WITH CORRECT ANSWERS
Which Windows feature provides information to users and obtains their approval before
a program can make a change to the computer's settings? - Answer- User Account
Control
Which of the following ensures that information is correct and no unauthorized person or
malware software has altered it? - Answer- Integrity
What is a flaw or weakness that allows a threat agent to bypass security? - Answer-
vulnerability
What can an attacker use to divert all mail to their post office box so that the victim is
never aware that personal information has been stolen? - Answer- change-of-address
form
With which type of social engineering attack are users asked to respond to an email or
are directed to a website where they are requested to update personal information, such
as passwords or credit card numbers? - Answer- phishing
Which of the following is NOT a factor that contributes to difficulties faced in defending
against attacks? - Answer- Enhanced encryption algorithms
How do attackers today make it difficult to distinguish an attack from legitimate traffic? -
Answer- by using common internet protocols
What type of spyware silently and stores each keystroke that a user types on the
computer keyboard? - Answer- keylogger
Under which law must healthcare enterprise guard protected health information and
implement policies and procedures to safeguard it, whether it be in paper or electronic
format? - Answer- HIPPA
What type of malware is typically added to a legitimate program but lies dormant until it
is triggered by a specific event? - Answer- logic bomb
Which of the following is a characteristic of a weak password? - Answer- used on
multiple accounts