quiz image

Cybersecurity Threats: Compromised Devices and Account Protection

LegendaryDecagon avatar
LegendaryDecagon
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is a common threat to data in transit?

Man-in-the-middle attack

What is the most common cause of the costliest data breaches?

Malware (viruses and Trojans)

What is a countermeasure to protect data at rest on a device?

File level or disk encryption

What is a type of threat that can read or modify data at rest on-premise or in the cloud?

<p>Unauthorized or malicious process</p> Signup and view all the answers

What is essential for protecting data, according to the given quote?

<p>Knowledge</p> Signup and view all the answers

What is a potential risk if a user accesses corporate SaaS applications from a compromised device?

<p>Account compromise through brute force or password guessing</p> Signup and view all the answers

Why is security awareness training essential for protecting against cyber threats?

<p>To mitigate the risks of phishing attacks by making users more aware of potential threats</p> Signup and view all the answers

What is the primary goal of a cybercriminal when stealing credentials?

<p>To escalate privileges to a domain administrator</p> Signup and view all the answers

What is the purpose of Multi-Factor Authentication (MFA)?

<p>To use multiple factors for authentication to increase security</p> Signup and view all the answers

What is the new perimeter in terms of a user's identity?

<p>The credential boundary</p> Signup and view all the answers

Who is the lecturer for the CSIT302 Cybersecurity subject?

<p>Dr Partha Sarathi Roy</p> Signup and view all the answers

What is the total percentage of the quizzes in the CSIT302 Cybersecurity subject?

<p>30%</p> Signup and view all the answers

What is the title of the textbook recommended for the CSIT302 Cybersecurity subject?

<p>Cybersecurity – Attack and Defense Strategies</p> Signup and view all the answers

What is the percentage of the final examination in the CSIT302 Cybersecurity subject?

<p>50%</p> Signup and view all the answers

What type of assignments can be expected in the CSIT302 Cybersecurity subject?

<p>Either written reports or programs (or combined)</p> Signup and view all the answers

What is the primary goal of privacy in the context of cybersecurity?

<p>To benefit the individual by maintaining secrecy</p> Signup and view all the answers

What is the result of achieving the goals of cybersecurity in an organization?

<p>Enhancing the security posture</p> Signup and view all the answers

What is the difference between privacy and confidentiality in the context of cybersecurity?

<p>Privacy is for individuals, while confidentiality is for organizations</p> Signup and view all the answers

What is essential for enhancing overall security posture in an organization?

<p>Both detection and response systems</p> Signup and view all the answers

Why is it important to have a strong security posture in an organization?

<p>To reduce the risk of cybersecurity attacks</p> Signup and view all the answers

What is continuous monitoring used for in authentication?

<p>To continuously verify a person's identity throughout a session</p> Signup and view all the answers

What security consideration should be taken for apps developed in-house?

<p>Using a secure framework throughout the software development lifecycle</p> Signup and view all the answers

What is a potential security risk of personal apps on BYOD?

<p>They may not be secure</p> Signup and view all the answers

What is a characteristic of Shadow IT?

<p>Systems developed by individual departments other than the central IT department</p> Signup and view all the answers

What is a potential benefit of Shadow IT, despite the security risks?

<p>It may give us efficiency</p> Signup and view all the answers

What is the primary reason human error is a significant cybersecurity challenge?

<p>Humans are the weakest link in cybersecurity, making them vulnerable to social engineering</p> Signup and view all the answers

What is a characteristic of a targeted attack?

<p>It is a long-term attack with persistent access to the target's network</p> Signup and view all the answers

What is the primary goal of a ransomware attack like WannaCry?

<p>To demand a ransom in exchange for restoring access to data</p> Signup and view all the answers

What is the initial stage of a targeted attack?

<p>Public reconnaissance to gather information about the target</p> Signup and view all the answers

What is the role of social engineering in cybersecurity attacks?

<p>It is used to lead employees to click on links that download malware or viruses</p> Signup and view all the answers

What is the primary focus of cybersecurity?

<p>Safeguarding programs, network systems, software, and virtual data from invasion or damage</p> Signup and view all the answers

What is the main reason why cybersecurity is crucial for businesses?

<p>It is a must-have feature to avoid irrevocable damage or bankruptcy</p> Signup and view all the answers

What is an example of a cyberattack that can result in a fine?

<p>Data breach of a company's database</p> Signup and view all the answers

What is the purpose of cybersecurity in an interconnected digital environment?

<p>To diminish the risk of cyberattacks and protect individuals and organizations</p> Signup and view all the answers

What is a common threat to individuals and organizations in the cyberspace?

<p>Cyberattacks</p> Signup and view all the answers

What is the broad area of security that encompasses computer security, network security, and software/hardware security?

<p>Cybersecurity</p> Signup and view all the answers

What is the consequence of failing to invest in cybersecurity?

<p>Irrevocable damage or even bankruptcy</p> Signup and view all the answers

What is an example of a cyberattack that can result in the unauthorized exploitation of data?

<p>Facebook-Cambridge Analytica data scandal</p> Signup and view all the answers

What is the role of cybersecurity in protecting individuals and organizations?

<p>To protect individuals and organizations from unauthorized exploitation of data, network systems, and technologies</p> Signup and view all the answers

What is the main reason why cybersecurity is necessary in today's digital age?

<p>To protect against cyberattacks and malicious activities</p> Signup and view all the answers

More Quizzes Like This

Use Quizgecko on...
Browser
Browser