100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Cybersecurity Management Exam Questions and Correct Answers Latest Update 2024 (Rated A+)

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
12-12-2024
Written in
2024/2025

Cybersecurity Management Exam Questions and Correct Answers Latest Update 2024 (Rated A+) threat environment - Answers types of attackers and attacks that companies face security goals - Answers confidentiality, integrity, availability confidentiality - Answers people cannot read sensitive information integrity - Answers attackers cannot change or destroy information availability - Answers people who are authorized to use information are not prevented from doing so compromises - Answers successful attacks countermeasures - Answers tools used to thwart attacks types of countermeasures - Answers preventative, detective, corrective sony attack method - Answers sql injection sql injection - Answers sending modified sql statements through web application to alter how sql statement is processed why are employees dangerous - Answers knowledge of systems, permissions to access systems, can avoid detection, trusted employee sabotage - Answers destruction of hardware, software, or data hacking - Answers intentionally accessing a computer resource without authorization or in excess of authorization employee financial theft - Answers misappropriation of funds employee extortion - Answers perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest other internal attackers - Answers contract workers malware - Answers evil software viruses - Answers programs that attach themselves to legitimate programs on the victim's machine; spread primarily by email worms - Answers stand-alone programs that do not attach themselves to other programs; can jump from one computer to another without human intervention on the receiving computer payloads - Answers pieces of code that do damage; implemented by viruses and worms after propagation how non-mobile malware is placed on computer - Answers by hackers; by virus or worm as part of payload; by victim downloading program; mobile code on a website can download trojan horse - Answers program that hides itself by deleting a system file and taking on the system file's name remote access trojans (RAT) - Answers allow the attacker to control your computer remotely spyware - Answers programs that gather information about you and make it available to the adversary (cookies, keystroke loggers, data mining) cookies - Answers small text strings stored on your PC by websites to remember passwords and what actions you took in a series of screens keystroke loggers - Answers capture all of your keystrokes; can then be searched for usernames, passwords, ss numbers, credit card numbers data mining spyware - Answers searches through your disk drives for personal information rootkits - Answers take control of the super user account (root, administrator) and use its privileges to hide themselves mobile code - Answers executable code on a webpage; code is executed automatically when the webpage is downloaded social engineering - Answers attempting to trick users into doing something that goes against security policies (spam, phishing) traditional hacker motives - Answers thrill of break-ins, validation of their skills, embarrassing victim anatomy of a hack - Answers target selection by reconnaissance probes and then the exploit reconnaissance probes - Answers casing the neighborhood with IP address scanning and port scanning exploit - Answers specific attack method that the attacker uses to break into the computer spoofing - Answers placing a different IP address in the source IP address field to frustrate efforts to find the attacker chain of attack computers - Answers if attacker needs replies from the victim, attacker works

Show more Read less
Institution
Cybersecurity Management
Course
Cybersecurity Management








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cybersecurity Management
Course
Cybersecurity Management

Document information

Uploaded on
December 12, 2024
Number of pages
4
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Cybersecurity Management Exam Questions and Correct Answers Latest Update 2024 (Rated A+)

threat environment - Answers types of attackers and attacks that companies face

security goals - Answers confidentiality, integrity, availability

confidentiality - Answers people cannot read sensitive information

integrity - Answers attackers cannot change or destroy information

availability - Answers people who are authorized to use information are not prevented from doing so

compromises - Answers successful attacks

countermeasures - Answers tools used to thwart attacks

types of countermeasures - Answers preventative, detective, corrective

sony attack method - Answers sql injection

sql injection - Answers sending modified sql statements through web application to alter how sql
statement is processed

why are employees dangerous - Answers knowledge of systems, permissions to access systems, can
avoid detection, trusted

employee sabotage - Answers destruction of hardware, software, or data

hacking - Answers intentionally accessing a computer resource without authorization or in excess of
authorization

employee financial theft - Answers misappropriation of funds

employee extortion - Answers perpetrator tries to obtain money or other goods by threatening to take
actions that would be against the victim's interest

other internal attackers - Answers contract workers

malware - Answers evil software

viruses - Answers programs that attach themselves to legitimate programs on the victim's machine;
spread primarily by email

worms - Answers stand-alone programs that do not attach themselves to other programs; can jump
from one computer to another without human intervention on the receiving computer

payloads - Answers pieces of code that do damage; implemented by viruses and worms after
propagation

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
359
Member since
1 year
Number of followers
16
Documents
29332
Last sold
4 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

55 reviews

5
19
4
14
3
12
2
0
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions