BCOR Cybersecurity Exam Questions and Answers All Correct
2 views 0 purchase
Module
BCOR Cybersecurity
Institution
BCOR Cybersecurity
BCOR Cybersecurity Exam Questions and Answers All Correct
What is the purpose of social engineering in conjunction with ransomware? - Answer-Tricks victims into allowing access to data
The security firewall serving Vantage's email program catches an impressive number of both irrelevant and ill...
BCOR Cybersecurity Exam Questions
and Answers All Correct
What is the purpose of social engineering in conjunction with ransomware? - Answer-
Tricks victims into allowing access to data
The security firewall serving Vantage's email program catches an impressive number of
both irrelevant and illegitimate messages, to the point where employees usually do not
even see them. Occasionally, however, an unsolicited message will catch managing
partner Carl's eye. Because one new message looks to come from a potential new
client, he's interested but careful, aware that the boutique consulting firm has a very
targeted marketing system and clients usually do not appear out of thin air. What type of
security concern is causing Carl's suspicion? - Answer-phishing
Why are probable loss calculations important? - Answer-Organizations have limited
funds to use toward system protections.
How does spyware potentially harm the individual user? - Answer-This malware steals
confidential information from the user
According to the CIA triad, in which of the following examples is an organization
ensuring data integrity? More than one answer may be correct - Answer-A corporation
backs up all of its data to a cloud server every night
An organization has a formal policy for alerting the IT department when employees
leave the company
Man-in-the-mobile (MitMo) occurs when - Answer-Malware infects smartphones and
other mobile devices
Describe the goals of the respond (RS) function of the NIST Cybersecurity Framework.
More than one answer may be correct. - Answer-Establish procedures that enable
action in the event of a cybersecurity incident
Be able to quickly analyze a detected cybersecurity issue
Be prepared to swiftly mitigate harm caused by a cybersecurity event
A man-in-the-mobile and a man-in-the-middle attack have what similar qualities? More
than one answer may be correct. - Answer-Harvesting personal information is the goal
of each cyber intrusion
, The user may not know the malware has infected the device
From the following list, select all the primary components of cybersecurity threat
mitigation. - Answer-Policies and procedures for threat prevention
Tools for threat identification
Policies, tools, and strategies for threat "curing" or minimization
A university's network was severely compromised by a systemwide attack that made
accessing records impossible. All files were encrypted and the tech team didn't have the
key. Administrators received what was essentially a ransom note: the network would be
restored after they paid a million dollars to an unknown actor. Which factors most
strongly influenced university administrators' decision whether or not to comply? More
than one answer may be correct. - Answer-Whether the university's tech support team
could decrypt the files themselves
Whether law enforcement could be identified and force the bad actor to decrypt the files
Explain the purpose of the National Institute of Standards Technology (NIST)
Cybersecurity Framework. - Answer-The NIST Cybersecurity Framework is a voluntary
guide that helps organizations understand and protect themselves against cybersecurity
risks
How are data in process different from data at rest or data in storage? - Answer-It is
held in the device's RAM until it can be processed by the CPU or GPU
Breanna, IS manager at a mid-size service firm, picks up some evidence that a Trojan
horse engineered to steal passwords has accessed the system. All members of project
teams are trained in online safety, and their network is protected by a firewall. But the
worse-case scenario has happened: a competitor has received protected information,
possibly directly from a member's computer. What first steps should Breanna and the
security team take to solve the problem? More than one answer may be correct. -
Answer-They should review everyone's activity log, looking for any downloaded files or
programs
The security group should sift through emails for a message with clickable links
In which situation should the origin of information be authenticated to protect data
integrity? - Answer-when electronic votes are submitted during an election
From the following list, select all the possible warning signs of social engineering
attacks - Answer-Emails or texts containing links to more info or a free download
Emails or web pages that request personal information in exchange for a free offer
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £10.87. You're not tied to anything after your purchase.