Podcast
Questions and Answers
Which of the following is a prevention strategy employed by a hospital to ensure the security of its patients' sensitive medical data?
Which of the following is a prevention strategy employed by a hospital to ensure the security of its patients' sensitive medical data?
- Employment of an ethical hacker (correct)
- Regular backup of data
- Installation of antivirus software
- Use of a firewall
Which of the following is NOT a network threat provided in the text?
Which of the following is NOT a network threat provided in the text?
- Brute force attack
- Phishing (correct)
- Social engineering
- Malware
Which of the following is an example of a passive digital footprint?
Which of the following is an example of a passive digital footprint?
- Sending an instant message via Twitter
- Submitting a post on a blog
- Sharing a story on Instagram
- A web server storing a user's IP address (correct)
What is the purpose of monitoring digital footprints of prospective employees?
What is the purpose of monitoring digital footprints of prospective employees?
Which of the following is a potential error that the hospital's staff could make that may endanger the security of the network?
Which of the following is a potential error that the hospital's staff could make that may endanger the security of the network?
Flashcards are hidden until you start studying