Criminal Intent and Cybersecurity Measures
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What was Henry Magruder's mistake that led to a serious security breach?

  • He leaked critical payroll data to an outside information broker.
  • He left a CD at the coffee station with sensitive data. (correct)
  • He forgot to run a virus scan on his computer.
  • He used an unauthorized device driver on his computer.
  • Why did Iris Majwubu open the file explorer program?

  • To return the CD to its rightful owner
  • To run a virus scan against the CD's contents
  • To view the data files on the CD (correct)
  • To open a readme.txt file
  • What did Iris realize was happening when she read the readme.txt file?

  • Someone was selling sensitive company data to an outside broker. (correct)
  • Someone was leaking critical payroll data to the development team.
  • Someone was installing unauthorized device drivers on office computers.
  • Someone was running a virus scan on the office computers.
  • What is a potential security threat in this scenario?

    <p>Unattended sensitive data</p> Signup and view all the answers

    What should have been done to prevent this security breach?

    <p>Encrypting the data on the CD</p> Signup and view all the answers

    What was Iris doing when she found the CD?

    <p>Topping off her mug with fresh tea</p> Signup and view all the answers

    What was the expected content of the CD according to Iris?

    <p>Test records</p> Signup and view all the answers

    What was the intention of the person who left the CD?

    <p>To sell sensitive company data to an outside broker</p> Signup and view all the answers

    What is a potential consequence of Henry Magruder's mistake?

    <p>All of the above</p> Signup and view all the answers

    What is a lesson learned from this scenario?

    <p>Never leave sensitive data unattended</p> Signup and view all the answers

    More Like This

    Exploring the World of Computer Crime
    5 questions
    Criminal IT Threats and Cybersecurity
    24 questions

    Criminal IT Threats and Cybersecurity

    ConciliatoryArchetype6356 avatar
    ConciliatoryArchetype6356
    Cybersecurity and Cyber Criminals Quiz
    42 questions
    Criminal Fundamentals of Cybersecurity
    40 questions
    Use Quizgecko on...
    Browser
    Browser