100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CIST 1601 Final Quiz | Questions with 100% Correct Answers

Rating
-
Sold
-
Pages
5
Grade
A
Uploaded on
17-07-2024
Written in
2023/2024

CIST 1601 Final Quiz | Questions with 100% Correct Answers Technologies like GIS and IoE contribute to the growth of large data stores. What are two reasons that these technologies increase the need for cybersecurity specialists? They collect sensitive information. They contain personal information Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information? black hat hackers Which statement best describes a motivation of hacktivists? They are part of a protest group behind a political cause. Which methods can be used to implement multifactor authentication? passwords and fingerprints Which technology can be implemented as part of an authentication system to verify the identification of employees? a smart card reader What are three states of data during which data is vulnerable? data in-process data in-transit stored data A security specialist is asked for advice on a security measure to prevent unauthorized hosts from accessing the home network of employees. Which measure would be most effective? Implement a firewall Which framework should be recommended for establishing a comprehensive information security management system in an organization? ISO/IEC 27000 What type of application attack occurs when data goes beyond the memory areas allocated to the application? buffer overflow An executive manager went to an important meeting. The secretary in the office receives a call from a person claiming that the executive manager is about to give an important presentation but the presentation files are corrupted. The caller sternly recommends that the secretary email the presentation right away to a personal email address. The caller also states that the executive is holding the secretary responsible for the success of this presentation. Which type of social engineering tactic would describe this scenario? Intimidation Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network? Worm What three best practices can help defend against social engineering attacks? Do not provide password resets in a chat window. Resist the urge to click on enticing web links. Educate employees regarding policies. A cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server crash. What is the type of attack the cyber criminal launches? DoS Which statement describes a distributed denial of service attack?" An attacker builds a botnet comprised of zombies A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised? Look for unauthorized accounts Which access control strategy allows an object owner to determine whether to allow access to the object? DAC Alice and Bob are using public key encryption to exchange a message. Which key should Alice use to encrypt a message to Bob? the public key of Bob An organization plans to implement security training to educate employees about security policies. What type of access control is the organization trying to implement? Administrative

Show more Read less
Institution
CIST 1601
Module
CIST 1601









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIST 1601
Module
CIST 1601

Document information

Uploaded on
July 17, 2024
Number of pages
5
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Jumuja Liberty University
Follow You need to be logged in order to follow users or courses
Sold
554
Member since
4 year
Number of followers
415
Documents
2709
Last sold
1 week ago

3.9

117 reviews

5
61
4
15
3
20
2
5
1
16

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions