Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Protect Your Clients - A Practical Guide to Cybersecurity (Oregon) Exam 2023 with complete solution

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
15-02-2024
Written in
2023/2024

Protect Your Clients - A Practical Guide to Cybersecurity (Oregon) Exam 2023 with complete solution Protect Your Clients - A Practical Guide to Cybersecurity (Oregon) Quiz 1: Reasons for Cybersecurity A hacker who can be hired to assist your company with identifying weaknesses in the cybersecurity protections is known as a: A) Grey Hat Hacker. B) White Hat Hacker. C) Hacktivist. D) Black Hat Hacker. B) White Hat Hacker. White hat hackers are hackers who sell their services and skills to "test" the firewalls and security methods your company has put in place. White hat hackers will not invade your company's security mechanisms without approval; while grey hat hackers will breach systems without permission before informing your company. According to the National Cyber Security Alliance, what percentage of small or midsized companies go out of business within six months of being hacked? A) 30% B) 50% C) 60% D) 90% C) 60% The NCSA estimates that some 60% of small and midsize companies go bankrupt within a half year of being hacked. This is typically because the companies must pay for the forensics and insurance. Modern technology has begun to link digital consumer goods, such as cell phones, smart printers, and computers, allowing machines to learn your patterns or otherwise connect all devices together for ease of use. What is the term we use for this network? A) The Internet of Things B) The Smart Connect C) The device-web D) The Digital Network A) The Internet of Things The Internet of Things refers to the connected web of consumer digital devices. While the Internet of Things can be convenient and assist a company's efficiency, it also opens up different avenues for hackers to exploit vulnerabilities within that digital network. All of the following are broad descriptions of cyber-attacks EXCEPT A) attacks on integrity. B) attacks on confidentiality. C) attacks on availability. D) attacks on personnel. D) attacks on personnel. Attacks on availability, confidentiality, and integrity are the broad descriptions of cyberattacks. Attacks on availability limit access to networks, attacks on integrity limits the credibility of your systems;,and attacks on confidentiality are violations of your company's privacy. A real estate agent's email account was compromised. The hacker was able to send an email to a client explaining that "last-minute closing changes" required a "correction" to a bank account number being used to hold closing cost funds. The client followed the email's instructions and transferred the money to pay for closing costs to the updated bank account. When the client was contacted by the real estate agent and learned that the earlier email was a spoof, they soon discovered that the transferred money had been removed from the account and was unrecoverable. What would this sort of attack be considered? A) Attack on availability B) Attack on confidentiality C) Advanced persistent threat D) Attack on integrity D) Attack on integrity This would be an example of an attack on integrity because it uses the credibility of the real estate agent's email account to convince the client to change closing information. Quiz 2: Cyber Threats Which of the following best describes baiting? A) Directing a client to transfer their closing funds to an escrow company B) Sending an email with the subject line, "YOU ARE A WINNER!" C) Intentionally leaving a trojan-infected USB device on the sidewalk D) Searching for unsecured wifi networks to use as the source for an attack C) Intentionally leaving a trojan-infected USB device on the sidewalk Baiting is oftentimes a very simple form of social engineering where a cd, laptop, or USB stick is left in the open to tempt the victim into using the device. Brute-force password attacks can break through a password by randomly guessing the codes. Which of the following measures would best prevent a successful password attack? A) Making the password longer than 10 characters B) Using words that are commonly found in a dictionary C) Using a combination of uppercase and lowercase letters D) Adding a letter to the end of a 4-digit numeric password A) Making the password longer than 10 characters Longer passwords are more difficult to crack with brute force password programs. In general, a longer password will be harder to crack than a password with symbols or upper case/lower case letters. A Distributed Denial of Services (DDoS) attack oftentimes involves simultaneously using a large number of computers and digital devices to send an unsustainable amount of traffic to a single website. Those computers are controlled with assorted malwares that are controlled from a host computer. What do we call the collection of computers that performs the DDoS? A) A distributed strike B) A digital horde C) A remote swarm D) A botnet D) A botnet The collection of computers and devices like phones and tablets is known as a botnet. It is usually a remotely controlled network of slave devices that can be sent en masse to a target site. Tyrone received an email that read, "You are included in a settlement for overcharging at Local Gas Station." The email explained that the local gas station had lost a lawsuit for overcharging customers. Anyone who lived around Local Gas Station was to receive a $150 check, so long as they could prove they bought gasoline there in the past four months. The email asked for proof of address and a credit card number that investigators could cross-check with Local Gas Station purchase records. When Tyrone Googled "Local Gas Station lawsuit" there were no articles or information about any lawsuit. What is this email likely an example of? A) A phishing scheme B) A Quid Pro Quo arrangement C) A contact spamming scheme D) A doxing attack A) A phishing scheme An email claiming to provide money in exchange for personal or financial information is often a clear