List the following (final) Flashcards
(discontinued) there are no list the following in final.
1
Q
the scope of a PLM software:
A
1) comuter-aided design (CAD)
2) computer-aided engineering (CAE)
3) computer-aided manufacturing (CAM)
2
Q
Type of Exploits (Common attacks) includes:
A
- Ransomware
- Viruses
- Worms
- Trojan horses
- Blended threat
- Spam
- Distributed denial-of-service - – attacks
- Rootkits
- Advanced persistent threat
- Phishing, spear-phishing, - smishing and vishing
- Identity theft
- Cyberespionage and cyberterrorism
3
Q
Symptoms of rootkit infections:
A
- Computer locks up or fails to respond to input from the keyboard
- Screen saver changes without any action on the part of the user
- Taskbar disappears
- Network activities function extremely slow
4
Q
A strong security program begins by:
A
- Assessing threats to the computers and network.
- Identifying actions that address the most serious vulnerabilities.
- Educating users about the risks and actions they must take for prevention.
5
Q
The security audit should:
A
Review who has access to particular systems and data and what level of authority each user has
- Test system safeguards to ensure that they are operating as intended
6
Q
To protect your privacy and your employer’s property:
A
- Do not open files or click links in messages from people you do not know
- Never send sensitive personal data via IM
- Do not send personal or private IMs at work
- Select a texting or IM app that receives high security ratings
- Disable text preview