IT0201 FORMATIVE 1 REVIEWER Flashcards
To gain knowledge
What is the best method to prevent Bluetooth from being exploited?
Always disable Bluetooth when it is not being used
What is the purpose of a rootkit?
To gain privileged access to a while concealing itself.
What was the primary objective of the Stuxnet malware?
Physical damage to computer-controlled equipment
Can you identify why each of the following organizations might be interested in your online identity?
Internet service providers
Advertisers
Social media platforms
Websites
Internet service providers - They may be legally required to share your online information with government surveillance agencies or authorities.
Advertisers - To monitor your onlilne activities and send targeted ads your way.
Social media platforms - To gather information based on your online activity, which is then shared with or sold to advertisers for a profit.
Websites - To track your activities using cookies in order to provide a more personalized experience.
How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?
Connect with a VPN Service
Today, there are single security appliances that will solve all the network security needs of an organization.
True or False
FALSE
What name is given to a device that controls or filters traffic going in or out of the network?
Firewall
What is the only way of ensuring that deleted files on your computer are irrecoverable?
Physically destroying your computer’s hard drive.
What is a security playbook?
A collection of repeatable queries or reports that outline a standardized process for incident detection and response.
How can you ensure information remains confidential?
Using username/password authentication, Setting file access permissions and Encrypting sensitive data.
What type of attack overwhelms a computer’s resources, crippling it through excessive memory usage or CPU strain?
algorithm
What does IoE stand for?
Internet of Everthing
What is the definition of vulnerability?
A susceptibility or flaw that exposes a target to potential exploitation or attack.
What is an example of a Internet data domain?
What type of attack overwhelms a target’s resources using multiply systems, rendering it inaccessible?
Distributed Denial-of-Service (DDoS)
Which three types of sensitive records are most attractive to cyber criminals?
Medical, Employment and Education