No student devices needed. Know more
10 questions
Examples of Personal Data (select all that is correct) are
Medical Records
Weather Records
Education Records
Tax Records
What are the three important characteristics of security ?
Encryption
Confidentiality
Availability
Integrity
Examples of intellectual data are (select all that is correct)
Patents
Trademarks
payroll
trade secrets
How can we guarantee the availability of data ?
encryption
hashing
access control
redundancy
White hat attackers
are amateurs with little or no skills using existing tools or instructions found online to attack
break into systems with permission to discover weaknesses
take advantage of any vulnerability for illegal personal, financial or political gain
compromise systems without permission and not harmful
A buffer overflow vulnerability
exists when data can be written beyond the limits of a memory area
forces programs to behave in an unintended way
protects sensitive data through authentication, authorization and encryption
exists when processes are improperly ordered or timed
An adware is a type of malware that
track and spy on the user
delivers advertisements, usually comes with spyware
holds a computer system or the data captive until a payment is made
persuade the user to take a specific action based on fear
A rootkit
modifies the operating system to create a backdoor
is a malicious executable code that is attached to other executable files
replicate themselves by independently exploiting vulnerabilities in networks
carries out malicious operations under the guise of a desired operation
What are the systems of a malware (select all that is correct) ?
increase in CPU usage
computer freezes or crashes often
unknown processes running
increase in web browsing speed
Pretexting is a social engineering technique to
gain access to a secure location by quickly following an authorized person
use a mobile phone's texting feature to gain access into a computer system
request personal information from a party in exchange for something
gain access to privileged data by calling an individual and lying to them
Explore all questions with a free account