of 1
Flag question
Question text
Complete the sentence. Phishing attacks are different than spearphishing, whaling, and
vishing because they
Select one:
involve hackers hanging out at internet forums who then collect information about
individuals to target, while the others are aimed at a wide audience.
are aimed at a wide audience, while the others are directed toward individuals or
specific organizations.
are directed against smaller players—small fish you might say, while the others use
social media sites.
use social media and social engineering techniques to lure their victims, while the
others primary use email.
Question 2
Correct
1 points out of 1
Flag question
Question text
Complete the sentence. A social engineering attack that compromises public charging
stations and installs malware when a portable device plugs in, is known as
Select one:
Juice Jacking
Phishing
Ransomware
Spearphishing
Question 3
Correct
1 points out of 1
Flag question
Question text
You receive an email from your bank. It states that someone has your password and
that you must take immediate action by clicking the link provided. What should you
do?
Select one:
Reply to the email to confirm that they have the correct account by providing your
bank account number.
Scour the email for spelling mistakes. If there are none, then the email is legitimate
and you can click the link.
Click the link and change your password. Time is of the essence.
Delete and report it to the bank by using the contact information found on their
website.
Question 4
Correct
1 points out of 1
Flag question
Question text
Which of the following is a good habit for protecting your mobile device?
Select one:
Change the factory-set default password and username.
Set up a personal hotspot.
Configure your email accounts.
Test connectivity by doing online banking.
Question 5
Correct
1 points out of 1
Flag question
Question text
Question 1
Correct
1 points out of 1
Flag question
Question text
Select one:
Unpatched device
Zero-day attack
Human error
Poorly crafted password
Question 2
Correct
1 points out of 1
Flag question
Question text
Why are insider threats one of the most challenging attack vectors?
Select one:
Network security is designed to defend against outsiders, not insiders.
Employees are trusted users who have legitimate access to an organization’s data and
resources.
Insider attacks are common, obvious, and overwhelm IT security.
There is little that can be done to prevent a denial of service attack.
Question 3
Correct
1 points out of 1
Flag question
Question text
Select one:
Confront any person you suspect of being an insider threat.
Identify and report any suspicious activity.
Monitor your co-workers’ daily activities.
Investigate and if possible resolve the threat on your own.
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
Any person with network security skills who works outside an organization
Another organization or person who see themselves as competitors
Employees who sometimes do not follow security practices
Ambitious people
Question 5
Correct
1 points out of 1
Flag question
Question text
Identify two best practices for physical security awareness. (Choose two.)