Microsoft Cyber Security Questions with Accurate Answers
6 views 0 purchase
Course
Cyber Security
Institution
Cyber Security
Microsoft Cyber Security Questions with Accurate Answers
Which type of cyber attacks that an organizations internal network may be vulnerable to without firewall protection?
A: Denial of service
B:Malware
C: Breaking and entering
D:Ransomware
select all that apply
Denial of service, Ransom...
microsoft cyber security questions with accurate a
which type of cyber attacks that an organizations
what are the 4 trojan attacks exploit trojan downl
how to prevent ransomware limit the amount of pe
Written for
Cyber Security
Cyber Security
Seller
Follow
julianah420
Reviews received
Content preview
Microsoft Cyber Security Questions with
Accurate Answers
- answer
Which type of cyber-attacks that an organizations internal network may be vulnerable to
without firewall protection?
A: Denial of service
B: Malware
C: Breaking and entering
D: Ransomware
select all that apply - answer Denial of service, Ransomware, Malware
What is Adware - answer Type of software that frequently shows ads to user and is
installed without their consent.
What is trojan attacks most common for? - answer user accidently introduces malicious
code and is activated behind the defensive fire wall via clinking links or unidentified
documents
What are the 4 trojan attacks - answerExploit Trojan
Downloader Trojan
Ransom Trojan
Backdoor Trojan
What are ransomware attacks? The 2nd most common form of trojan attacks - answerA
cybercrime to disrupt services by gaining access to systems and lock out the owner until
a demand is met.
How to prevent Ransomware - answerLimit the amount of people who has access to
your systems.
Use strong passwords
Keep systems up to date with security patches
Only allows authorization for certain people to use the system.
What are Botnet Attacks the 3rd most common - answerA bot that is basically a online
software whos task is automatic and repetitive to give organizations denial of services
by overloading the system with to many request for information and services from
Internet of Thing (IoT) that has an IP address
,For cyberattacks, what are the 3 threat landscapes? - answer1) the areas that are
vulnerable to attacks
2) The people liable to make an attack
3) The type of attacks used
What is Brute force attack in Poor password Protections - answerUsing a list of common
passwords in effort to gain access to a system
What is the threat order for Poor Password Protection in Vulnerability, Risk & Attack -
answerVulnerability: Poor password
Risk: Brute Force
Attack: Ransomware
What is the threat order for Malware attacks in Vulnerability, Risk & Attack -
answerVulnerability: Poor Cyber Hygiene
Risk: Trojans
Attack: Malware
What is Cyber Hygiene - answerMaintain healthy security of a systems by updating
software regularly and scanning for malware and unwanted elements, if not can lead to
malware attacks
How do malware attacks occur and what do they lead to - answerMalware occurs when
it gains a users legitimate access in their system to trigger codes within the system in
unintended ways via a hyper link or attachment document with directions.
What is the threat order for Virus attacks in Vulnerability, Risk and Attack -
answerVulnerability: Outdated software
Risk: Virus
Attack: Exploiting software bug
Outdated software can build up to risk of viruses and leave firewalls vulnerable
True or False - answerTrue
Which sentence best describes what the threat landscape is?
A:The threat landscape relates to all the dangerous exploits that can be performed on
an application.
B:The threat landscape relates to the application that is vulnerable to an attack.
C:The threat landscape relates to all potential vulnerabilities of an application, the
attackers that may be targeting this area, and the attacks that are used. - answerC
(Correct. It is an encompassing term that relates to the attack, area under attack and
the attackers.)
Question 2
True or False: Ransomware can involve locking someone out of their system?
A:True
, :B False - answerTrue (Correct. Ransomware prevents an owner from accessing their
application or data.)
Question 3
Which of the following are cybercrime exploits? Select all that apply.
A:Denial of Service
B:Software
C:Trojan - answerA (Correct! This is a type of malware that bombards your application
with requests to disrupt service.) and C (Correct! This involves sneaking some malicious
code past a firewall.)
Which of the following password traits would increase the risk of an attacker gaining
access to multiple accounts from the same user? Select all that apply.
A:Using the same email address and password across all accounts.
B:Using a mix of letters, numbers, and special characters.
C:Following a pattern for all passwords, like the name of a favorite vacation destination.
- answerA (Correct! If an attacker obtains the email address and password combination
from one account, it is likely that they will apply it elsewhere.) and C (Correct! People
frequently use patterns or personal information in their patterns, a trend that attackers
are aware of and will exploit.)
With the increased number of people working from home, which practices create more
points for potential attackers to enter a business' internal network? Select all that apply.
A: Employees accessing the network with remote access tools.
B: Businesses use different security tools for employees working from home.
C: Employees accessing the network with their personal devices, under the practice of
bring your own device (BYOD). - answerA (Correct! More employees entering the
network from outside means that the firewall must deal with more traffic.) and C
(Correct! Personal devices typically are not as secure as company-provided devices.)
Which component should you add to increase your computer's processing power?
A: Add more CPUs
B: Add more RAM
C: Add more power - answerAdd more CPU (Adding more CPUs will increase the
processing you can perform by adding additional cores.)
Ram only increases memory
What is the difference between Hardware and Software. - answerHardware is physical
and makes the device operate while Software gives instructions for the hardware to do
functions
What is non-volatile memory - answerNon-volatile memory is permeant for
computer/hard drive if power is being used or not.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R334,45. You're not tied to anything after your purchase.