KEMBAR78
Test-Out Module 4 | PDF | Malware | Security
0% found this document useful (0 votes)
31 views4 pages

Test-Out Module 4

The document outlines key concepts related to cybersecurity, including the CIA Triad principles of Availability, Integrity, and Confidentiality. It discusses various security measures such as two-factor authentication, the importance of physical security, and types of phishing attacks. Additionally, it covers the functions of firewalls, antivirus software, and the significance of patch management in maintaining system security.

Uploaded by

zfatima5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views4 pages

Test-Out Module 4

The document outlines key concepts related to cybersecurity, including the CIA Triad principles of Availability, Integrity, and Confidentiality. It discusses various security measures such as two-factor authentication, the importance of physical security, and types of phishing attacks. Additionally, it covers the functions of firewalls, antivirus software, and the significance of patch management in maintaining system security.

Uploaded by

zfatima5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Test-Out Module 4

4.1
What does "Availability" in the CIA Triad ensure?
Information is readily available to authorized users

What does "Integrity" in the CIA Triad guarantee?


Information is stored and transferred as intended

Why are computers considered high-value targets?


They are expensive and store valuable data

What should companies do to ensure the physical security of servers?


Keep servers in a locked room

What is the purpose of two-factor authentication (2FA)?


To add an extra step to logging in for increased security

What is authentication?
The process of ensuring that each account is only operated by its proper user

Which rule states that a user should only get the access they need to do their job and
nothing more?
Least Privilege

What is authorization?
The process of determining what rights and privileges a particular entity has

If you want suggestions about local restaurants, what needs to be enabled in your browser?
Location Tracking
What is accounting in the context of computer systems?
The process of documenting user actions on the computer system.

4.2
What is social engineering?

A method of deceiving others to share personal or sensitive information.

Why should you be careful with friend requests on social media?

Because they could be fake profiles created by hackers

What is the purpose of a security vestibule in preventing tailgating?

To allow only one person to enter at a time with proper credentials

What is spear phishing?

A type of phishing that targets specific individuals

You receive a text message claiming to be from your phone service provider, warning you about
unauthorized activity on your account. The message asks you to click on a link to verify your
account details.

What should you do?

Call the phone service provider using the number on their official website

What is smishing?

A type of phishing done through SMS/text messages

What is ransomware?

Malware that locks up a computer and demands money


What is a virus in the context of computer malware?

A type of malware that needs user action to spread

What is spyware?

Software that records information about a PC and its users

Jamie noticed that his computer and several others in his school's computer lab started
running very slowly and displaying strange messages at the same time.

What type of malware is most likely responsible for this?

Worm

4.3
What is "defense in depth"?

A layered security approach

What can happen if security tools are used incorrectly?

They can create more weaknesses

What criteria does a simple firewall use besides source and destination?

Protocol

Where are hardware firewalls typically installed?

At the edge of the network


What is the primary function of a firewall?

To filter network traffic

What is heuristic identification in antivirus software?

Looking for actions or behaviors similar to what viruses do

What is the primary function of antivirus software?

To identify and stop harmful attacks on your computer or network

What is patch management?

A process to ensure computers run reliably and securely

Why is it important to keep the operating system and application software current on patches?

To improve security and functionality

What is a zero-day attack?

An attack that exploits an unknown vulnerability

You might also like