King Saud University Survey Results on Data Tracking and Surveillance
11 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is considered an asset?

  • Exploits
  • Threats
  • Vulnerabilities
  • Bank account (correct)

Which of the following falls under an intangible asset?

  • Hardware
  • Physical objects
  • Goodwill (correct)
  • Software

What are vulnerabilities in the context of data misuse?

  • Exploits (correct)
  • Controls
  • Software
  • Hardware

What type of personal information was exposed in the Marriott breach?

<p>Names, addresses, phone numbers, passport numbers (C)</p> Signup and view all the answers

How is the Cryptowall Trojan typically distributed?

<p>Through spam campaigns and malicious ads (B)</p> Signup and view all the answers

What is the main objective of the Cryptowall Trojan after infecting a computer?

<p>To encrypt the user's files and demand ransom (B)</p> Signup and view all the answers

In the context of the text, what type of action characterizes the concept of Usurpation?

<p>Unauthorized control of some part of a system (C)</p> Signup and view all the answers

What was the method used by security researchers to capture a player's Fortnite authentication token?

<p>Sending a malicious link through a chat message (A)</p> Signup and view all the answers

What action did the FBI recommend to address the VPNFilter malware threat in May 2018?

<p>Rebooting routers (B)</p> Signup and view all the answers

Which term best describes the consequence of 'unauthorized access to information' as outlined in the text?

<p>Data breach (D)</p> Signup and view all the answers

What potential impact does the VPNFilter malware have on small office and home office routers?

<p>It renders routers inoperable (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser