A company's cybersecurity trainer is recording a Lunch and Learn video for new
employees. The trainer discusses the dangers of spam. Besides being annoying,
what other problem could spam cause? - ANSWER-A spam email could contain a
link to what appears as a benign or beneficial website that could, if clicked, upload
malicious software to the user's computer.
A malicious person has installed ransomware on a company user's computer. The
ransomware message states that the malicious software will be removed if the user
pays a certain amount of money digitally. What is a typical form of payment? -
ANSWER-Cryptocurrency
A bank's online infrastructure has been under attack by hackers. In addition to
standard security methods, the bank's IT security manager has requested website
code to be examined and modified, where necessary, to address possible arbitrary
code execution. What will the code modifications prevent? - ANSWER-Buffer
overflows
Which type of hacker is a criminal whose career objective is to compromise IT
infrastructures? - ANSWER-Professional
The IT security officer for a large company has spent the past year upgrading
security for the corporate network. Employees working from home have personal
firewalls running on their computers. They use a virtual private network (VPN) to
connect to the corporate network. The corporate network utilizes the latest devices
and techniques, including an intrusion detection system/intrusion prevention system
(IDS/IPS), anti-malware protection, and firewalls. What security threat most likely still
needs to be addressed? - ANSWER-An internal threat, such as a disgruntled
employee or contractor
A major social networking site has been hacked. The usernames, passwords, and
security questions of more than 500 million users were compromised. The company
disclosed the breach to all users, advising them to immediately change their
passwords and security questions. The vulnerability that lead to the breach has been
discovered and patched. However, the security engineer suspects there is still a
problem left unaddressed. What is the most likely problem? - ANSWER-The hackers
may have left malicious tools within the network that will allow them continued
access.
An IT infrastructure manager is reviewing his company's computer assets,
particularly the mean time to failure (MTTF) of the PC and server hard drives. The
manufacturer of the hard drives typically used in the company states that the MTTF
is approximately 11 years. Because servers and some high-priority workstations
must operate continuously except for brief periods of maintenance, how many hours,
on average, can these hard drives be expected to operate before failure? -
ANSWER-More than 90,000 hours