Professional Documents
Culture Documents
White hat
Hacker
Hacktivist
Blue hat
Users report that a database file on the main server cannot be accessed. A
database administrator verifies the issue and notices that the database file is now
encrypted. The organization receives a threatening email demanding payment for
the decryption of the database file. What type of attack has the organization
experienced?
man-in-the-middle attack
DoS attack
ransomware
Trojan horse
A computer is presenting a user with a screen requesting payment before the user
data is allowed to be accessed by the same user. What type of malware is this?
A type of virus
A type of logic bomb
A type of ransomware
A type of worm
Noteriety
Money
Political, social or moral
explorer
disagreement
Cyber criminal
Ideology
Hacktivist
The political interest of their
Cyber terrorist
country’s government
Cyber warrior
wine and gambling
Fame
Intimidation through
disruption and damage
Peace through
understanding
Buffer overflow
Bluesnarfing
Juice hacking
Juice jacking
Whaling
phisphing
Code that does not behave in the manner intended by its author
An unwanted file or program that can cause harm to, or compromise data on a computer
Identify two best practices for physical security awareness. (Choose two.)
Always be considerate, such as holding the door open for people, even if you don’t know them.
Keep your desk free of any proprietary or confidential information.
Lock your computer screen and mobile devices every time you step away.
Follow your organization’s security policies unless they hinder efficiency.
Which precaution should you take if you receive an email that involves the movement of money, such as
the payment of an invoice, even if it is from someone you know?
Pay it immediately to avoid late fees.
Look for spelling mistakes in the email. If you find any, delete the email. It’s obviously a scam.
Reply to the email and ask them to provide proof of their identity.
Use another form of trusted communication to verify that the message is legitimate.
Which statement describes the difference between spearphishing, whaling, and vishing
involve hackers hanging out at internet forums who then collect information about individuals to target,
while the others are aimed at a wide audience.
are directed against smaller players—small fish you might say, while the others use social media sites.
are aimed at a wide audience, while the others are directed toward individuals or specific
organizations.
use social media and social engineering techniques to lure their victims, while the others primary use
email.