100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Microsoft Cyber Security Questions with Accurate Answers €17,68   In winkelwagen

Tentamen (uitwerkingen)

Microsoft Cyber Security Questions with Accurate Answers

 6 keer bekeken  0 keer verkocht
  • Vak
  • Cyber Security
  • Instelling
  • Cyber Security

Microsoft Cyber Security Questions with Accurate Answers Which type of cyber attacks that an organizations internal network may be vulnerable to without firewall protection? A: Denial of service B:Malware C: Breaking and entering D:Ransomware select all that apply Denial of service, Ransom...

[Meer zien]

Voorbeeld 3 van de 26  pagina's

  • 17 september 2024
  • 26
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • Cyber Security
  • Cyber Security
avatar-seller
Microsoft Cyber Security Questions with
Accurate Answers

- answer

Which type of cyber-attacks that an organizations internal network may be vulnerable to
without firewall protection?
A: Denial of service
B: Malware
C: Breaking and entering
D: Ransomware
select all that apply - answer Denial of service, Ransomware, Malware

What is Adware - answer Type of software that frequently shows ads to user and is
installed without their consent.

What is trojan attacks most common for? - answer user accidently introduces malicious
code and is activated behind the defensive fire wall via clinking links or unidentified
documents

What are the 4 trojan attacks - answerExploit Trojan
Downloader Trojan
Ransom Trojan
Backdoor Trojan

What are ransomware attacks? The 2nd most common form of trojan attacks - answerA
cybercrime to disrupt services by gaining access to systems and lock out the owner until
a demand is met.

How to prevent Ransomware - answerLimit the amount of people who has access to
your systems.
Use strong passwords
Keep systems up to date with security patches
Only allows authorization for certain people to use the system.

What are Botnet Attacks the 3rd most common - answerA bot that is basically a online
software whos task is automatic and repetitive to give organizations denial of services
by overloading the system with to many request for information and services from
Internet of Thing (IoT) that has an IP address

,For cyberattacks, what are the 3 threat landscapes? - answer1) the areas that are
vulnerable to attacks
2) The people liable to make an attack
3) The type of attacks used

What is Brute force attack in Poor password Protections - answerUsing a list of common
passwords in effort to gain access to a system

What is the threat order for Poor Password Protection in Vulnerability, Risk & Attack -
answerVulnerability: Poor password
Risk: Brute Force
Attack: Ransomware

What is the threat order for Malware attacks in Vulnerability, Risk & Attack -
answerVulnerability: Poor Cyber Hygiene
Risk: Trojans
Attack: Malware

What is Cyber Hygiene - answerMaintain healthy security of a systems by updating
software regularly and scanning for malware and unwanted elements, if not can lead to
malware attacks

How do malware attacks occur and what do they lead to - answerMalware occurs when
it gains a users legitimate access in their system to trigger codes within the system in
unintended ways via a hyper link or attachment document with directions.

What is the threat order for Virus attacks in Vulnerability, Risk and Attack -
answerVulnerability: Outdated software
Risk: Virus
Attack: Exploiting software bug

Outdated software can build up to risk of viruses and leave firewalls vulnerable
True or False - answerTrue

Which sentence best describes what the threat landscape is?
A:The threat landscape relates to all the dangerous exploits that can be performed on
an application.
B:The threat landscape relates to the application that is vulnerable to an attack.
C:The threat landscape relates to all potential vulnerabilities of an application, the
attackers that may be targeting this area, and the attacks that are used. - answerC
(Correct. It is an encompassing term that relates to the attack, area under attack and
the attackers.)

Question 2
True or False: Ransomware can involve locking someone out of their system?
A:True

, :B False - answerTrue (Correct. Ransomware prevents an owner from accessing their
application or data.)

Question 3
Which of the following are cybercrime exploits? Select all that apply.

A:Denial of Service
B:Software
C:Trojan - answerA (Correct! This is a type of malware that bombards your application
with requests to disrupt service.) and C (Correct! This involves sneaking some malicious
code past a firewall.)

Which of the following password traits would increase the risk of an attacker gaining
access to multiple accounts from the same user? Select all that apply.

A:Using the same email address and password across all accounts.
B:Using a mix of letters, numbers, and special characters.
C:Following a pattern for all passwords, like the name of a favorite vacation destination.
- answerA (Correct! If an attacker obtains the email address and password combination
from one account, it is likely that they will apply it elsewhere.) and C (Correct! People
frequently use patterns or personal information in their patterns, a trend that attackers
are aware of and will exploit.)

With the increased number of people working from home, which practices create more
points for potential attackers to enter a business' internal network? Select all that apply.

A: Employees accessing the network with remote access tools.
B: Businesses use different security tools for employees working from home.
C: Employees accessing the network with their personal devices, under the practice of
bring your own device (BYOD). - answerA (Correct! More employees entering the
network from outside means that the firewall must deal with more traffic.) and C
(Correct! Personal devices typically are not as secure as company-provided devices.)

Which component should you add to increase your computer's processing power?
A: Add more CPUs
B: Add more RAM
C: Add more power - answerAdd more CPU (Adding more CPUs will increase the
processing you can perform by adding additional cores.)
Ram only increases memory

What is the difference between Hardware and Software. - answerHardware is physical
and makes the device operate while Software gives instructions for the hardware to do
functions

What is non-volatile memory - answerNon-volatile memory is permeant for
computer/hard drive if power is being used or not.

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper julianah420. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €17,68. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 67474 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€17,68
  • (0)
  Kopen