example of a phishing scheme. By investigating the information a little, Tyrone was able to discover that the information in the email was not real. Which of the following would be an example of a Quid Pro Quo attack? A) A hacker buys an old, decommissioned work laptop from a company and locates a draft document hidden deep in the laptop's archives that has a current server password. The hacker uses that password to break into the company's servers. B) A hacker calls every business in the area pretending to be tech support. When one company responds that they were waiting to hear back from tech support, the hacker proceeds to assist the company with the problem, but requests passwords and account information in order to "fix the problem." C) A hacker puts on a maintenance crew uniform and slips into the company's server room without being stopped. The hacker then uses a USB drive to copy all the documents on the servers and walks out without being noticed. D) An employee accidentally clicks on a link and allows a hacker to install a backdoor into his computer. The hacker uses the backdoor to copy valuable data. B) A hacker calls every business in the area pretending to be tech support. When one company responds that they were waiting to hear back from tech support, the hacker proceeds to assist the company with the problem, but requests passwords and account information in order to "fix the problem." A Quid Pro Quo attack involves giving the victim something in exchange for valuable information that is then used to further breach the company's data. It requires that the employee or company intentionally give the hacker data in exchange for money or services, so simply buying a laptop or USB drive that accidentally has information still on it may not necessarily be a Quid Pro Quo breach. Misha works for a bank that recently extended a loan to an unpopular natural gas pipeline project. A hacktivist sent Misha an anonymous message explaining that she had broken into Misha's files and copied all her documents, including personal emails to Misha's sister complaining about her boss. The hacktivist threated to publicize the documents and to send her direct superiors the personal emails if Misha did not assist the hacktivist in taking down the bank. What has Misha become a victim of? A) A Quid Pro Quo attack B) A Drive-By attack C) Doxing D) Baiting C) Doxing Misha is potentially a victim of Doxing; the hacker is using the threat of public release of personal documents to harm Misha or to otherwise force her to act against her own interests. ABC Realty company received a strange email from their bank the week before that simply read, "Urgent!" All 15 of the ABC employees opened the email and found nothing in it but a strange file that did nothing when opened. All the computers were operating perfectly normal for a few weeks. Eventually the employees forgot about the strange email. When everyone returned after New Year's Day, every document on all the computers had been changed into a trojan virus file. What likely happened to ABC? A) The computers were subject to a zero-day infection at the same time. B) The original email contained a Logic Bomb that was set to go off on New Year's Day. C) The hacker installed backdoors on all the computers and waited until January 1 to damage the company. D) The original email contained a worm that was slowly replicating itself over months. B) The original email contained a Logic Bomb that was set to go off on New Year's Day. By nature of the sudden, coordinated attack on the computers, it is likely that ABC was hit with a Logic Bomb that was set to "explode" and replace all files at a specific date. Business email compromise (BEC) is the term describing a large, organized effort to defraud and deceive CEOs and CFOs of large businesses. BEC typically involves spoofed emails and accounts to trick the CEO into responding with passwords or valuable information. BEC is a variation of which of the following? A) Spear phishing B) Baiting C) Pretexting D) Trojan Horse A) Spear phishing Business Email Compromises are a form of spear phishing, which is a form of social engineering phishing attack. BEC is a more targeted variation though, sometimes known as whaling, since it's a form of phishing for the largest targets. Alexa works for ABC brokerage. Alexa received an urgent email from the CFO that explained a recent cyberattack may have compromised some of their contact information and modified some of the direct deposit account information; the CFO requested that all employees email him photocopies of their driver's license and a bank statement so he could cross-reference all the information. What should Alexa do to make sure her information is safe? A) She should send the information to the CFO as he requested. B) She should convince the company to update their antivirus software to prevent issues like this from happening again. C) She should wait until the next pay period to see if her information was compromised. D) She should call a secured number or attempt to directly speak with the CFO to see if the email was legitimate. D) She should call a secured number or attempt to directly speak with the CFO to see if the email was legitimate. When a financial employee requests copies of information like drivers' licenses or bank statements, it is oftentimes better to provide the information in person. Sending personally-identifying information by email is potentially risky. If the CFO's email account was compromised, then any messages sent to the email may be seen by a criminal party. Quiz 3: Cyber Responses Which of the following is NOT one of the four components of a valid electronic signature? A) The signing party has intent to sign the electronic document B) The electronically signed document is associated with the record C) Only one party needs to consent to doing business electronically D) There must be a record of the transaction that is retained C) Only one party needs to consent to doing business electronically For a valid electronic signature, both parties must intend to use electronic records for

