4
9. Open the attachment(Phishing): They will tempt you to click on a link that will direct you to a fake website where their goal is to steal personal information.
Added 32 days ago|7/7/2022 4:08:28 AM
This answer has been confirmed as correct and helpful.
4
10. A strong password is essential for protection against cybersecurity threats. TRUE.
Added 32 days ago|7/7/2022 4:11:40 AM
This answer has been confirmed as correct and helpful.
4
11. Saved Data encryption is a common method of ensuring confidentiality. TRUE.
Added 32 days ago|7/7/2022 4:12:26 AM
This answer has been confirmed as correct and helpful.
4
12. The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data is the purpose of encryption.
Added 32 days ago|7/7/2022 4:15:21 AM
This answer has been confirmed as correct and helpful.
4
13. Slow down, malfunction, or display repeated error messages is a sign of malware on your computer. TRUE.
Added 32 days ago|7/7/2022 4:16:27 AM
This answer has been confirmed as correct and helpful.
4
14. Social media is a common place for hackers to steal personal information. Facebook is a hacker's favorite target.
Added 32 days ago|7/7/2022 4:22:24 AM
This answer has been confirmed as correct and helpful.
4
15. Authentication means: Making sure someone using the computer is who they say they are by use of passwords and other techniques.
Added 32 days ago|7/7/2022 4:29:19 AM
This answer has been confirmed as correct and helpful.
4
16. A Trojan horse is a computer program that pretends to be one thing but causes harm when accessed.
Added 32 days ago|7/7/2022 4:31:10 AM
This answer has been confirmed as correct and helpful.
4
17. When you are using your Facebook account, a message pop-out, it tells you to click on the link and you can get a iPhone if you win the game. You should Try to use anti-virus and anti-spyware software, and a firewall to defend the malware.
Added 32 days ago|7/7/2022 4:33:48 AM
This answer has been confirmed as correct and helpful.
4
18. It is essential that users change their passwords on a regular basis. TRUE.
Added 32 days ago|7/7/2022 4:36:14 AM
This answer has been confirmed as correct and helpful.
4
19. A good example of methods used to ensure confidentiality is an account number or routing number when banking online. TRUE.
Added 32 days ago|7/7/2022 4:37:20 AM
This answer has been confirmed as correct and helpful.
4
20. A typical firewall has two interfaces : an external interface connected to the global Internet, and an internal interface connected to a trusted network. TRUE.
Added 32 days ago|7/7/2022 4:39:10 AM
This answer has been confirmed as correct and helpful.
4
21. signify: That you are visiting a secure Web site in which data transmissions are encrypted.
Added 32 days ago|7/7/2022 4:41:29 AM
This answer has been confirmed as correct and helpful.
4
22. A pop-out message on your computer wrote "free anti-spyware download", and you don't have a anti'spyware, You should Close the window, and download it from other trust-able web page.
Added 32 days ago|7/7/2022 4:44:36 AM
This answer has been confirmed as correct and helpful.
4
23. A VPN is a Virtual Private Network for employees outside the firm to securely access the network.
Added 32 days ago|7/7/2022 4:47:00 AM
This answer has been confirmed as correct and helpful.
4
24. Viruses attach themselves to specific applications on a computer and are activated when the program is first run. TRUE.
Added 32 days ago|7/7/2022 4:48:14 AM
This answer has been confirmed as correct and helpful.
4
25. VPN stand for Vertical Private Network.
Added 32 days ago|7/7/2022 4:49:28 AM
This answer has been confirmed as correct and helpful.
4
26. There are certain rules that can optimize a password's effectiveness. TRUE.
Added 32 days ago|7/7/2022 4:55:33 AM
This answer has been confirmed as correct and helpful.
4
27. Mobile devices can pose many unique security challenges to an organization.
Added 32 days ago|7/7/2022 4:56:34 AM
This answer has been confirmed as correct and helpful.
