Criminal Intent and Cybersecurity Measures
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What was Henry Magruder's mistake that led to a serious security breach?

  • He leaked critical payroll data to an outside information broker.
  • He left a CD at the coffee station with sensitive data. (correct)
  • He forgot to run a virus scan on his computer.
  • He used an unauthorized device driver on his computer.
  • Why did Iris Majwubu open the file explorer program?

  • To return the CD to its rightful owner
  • To run a virus scan against the CD's contents
  • To view the data files on the CD (correct)
  • To open a readme.txt file
  • What did Iris realize was happening when she read the readme.txt file?

  • Someone was selling sensitive company data to an outside broker. (correct)
  • Someone was leaking critical payroll data to the development team.
  • Someone was installing unauthorized device drivers on office computers.
  • Someone was running a virus scan on the office computers.
  • What is a potential security threat in this scenario?

    <p>Unattended sensitive data</p> Signup and view all the answers

    What should have been done to prevent this security breach?

    <p>Encrypting the data on the CD</p> Signup and view all the answers

    What was Iris doing when she found the CD?

    <p>Topping off her mug with fresh tea</p> Signup and view all the answers

    What was the expected content of the CD according to Iris?

    <p>Test records</p> Signup and view all the answers

    What was the intention of the person who left the CD?

    <p>To sell sensitive company data to an outside broker</p> Signup and view all the answers

    What is a potential consequence of Henry Magruder's mistake?

    <p>All of the above</p> Signup and view all the answers

    What is a lesson learned from this scenario?

    <p>Never leave sensitive data unattended</p> Signup and view all the answers

    More Like This

    Exploring the World of Computer Crime
    5 questions
    Criminal IT Threats and Cybersecurity
    24 questions

    Criminal IT Threats and Cybersecurity

    ConciliatoryArchetype6356 avatar
    ConciliatoryArchetype6356
    Cybersecurity and Cyber Criminals Quiz
    42 questions
    Use Quizgecko on...
    Browser
    Browser