Show more Read less
Institution
Course

Content preview

Protect Your Clients - A Practical Guide to Cybersecurity
(Oregon) Exam 2023 with complete solution
Protect Your Clients - A Practical Guide to Cybersecurity (Oregon)
Quiz 1: Reasons for Cybersecurity
A hacker who can be hired to assist your company with identifying weaknesses
in the cybersecurity protections is known as a:
A) Grey Hat Hacker.
B) White Hat Hacker.
C) Hacktivist.
D) Black Hat Hacker.
B) White Hat Hacker.

White hat hackers are hackers who sell their services and skills to "test" the firewalls
and security methods your company has put in place. White hat hackers will not invade
your company's security mechanisms without approval; while grey hat hackers will
breach systems without permission before informing your company.
According to the National Cyber Security Alliance, what percentage of small or
midsized companies go out of business within six months of being hacked?
A) 30%
B) 50%
C) 60%
D) 90%
C) 60%

The NCSA estimates that some 60% of small and midsize companies go bankrupt
within a half year of being hacked. This is typically because the companies must pay for
the forensics and insurance.
Modern technology has begun to link digital consumer goods, such as cell
phones, smart printers, and computers, allowing machines to learn your patterns
or otherwise connect all devices together for ease of use. What is the term we use
for this network?
A) The Internet of Things
B) The Smart Connect
C) The device-web
D) The Digital Network
A) The Internet of Things

The Internet of Things refers to the connected web of consumer digital devices. While
the Internet of Things can be convenient and assist a company's efficiency, it also
opens up different avenues for hackers to exploit vulnerabilities within that digital
network.
All of the following are broad descriptions of cyber-attacks EXCEPT
A) attacks on integrity.
B) attacks on confidentiality.

,C) attacks on availability.
D) attacks on personnel.
D) attacks on personnel.

Attacks on availability, confidentiality, and integrity are the broad descriptions of
cyberattacks. Attacks on availability limit access to networks, attacks on integrity limits
the credibility of your systems;,and attacks on confidentiality are violations of your
company's privacy.
A real estate agent's email account was compromised. The hacker was able to
send an email to a client explaining that "last-minute closing changes" required a
"correction" to a bank account number being used to hold closing cost funds.
The client followed the email's instructions and transferred the money to pay for
closing costs to the updated bank account.
When the client was contacted by the real estate agent and learned that the
earlier email was a spoof, they soon discovered that the transferred money had
been removed from the account and was unrecoverable. What would this sort of
attack be considered?
A) Attack on availability
B) Attack on confidentiality
C) Advanced persistent threat
D) Attack on integrity
D) Attack on integrity

