A computer virus, much like a flu virus, is designed to spread from host to host but does not have the
ability to replicate itself. - Answers False
A virus operates by inserting or attaching itself to a legitimate program or document that supports
macros in order to execute its code. - Answers True
Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until
circumstances cause the computer or device to execute its code. - Answers True
Viruses can be spread through email and text message attachments, file downloads, and social media
scam links. - Answers True
A resident virus can take control when you start - or boot - your computer. - Answers False
A direct action virus exploits the code of browsers and pages - if you access such a page, the virus can
infect your computer. - Answers False
A polymorphic virus changes its code each time an infected file is executed, it does this to evade
antivirus programs. - Answers True
A micro virus is written in the same micro language used for software applications - such viruses
spread when you open an infected document, often through email attachments. - Answers False
A multipartite virus inserts malicious code into executable files - files used to perform certain
functions or operations on a system. - Answers False
CVE, in the context of our lectures, is the acronym for... - Answers Common Vulnerabilities and
Exposures
CISA, in the context of our lectures, is the acronym for... - Answers Cybersecurity and Infrastructure
Security Agency
The CVE program serves as the world's central repository of detailed information about software
vulnerabilities. - Answers True
CNA, in the context of our lectures, is the acronym for... - Answers CVE Numbering Authority
Security Controls, at a high level, are divided into the categories of controls - technical, managerial,
operational, and physical. - Answers True
Within the categories of controls are types of controls - deterrent, detective, corrective,
compensating, and directive. - Answers True
A script kiddie is someone who is highly skilled as a seasoned or professional hacker. - Answers False
Hacktivists are motivated by financial gain. - Answers False
Organized crime is usually motivated by monetary, control, espionage of some sort or even all of the
above. - Answers True
APT, in the context of our lectures, is the acronym for... - Answers Advanced Persistent Threat
APT organizations are, typically, supported by nation states and used to go after high level targets. -
Answers True
An insider is someone who is inside an organization whether it be a company or a governmental
entity. - Answers True
Competitors are motivated by gaining some type of an advantage whether it be to put another
company out of business or gain some type of an advantage for financial gain, speed to market, etc. -
Answers True
The Security Control category tells us what the control is actually doing. - Answers False
The Security Control type tells us how the control is implemented. - Answers False
Managerial Controls, also known as Administrative Controls, deal with policies, standards, risk
assessments, background checks, regulatory compliance, and so forth. - Answers True
Which of the following IS NOT an example of a Technical Control... - Answers Physical Security Drills
Which of the following IS NOT an example of a Operational Control... - Answers Access Control Lists
MFA, in the context of our lectures, is the acronym for... - Answers Multi-Factor Authentication
ACL, in the context of our lectures, is the acronym for... - Answers Access Control List
SAT, in the context of our lectures, is the acronym for... - Answers Security Awareness Training
IDS, in the context of our lectures, is the acronym for... - Answers Intrusion Detection System
IPS, in the context of our lectures, is the acronym for... - Answers Intrusion Prevention System
Defense in Depth is a strategy that leverages multiple security measures to protect an organization's
assets. - Answers True
VPN, in the context of our lectures, is the acronym for... - Answers Virtual Private Network
2FA is the accepted acronym for Two-Factor Authentication. - Answers True