Cyber Security and Information Security

OldStationSupply avatar
OldStationSupply
·
·
Download

Start Quiz

Study Flashcards

10 Questions

What is the Massachusetts Data Privacy Act also known as?

MA - 201 CMR 17.00

When did the Massachusetts Data Privacy Act become effective?

March 1, 2010

The Massachusetts Data Privacy Act applies to all businesses, regardless of their size or industry.

True

Public WiFi hotspots are not covered under Cybersecurity Best Practices.

False

The Massachusetts Data Privacy Act requires companies to have a Written Information Security Program (WISP).

True

Social Engineering Attacks may include on-site baiting to entice users to plug in infected media like USB drives.

True

Vishing Phone Calls involve using phone calls to impersonate a trusted client or vendor to obtain confidential information.

True

Public WiFi networks are always safe and secure for use, with minimal risk of cyber attacks.

False

What is a common method used in Remote Phishing Emails?

Attempting to trick recipients into clicking on a link or opening an attachment

What should individuals do to detect and avoid Vishing Attacks?

Be wary of automated calls and call back confirmation

Learn about the importance of information security from Chris Wisneski, a technology and leadership expert, as he discusses IT audit, cybersecurity, regulatory compliance, and more in this presentation.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

IT Risk Assessment Importance
5 questions
Information Security Policies and Procedures Quiz
6 questions
Information Security Management (ISM) Quiz
12 questions
Use Quizgecko on...
Browser
Browser