Module Four Quiz-IT-482

Module Four Quiz-IT-482

Module Four Quiz-

In the Anthem Blue Cross breach, where 80 million names, birthdays, social security numbers, etc., were stolen, the hackers got in by which of the following? Select one.

Question options:

Breaking into the building where the data was stored

Making phone calls to insiders posing as IT people needing to log into their accounts

Obtaining passwords of five or more high-level employees

Recovering patient records from a large recycling bin

Emailing each of the 80 million patients asking for their private information

Which of the following are examples of multi-factor authentication (MFA)? Select all that apply.

Question options:

A human interaction to verify your identity

Password and a code sent to an email address

Passwords longer than one character

Passwords named after your child or pet

Swiping a bank card at the ATM and then entering a PIN

Password and a code sent to a mobile device

System updates and patches provided by system vendors is the practice known as which of the following? Select one.

Question options:

Spoofing

Zero-day threat

Keylogger

Cybersecurity awareness

Cybersecurity hygiene

Module Four Quiz-

Which of the following is the concept of having multiple layers of security policies and practices? Select one.

Question options:

Cybersecurity environmentalism

Zero-day threat

Multi-factor authentication

Defense in depth

Biometrics

Which of the following is the function of the NIST Cybersecurity Framework that involves making a list of physical and software assets within the organization to establish the basis of an asset management program? Select one.

Question options:

Prosecute

Identify

Protect

Detect

Respond

Recover

Which of the following is the percentage of all firms that have been breached or experienced a cyberattack? Select one.

Question options:

Over 95%

70% to 90%

10% to 20%

40% to 60%

5% or less

Which of the following is the function of the NIST Cybersecurity Framework that involves empowering employees and managers within the organization through awareness and training, including role-based and privileged user training? Select one.

Question options:

Detect

Respond

Identify

Protect

Recover

Prosecute

Which of the following is the function of the NIST Cybersecurity Framework that involves taking action on a detected cybersecurity breach? Select one.

Question options:

Protect

Recover

Identify

Respond

Detect

Prosecute

Which of the following is used by many organizations, and even consumers, to control access to a network like the internet, allowing only authorized traffic to pass? Select one.

Question options:

Encryption

Anonymizing tools

Filtering

VPN

Firewall

Which of the following best describes an “evil twin” in the context of computer security? Select one.

Question options:

Someone who looks just like the chief information officer, but steals data

A virus-laden attachment that looks just like a valid attachment

A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine

An operating system that is not genuine

A duplicate badge that allows an unauthorized person entry into a data center

>Answer Preview-Module Four Quiz-IT-482

Module Four Quiz-IT-482

$3.00

Posted

in

by

Tags: