Common Supply Chain Attacks and Malware Types Quiz

ThinnerStrength avatar
ThinnerStrength
·
·
Download

Start Quiz

Study Flashcards

28 Questions

What are the two main kinds of rights under Intellectual Property Rights (IPR)?

Moral Rights and Economic Rights

What is the role of an Incident Response Team during cyber security incidents?

Preparing, Detecting, Containing, Recovering, and Learning from incidents

Which organization serves as the global forum for intellectual property (IP) services, policy, and cooperation?

World Intellectual Property Organization (WIPO)

Under Intellectual Property, what do Moral Rights mainly protect?

Personality and integrity of the author

Which act addresses censorship in the Philippines according to the text?

Anti-Child Pornography Act

What does an Incident Response Team primarily focus on during the 'Detection and Analysis' phase?

Identifying security vulnerabilities

What is the primary function of managerial control according to the text?

Setting performance standards

Which type of control anticipates problems before they occur?

Feedforward Control

What is the essence of control according to the text?

Action

What is the purpose of an organizational structure?

Define how activities are directed to achieve goals

What does an organizational chart visually convey?

Company's internal structure

Which type of control corrects problems after they have occurred?

Feedback Control

Which of the following is NOT a type of malware attack mentioned in the text?

Keylogger

What is the primary purpose of a social engineering attack?

To trick users into providing an entry point for malware by posing as a legitimate actor

Which of the following is NOT a type of social engineering attack mentioned in the text?

Spear phishing

What is the primary goal of a man-in-the-middle (MitM) attack?

To intercept communication between two endpoints

Which of the following is NOT a type of man-in-the-middle (MitM) attack mentioned in the text?

Vishing

What is the primary technique used in a spoofing attack?

Using deception (fraud) to appear as another person or source of information

Which of the following is NOT one of the six main functions of a human resource department?

Ensuring organizational structure and design

What is the LEAST important 'C' principle of human resource management according to the text?

Cost Effectiveness

Which type of change agent is LEAST involved in the continuous change process within an organization?

External change agent

What is the MAIN role of a change agent in an organization?

To initiate change to increase organizational effectiveness

Which type of organizational structure is characterized by a clear hierarchy of authority, with decision-making power concentrated at the top?

Hierarchical

Which of the following is NOT a type/means of departmentalization mentioned in the text?

Departmentalization by Product

Which of the following is NOT considered a primary dimension of diversity in the workplace?

Education

Which of the following best describes the concept of 'global management' as mentioned in the text?

The way an organization manages its business internationally, including its sales, marketing, hiring and finance practices.

Which of the following is NOT considered a secondary dimension of diversity in the workplace?

Perception

Which of the following best describes the concept of 'decentralization' as mentioned in the text?

The dissemination of powers by the top management to the middle or low-level management.

Test your knowledge on common scenarios in supply chain attacks, types of malware including viruses, worms, trojans, ransomware, and social engineering attacks like baiting, pretexting, and phishing. Learn about various tactics used by attackers to compromise systems and deceive users.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser