Biology Chapter 22: Evolution Flashcards
24 Questions
100 Views

Biology Chapter 22: Evolution Flashcards

Created by
@AdmiringInspiration

Questions and Answers

Social engineering attacks rely on which of the following?

  • Bypassing technical security
  • Infecting systems with malware
  • Hacking into networks
  • Convincing people to perform a harmful action (correct)
  • What should you do upon receiving an urgent email about a critical software update?

    Call your colleague on the phone to confirm that they sent you this message.

    What should you do if you suspect you are experiencing a social engineering attack?

    End contact with the person and report the suspected attack.

    Why do cyber attackers commonly use social engineering attacks?

    <p>Attackers can gain what they want while bypassing most technical security controls.</p> Signup and view all the answers

    What is the most effective way to detect and stop social engineering attacks?

    <p>Organization-wide training for recognizing common attacks.</p> Signup and view all the answers

    Which of the following is the most likely indicator of a phishing attack?

    <p>An urgent email claiming to be from a coworker, but was sent from a personal email address, such as one from @gmail.com.</p> Signup and view all the answers

    Phishing is what type of attack?

    <p>Social engineering</p> Signup and view all the answers

    What should you do if you receive an email from the help desk asking for your password?

    <p>You suspect the email may be a phishing attack, so you report it immediately.</p> Signup and view all the answers

    Which of the following is the best way to confirm that your connection to a website is encrypted?

    <p>There is a padlock icon in the status bar.</p> Signup and view all the answers

    What does HTTPS mean?

    <p>Data transmitted between the browser and web server is encrypted.</p> Signup and view all the answers

    What should you do if you are worried about using a potentially outdated Internet browser?

    <p>Contact the help desk or your security team if you have questions about the use or status of your system's software.</p> Signup and view all the answers

    What is the best way to keep our organization secure when using social networking tools?

    <p>Do not post or share confidential information that could be used against our organization.</p> Signup and view all the answers

    Why is it important to use a strong, unique passphrase for each of your social networking accounts?

    <p>If a cyber attacker compromises the password to one of your accounts, your other accounts will still be secure.</p> Signup and view all the answers

    How does two-step verification help protect your social networking accounts?

    <p>It requires an extra layer of protection in order to gain access to the account.</p> Signup and view all the answers

    Why is it important to disable Wi-Fi and Bluetooth when you are not using them?

    <p>Mobile devices can automatically connect to dangerous wireless networks.</p> Signup and view all the answers

    Why is it important to secure your mobile device with a screen lock?

    <p>To protect the information on your mobile device if it is lost or stolen.</p> Signup and view all the answers

    When downloading a new app, which criterion should you look for to keep your mobile device secure?

    <p>An app that is actively updated and maintained by the developer.</p> Signup and view all the answers

    Which of the following is an example of two-step verification?

    <p>A verification code sent to your email.</p> Signup and view all the answers

    Which of the following is the best example of a strong and memorable password?

    <p>the-sound-of-rain-on-the-windowsill.</p> Signup and view all the answers

    Which of the following is the best way to create a strong password?

    <p>Use a long and unique passphrase.</p> Signup and view all the answers

    Who or what should be held responsible when sensitive data is mishandled?

    <p>The individual making use of the data.</p> Signup and view all the answers

    What should you do with sensitive data that the organization no longer needs to retain for business use or legal reasons?

    <p>Securely dispose of the physical or digital data.</p> Signup and view all the answers

    Which of the following describes the best practice for managing third-party access to our organization's sensitive data?

    <p>Ensuring our security requirements are documented in the contract, correctly followed and periodically reviewed.</p> Signup and view all the answers

    After visiting several websites, your computer exhibits behavior you recognize from your security awareness training as a sign of a hacked system. What should you do next?

    <p>Follow your organization's procedure for reporting the system behavior.</p> Signup and view all the answers

    Study Notes

    Social Engineering Attacks

    • Rely on convincing individuals to perform harmful actions.
    • Urgent communication (e.g., software updates) should be confirmed through phone calls to avoid falling victim to scams.
    • If a social engineering attack is suspected, cease contact and report it immediately.

    Phishing Attacks

    • Commonly disguised as legitimate emails, often appearing urgent.
    • A major indicator is receiving an email from a coworker but originating from a personal email address (e.g., @gmail.com).
    • Phishing is a form of social engineering.

    Security Measures

    • Organization-wide training is the most effective way to detect and prevent social engineering attacks.
    • A padlock icon in the status bar indicates a secure, encrypted connection to a website (HTTPS).

    Password and Account Security

    • Use a strong, unique passphrase for each account to ensure that if one is compromised, others remain secure.
    • Two-step verification adds an extra security layer, requiring an additional step (like a code sent to email) to access accounts.
    • Strong and memorable passwords can be created using long phrases (e.g., “the-sound-of-rain-on-the-windowsill”).

    Mobile Device Security

    • Enable screen locks to protect information on mobile devices from unauthorized access if lost or stolen.
    • Disable Wi-Fi and Bluetooth when not in use to prevent automatic connections to risky networks.
    • Look for actively updated apps to maintain security when downloading.

    Handling Sensitive Data

    • Individuals are responsible for mishandling sensitive data.
    • Once no longer needed, sensitive data must be securely disposed of, whether physical or digital.
    • For third-party access to sensitive data, security requirements should be well-documented and periodically reviewed.

    Response Protocols

    • If unusual system behavior is observed after visiting websites, report it following the organization's protocol to address potential hacking concerns.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore key concepts of evolution in this interactive set of flashcards. Each card presents a term or scenario relevant to the principles of evolution. Test your knowledge and reinforce your understanding of biological evolution through these engaging prompts.

    More Quizzes Like This

    Biology B 2021 Evolution Flashcards
    22 questions
    AP Biology Chapter 22 Flashcards
    31 questions
    Evolution Chapter 6 Flashcards
    12 questions
    Use Quizgecko on...
    Browser
    Browser