4
28. A firewall can exist as hardware or software (or both). TRUE.
Added 32 days ago|7/7/2022 4:57:38 AM
This answer has been confirmed as correct and helpful.
4
29. Access control list (ACL) and role-based access control (RBAC) are types of Access Control Models.
Added 32 days ago|7/7/2022 5:00:31 AM
This answer has been confirmed as correct and helpful.
4
30. Confidentiality is roughly equivalent to privacy. TRUE.
Added 32 days ago|7/7/2022 5:01:42 AM
This answer has been confirmed as correct and helpful.
4
31. If you know you receive a spam email, Ignore it and delete it.
Added 32 days ago|7/7/2022 5:03:41 AM
This answer has been confirmed as correct and helpful.
4
32. The first firewalls included design packet filters. TRUE.
Added 32 days ago|7/7/2022 5:05:19 AM
This answer has been confirmed as correct and helpful.
4
33. Fast and adaptive disaster recovery is essential for the worst case scenarios; that capacity is reliant on the existence of a comprehensive disaster recovery plan (DRP).
Added 32 days ago|7/7/2022 5:06:35 AM
This answer has been confirmed as correct and helpful.
4
34. Physical security is the protection of the actual hardware and networking components that store and transmit information resources.
Added 32 days ago|7/7/2022 5:07:32 AM
This answer has been confirmed as correct and helpful.
4
35. If you create a password and don't think you can remember it, you should: Write down a hint that only makes sense to you and keep it secure.
Added 32 days ago|7/7/2022 5:14:03 AM
This answer has been confirmed as correct and helpful.
4
36. A SSL certificate confirms your credentials when conducting business or other transactions on the web.
Added 32 days ago|7/7/2022 5:16:16 AM
This answer has been confirmed as correct and helpful.
4
37. A good antivirus program will both perform scans on your computer and provide real-time protection. TRUE.
Added 32 days ago|7/7/2022 5:18:41 AM
This answer has been confirmed as correct and helpful.
4
38. Accessibility is not part of the CIA security triad.
Added 32 days ago|7/7/2022 5:19:50 AM
This answer has been confirmed as correct and helpful.
4
39. Viruses are said to be self-replicating programs and date back as far as the early 1970s.
Added 32 days ago|7/7/2022 5:25:24 AM
This answer has been confirmed as correct and helpful.
4
40. Phishing emails are designed to mimic emails from trusted institutions. TRUE.
Added 32 days ago|7/7/2022 5:26:48 AM
This answer has been confirmed as correct and helpful.
3
A VPN allows a user who is outside of a corporate network to take a detour around the firewall and access the internal network from the outside.
Added 32 days ago|7/7/2022 3:52:54 AM
This answer has been confirmed as correct and helpful.
3
You don't have to protect yourself from criminal use of your information online. FALSE.
Added 32 days ago|7/7/2022 3:53:35 AM
This answer has been confirmed as correct and helpful.
3
Companies created BYOD policy allows employees to
integrate themselves more fully into their job and can bring higher employee satisfaction and productivity. BYOD means: Bring Your Own Device.
Added 32 days ago|7/7/2022 3:55:04 AM
This answer has been confirmed as correct and helpful.
3
It is safe to download files from the internet as long as you have antivirus installed. FALSE.
Added 32 days ago|7/7/2022 3:56:15 AM
This answer has been confirmed as correct and helpful.
3
6. Most e-mail and social media providers now have a two-factor authentication option.
Added 32 days ago|7/7/2022 4:00:36 AM
This answer has been confirmed as correct and helpful.
3
7. A security policy should be based on the guiding principles of confidentiality, integrity, and availability.
Added 32 days ago|7/7/2022 4:01:20 AM
This answer has been confirmed as correct and helpful.
3
8. Malware is software designed to protect your computer in some way. FALSE.
Added 32 days ago|7/7/2022 4:04:54 AM
This answer has been confirmed as correct and helpful.