Here are the answers to the questions based on the provided options:
-
How does ransomware affect organizational assets?
- Answer: A ransomware attack is designed to render organizational assets unusable until the ransom demands are met.
-
How does spyware operate?
- Answer: Spyware closely monitors computers and potentially sends sensitive or protected information back to its originator.
-
What would be the primary reason for IT giving such explicit instructions concerning your network connection?
- Answer: Connecting to unsecured networks can increase the incidents of the stealing of personal data.
-
The website you visited is an example of a:
- Answer: spoofed site.
-
How can installation media be used to compromise a computer?
- Answer: Installation media runs without using all the normal security.
-
What is one of the major advantages of using a Virtual Private Network (VPN) when browsing the internet?
- Answer: prevents hackers from seeing what you are doing.
-
What type of scam is this an example of?
- Answer: phishing attack.
-
The person may be:
- Answer: a person trying to scam you.
-
The person who created the virus or malicious application is called a:
- Answer: hacker.
-
What role does access control have within a physical setting?
- Answer: It prevents users from gaining unauthorized access to a portion of a facility.
-
What physical security measure could prevent this from happening again?
- Answer: biometric lock.
-
Which best practice would this be associated with?
- Answer: avoid sharing personal information.
If you have any further questions or need clarification, feel free to ask!