Question 1

Question 2
Question 3
Question 4
Question 5
Question 6
Question 7
Question 8
Question 9
Question 10
Question 11
Question 12
A) How does ransomware affect organizational assets? (1 point)
Ransomware attacks force all networks to send their IP addresses to the dark web.
A ransomware attack is designed to render organizational assets unusable until the ransom demands are met.
A ransomware attack causes users to constantly reboot their computers thereby wasting organizational resources.
A ransomware attack replicates itself from organization A to organization B if any emails have been sent between the organizations.
A) How does spyware operate? (1 point)
Spyware closely monitors computers and potentially sends sensitive or protected information back to its originator.
Spyware is designed to slow a computer down until the user is unable to complete their tasks.
Spyware is designed to protect systems from virus attacks and keep your computer free of malware.
Spyware is automated to carry out certain actions within the system.
A) The information technology (IT) department issued you an ethernet cable that will allow you to connect directly to your router when working remotely. You are also given instructions to download an identity authenticator to give you extra protection against unwanted intrusions on your computer. What would be the primary reason for IT giving such explicit instructions concerning your network connection? (1 point)
Connecting to the secured network and using an authenticator, allows IT to monitor your keystrokes.
Connecting to the secured network completely insulates your computer from a malicious attack.
Connecting to unsecured networks can increase the incidents of the stealing of personal data.
Connections to unsecured networks are slower.
A) You have received several emails from a company offering you a summer internship. You are very interested in the extended learning opportunity; however, you are a little concerned that the company is asking you to verify your social security number by clicking on an embedded link. You ignore your initial concern and follow the link. The company’s website looks legitimate, so you enter your social security information. You
later find out this was a scam aimed at high school students. The website you visited is an example of a (1 point)
unsecured site.
spoofed site.
social media site.
blog.
A) How can installation media can be used to compromise a computer? (1 point)
Installation media runs without using all the normal security.
Installation media is designed to avoid security.
Installation media is designed to hack computers.
Installation media cannot be used to compromise a computer.
A) What is one of the major advantages of using a Virtual Private Network (VPN) when browsing the internet? (1 point)
prevents hackers from seeing what you are doing
your location is known
speeds up your computer browsing
makes your computer less prone to viruses
A)
You have received a bunch of emails from the same company that makes your indoor exercise bicycle. You are very interested as you want to buy this new add-on, which will enhance the video graphics displayed on the monitor. You keep opening the attachments and browsing the sales.
One day you get an email that looks very similar to the ones you have been opening, and you open the attachment, and your item is on sale. You put in your personal and credit card information. You find out later that it was a scam. What type of scam is this an example of?
(1 point)
bait and switch
phishing attack
password theft
malware attack
A) You have just befriended someone on social media and the person is asking you for a gift card from a video game store. The person may be (1 point)
a hacker.
impoverished and in need of some money.
a cyberbully.
a person trying to scam you.
A) Your cellphone social media application keeps changing and getting new pictures. The pictures are not any that you know. This started happening after you clicked on an ad you were interested in. You change your password and it still keeps occurring. You figured you have some virus or malicious application on your phone. The person who created the virus or malicious application is called a (1 point)
friend.
cyberbully.
scammer.
hacker.
A) What role does access control have within a physical setting? (1 point)
It prevents users from gaining unauthorized access to a portion of a facility.
It allows for users to freely move around a facility.
It does not play a role in the physical security of a facility.
It allows for the surveillance of users as they enter and leave an area within a facility.
A) The chief executive officer (CEO) of an organization asked you to audit the physical security of their building. You noticed that individuals could move freely about the building. An individual who does not work at the building was able to take a document off the CEO’s desk and walk out the door. In your report, what physical security measure could prevent this from happening again? (1 point)
antivirus software
biometric lock
firewall
two-way mirror
A) You are surfing the internet and see an advertisement for an online contest. It wants you to enter a bunch of information about yourself. It even wants your bank account information. You decide not to enter and close the window. Which best practice would this be associated with? (1 point)
ensure virus protection
use passwords
avoid sharing personal information
keep software up to date

1 answer

Here are the answers to the questions based on the provided options:

  1. How does ransomware affect organizational assets?

    • Answer: A ransomware attack is designed to render organizational assets unusable until the ransom demands are met.
  2. How does spyware operate?

    • Answer: Spyware closely monitors computers and potentially sends sensitive or protected information back to its originator.
  3. What would be the primary reason for IT giving such explicit instructions concerning your network connection?

    • Answer: Connecting to unsecured networks can increase the incidents of the stealing of personal data.
  4. The website you visited is an example of a:

    • Answer: spoofed site.
  5. How can installation media be used to compromise a computer?

    • Answer: Installation media runs without using all the normal security.
  6. What is one of the major advantages of using a Virtual Private Network (VPN) when browsing the internet?

    • Answer: prevents hackers from seeing what you are doing.
  7. What type of scam is this an example of?

    • Answer: phishing attack.
  8. The person may be:

    • Answer: a person trying to scam you.
  9. The person who created the virus or malicious application is called a:

    • Answer: hacker.
  10. What role does access control have within a physical setting?

    • Answer: It prevents users from gaining unauthorized access to a portion of a facility.
  11. What physical security measure could prevent this from happening again?

    • Answer: biometric lock.
  12. Which best practice would this be associated with?

    • Answer: avoid sharing personal information.

If you have any further questions or need clarification, feel free to ask!