100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Microsoft Cyber Security Questions with Accurate Answers CA$25.97   Add to cart

Exam (elaborations)

Microsoft Cyber Security Questions with Accurate Answers

 6 views  0 purchase
  • Course
  • Cyber Security
  • Institution
  • Cyber Security

Microsoft Cyber Security Questions with Accurate Answers Which type of cyber attacks that an organizations internal network may be vulnerable to without firewall protection? A: Denial of service B:Malware C: Breaking and entering D:Ransomware select all that apply Denial of service, Ransom...

[Show more]

Preview 3 out of 26  pages

  • September 17, 2024
  • 26
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Cyber Security
  • Cyber Security
avatar-seller
Microsoft Cyber Security Questions with
Accurate Answers

- answer

Which type of cyber-attacks that an organizations internal network may be vulnerable to
without firewall protection?
A: Denial of service
B: Malware
C: Breaking and entering
D: Ransomware
select all that apply - answer Denial of service, Ransomware, Malware

What is Adware - answer Type of software that frequently shows ads to user and is
installed without their consent.

What is trojan attacks most common for? - answer user accidently introduces malicious
code and is activated behind the defensive fire wall via clinking links or unidentified
documents

What are the 4 trojan attacks - answerExploit Trojan
Downloader Trojan
Ransom Trojan
Backdoor Trojan

What are ransomware attacks? The 2nd most common form of trojan attacks - answerA
cybercrime to disrupt services by gaining access to systems and lock out the owner until
a demand is met.

How to prevent Ransomware - answerLimit the amount of people who has access to
your systems.
Use strong passwords
Keep systems up to date with security patches
Only allows authorization for certain people to use the system.

What are Botnet Attacks the 3rd most common - answerA bot that is basically a online
software whos task is automatic and repetitive to give organizations denial of services
by overloading the system with to many request for information and services from
Internet of Thing (IoT) that has an IP address

,For cyberattacks, what are the 3 threat landscapes? - answer1) the areas that are
vulnerable to attacks
2) The people liable to make an attack
3) The type of attacks used

What is Brute force attack in Poor password Protections - answerUsing a list of common
passwords in effort to gain access to a system

What is the threat order for Poor Password Protection in Vulnerability, Risk & Attack -
answerVulnerability: Poor password
Risk: Brute Force
Attack: Ransomware

What is the threat order for Malware attacks in Vulnerability, Risk & Attack -
answerVulnerability: Poor Cyber Hygiene
Risk: Trojans
Attack: Malware

What is Cyber Hygiene - answerMaintain healthy security of a systems by updating
software regularly and scanning for malware and unwanted elements, if not can lead to
malware attacks

How do malware attacks occur and what do they lead to - answerMalware occurs when
it gains a users legitimate access in their system to trigger codes within the system in
unintended ways via a hyper link or attachment document with directions.

What is the threat order for Virus attacks in Vulnerability, Risk and Attack -
answerVulnerability: Outdated software
Risk: Virus
Attack: Exploiting software bug

Outdated software can build up to risk of viruses and leave firewalls vulnerable
True or False - answerTrue

Which sentence best describes what the threat landscape is?
A:The threat landscape relates to all the dangerous exploits that can be performed on
an application.
B:The threat landscape relates to the application that is vulnerable to an attack.
C:The threat landscape relates to all potential vulnerabilities of an application, the
attackers that may be targeting this area, and the attacks that are used. - answerC
(Correct. It is an encompassing term that relates to the attack, area under attack and
the attackers.)

Question 2
True or False: Ransomware can involve locking someone out of their system?
A:True

, :B False - answerTrue (Correct. Ransomware prevents an owner from accessing their
application or data.)

Question 3
Which of the following are cybercrime exploits? Select all that apply.

A:Denial of Service
B:Software
C:Trojan - answerA (Correct! This is a type of malware that bombards your application
with requests to disrupt service.) and C (Correct! This involves sneaking some malicious
code past a firewall.)

Which of the following password traits would increase the risk of an attacker gaining
access to multiple accounts from the same user? Select all that apply.

A:Using the same email address and password across all accounts.
B:Using a mix of letters, numbers, and special characters.
C:Following a pattern for all passwords, like the name of a favorite vacation destination.
- answerA (Correct! If an attacker obtains the email address and password combination
from one account, it is likely that they will apply it elsewhere.) and C (Correct! People
frequently use patterns or personal information in their patterns, a trend that attackers
are aware of and will exploit.)

With the increased number of people working from home, which practices create more
points for potential attackers to enter a business' internal network? Select all that apply.

A: Employees accessing the network with remote access tools.
B: Businesses use different security tools for employees working from home.
C: Employees accessing the network with their personal devices, under the practice of
bring your own device (BYOD). - answerA (Correct! More employees entering the
network from outside means that the firewall must deal with more traffic.) and C
(Correct! Personal devices typically are not as secure as company-provided devices.)

Which component should you add to increase your computer's processing power?
A: Add more CPUs
B: Add more RAM
C: Add more power - answerAdd more CPU (Adding more CPUs will increase the
processing you can perform by adding additional cores.)
Ram only increases memory

What is the difference between Hardware and Software. - answerHardware is physical
and makes the device operate while Software gives instructions for the hardware to do
functions

What is non-volatile memory - answerNon-volatile memory is permeant for
computer/hard drive if power is being used or not.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$25.97. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79202 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$25.97
  • (0)
  Add to cart