List the following (final) Flashcards

(discontinued) there are no list the following in final.

1
Q

the scope of a PLM software:

A

1) comuter-aided design (CAD)
2) computer-aided engineering (CAE)
3) computer-aided manufacturing (CAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type of Exploits (Common attacks) includes:

A
  • Ransomware
  • Viruses
  • Worms
  • Trojan horses
  • Blended threat
  • Spam
  • Distributed denial-of-service - – attacks
  • Rootkits
  • Advanced persistent threat
  • Phishing, spear-phishing, - smishing and vishing
  • Identity theft
  • Cyberespionage and cyberterrorism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symptoms of rootkit infections:

A
  • Computer locks up or fails to respond to input from the keyboard
  • Screen saver changes without any action on the part of the user
  • Taskbar disappears
  • Network activities function extremely slow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A strong security program begins by:

A
  • Assessing threats to the computers and network.
  • Identifying actions that address the most serious vulnerabilities.
  • Educating users about the risks and actions they must take for prevention.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The security audit should:

A

Review who has access to particular systems and data and what level of authority each user has
- Test system safeguards to ensure that they are operating as intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To protect your privacy and your employer’s property:

A
  • Do not open files or click links in messages from people you do not know
  • Never send sensitive personal data via IM
  • Do not send personal or private IMs at work
  • Select a texting or IM app that receives high security ratings
  • Disable text preview
How well did you know this?
1
Not at all
2
3
4
5
Perfectly