This would be an example of an attack on integrity because it uses the credibility of the
real estate agent's email account to convince the client to change closing information.
Quiz 2: Cyber Threats
Which of the following best describes baiting?
A) Directing a client to transfer their closing funds to an escrow company
B) Sending an email with the subject line, "YOU ARE A WINNER!"
C) Intentionally leaving a trojan-infected USB device on the sidewalk
D) Searching for unsecured wifi networks to use as the source for an attack
C) Intentionally leaving a trojan-infected USB device on the sidewalk

Baiting is oftentimes a very simple form of social engineering where a cd, laptop, or
USB stick is left in the open to tempt the victim into using the device.
Brute-force password attacks can break through a password by randomly
guessing the codes. Which of the following measures would best prevent a
successful password attack?
A) Making the password longer than 10 characters
B) Using words that are commonly found in a dictionary
C) Using a combination of uppercase and lowercase letters
D) Adding a letter to the end of a 4-digit numeric password
A) Making the password longer than 10 characters

Longer passwords are more difficult to crack with brute force password programs. In

, general, a longer password will be harder to crack than a password with symbols or
upper case/lower case letters.
A Distributed Denial of Services (DDoS) attack oftentimes involves
simultaneously using a large number of computers and digital devices to send an
unsustainable amount of traffic to a single website. Those computers are
controlled with assorted malwares that are controlled from a host computer. What
do we call the collection of computers that performs the DDoS?
A) A distributed strike
B) A digital horde
C) A remote swarm
D) A botnet
D) A botnet

The collection of computers and devices like phones and tablets is known as a botnet. It
is usually a remotely controlled network of slave devices that can be sent en masse to a
target site.
Tyrone received an email that read, "You are included in a settlement for
overcharging at Local Gas Station." The email explained that the local gas station
had lost a lawsuit for overcharging customers. Anyone who lived around Local
Gas Station was to receive a $150 check, so long as they could prove they bought
gasoline there in the past four months. The email asked for proof of address and
a credit card number that investigators could cross-check with Local Gas Station
purchase records. When Tyrone Googled "Local Gas Station lawsuit" there were
no articles or information about any lawsuit.
What is this email likely an example of?
A) A phishing scheme
B) A Quid Pro Quo arrangement
C) A contact spamming scheme
D) A doxing attack
A) A phishing scheme

An email claiming to provide money in exchange for personal or financial information is
often a clear example of a phishing scheme. By investigating the information a little,
Tyrone was able to discover that the information in the email was not real.
Which of the following would be an example of a Quid Pro Quo attack?
A) A hacker buys an old, decommissioned work laptop from a company and
locates a draft document hidden deep in the laptop's archives that has a current
server password. The hacker uses that password to break into the company's
servers.
B) A hacker calls every business in the area pretending to be tech support. When
one company responds that they were waiting to hear back from tech support,
the hacker proceeds to assist the company with the problem, but requests
passwords and account information in order to "fix the problem."
C) A hacker puts on a maintenance crew uniform and slips into the company's
server room without being stopped. The hacker then uses a USB drive to copy all
the documents on the servers and walks out without being noticed.

Written for

Course

Document information

Uploaded on
February 15, 2024
Number of pages
16
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$16.48
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUICKEXAMINER Walden University
Follow You need to be logged in order to follow users or courses
Sold
92
Member since
2 year
Number of followers
44
Documents
5420
Last sold
1 week ago
QUICK EXAMINER

Looking for high-quality study materials to help you excel? You’re in the right place! I provide well-structured notes, summaries, essays, and research papers across various subjects, all designed to make studying easier and more efficient. Why Choose My Materials? ✔ Comprehensive and well-organized content ✔ Easy-to-understand explanations ✔ Time-saving summaries for exams and research ✔ Carefully curated to ensure accuracy and clarity Each document is crafted to provide valuable insights, helping you grasp concepts quickly and effectively. Whether you're preparing for exams, writing an assignment, or just need clear and concise notes, my resources will support your academic journey. Browse my collection and take your studies to the next level

Read more Read less
3.6

15 reviews

5
5
4
5
3
2
2
0
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions