Microsoft Cyber Security Questions with Accurate Answers
6 keer bekeken 0 keer verkocht
Vak
Cyber Security
Instelling
Cyber Security
Microsoft Cyber Security Questions with Accurate Answers
Which type of cyber attacks that an organizations internal network may be vulnerable to without firewall protection?
A: Denial of service
B:Malware
C: Breaking and entering
D:Ransomware
select all that apply
Denial of service, Ransom...
microsoft cyber security questions with accurate a
which type of cyber attacks that an organizations
what are the 4 trojan attacks exploit trojan downl
how to prevent ransomware limit the amount of pe
Geschreven voor
Cyber Security
Cyber Security
Verkoper
Volgen
julianah420
Ontvangen beoordelingen
Voorbeeld van de inhoud
Microsoft Cyber Security Questions with
Accurate Answers
- answer
Which type of cyber-attacks that an organizations internal network may be vulnerable to
without firewall protection?
A: Denial of service
B: Malware
C: Breaking and entering
D: Ransomware
select all that apply - answer Denial of service, Ransomware, Malware
What is Adware - answer Type of software that frequently shows ads to user and is
installed without their consent.
What is trojan attacks most common for? - answer user accidently introduces malicious
code and is activated behind the defensive fire wall via clinking links or unidentified
documents
What are the 4 trojan attacks - answerExploit Trojan
Downloader Trojan
Ransom Trojan
Backdoor Trojan
What are ransomware attacks? The 2nd most common form of trojan attacks - answerA
cybercrime to disrupt services by gaining access to systems and lock out the owner until
a demand is met.
How to prevent Ransomware - answerLimit the amount of people who has access to
your systems.
Use strong passwords
Keep systems up to date with security patches
Only allows authorization for certain people to use the system.
What are Botnet Attacks the 3rd most common - answerA bot that is basically a online
software whos task is automatic and repetitive to give organizations denial of services
by overloading the system with to many request for information and services from
Internet of Thing (IoT) that has an IP address
,For cyberattacks, what are the 3 threat landscapes? - answer1) the areas that are
vulnerable to attacks
2) The people liable to make an attack
3) The type of attacks used
What is Brute force attack in Poor password Protections - answerUsing a list of common
passwords in effort to gain access to a system
What is the threat order for Poor Password Protection in Vulnerability, Risk & Attack -
answerVulnerability: Poor password
Risk: Brute Force
Attack: Ransomware
What is the threat order for Malware attacks in Vulnerability, Risk & Attack -
answerVulnerability: Poor Cyber Hygiene
Risk: Trojans
Attack: Malware
What is Cyber Hygiene - answerMaintain healthy security of a systems by updating
software regularly and scanning for malware and unwanted elements, if not can lead to
malware attacks
How do malware attacks occur and what do they lead to - answerMalware occurs when
it gains a users legitimate access in their system to trigger codes within the system in
unintended ways via a hyper link or attachment document with directions.
What is the threat order for Virus attacks in Vulnerability, Risk and Attack -
answerVulnerability: Outdated software
Risk: Virus
Attack: Exploiting software bug
Outdated software can build up to risk of viruses and leave firewalls vulnerable
True or False - answerTrue
Which sentence best describes what the threat landscape is?
A:The threat landscape relates to all the dangerous exploits that can be performed on
an application.
B:The threat landscape relates to the application that is vulnerable to an attack.
C:The threat landscape relates to all potential vulnerabilities of an application, the
attackers that may be targeting this area, and the attacks that are used. - answerC
(Correct. It is an encompassing term that relates to the attack, area under attack and
the attackers.)
Question 2
True or False: Ransomware can involve locking someone out of their system?
A:True
, :B False - answerTrue (Correct. Ransomware prevents an owner from accessing their
application or data.)
Question 3
Which of the following are cybercrime exploits? Select all that apply.
A:Denial of Service
B:Software
C:Trojan - answerA (Correct! This is a type of malware that bombards your application
with requests to disrupt service.) and C (Correct! This involves sneaking some malicious
code past a firewall.)
Which of the following password traits would increase the risk of an attacker gaining
access to multiple accounts from the same user? Select all that apply.
A:Using the same email address and password across all accounts.
B:Using a mix of letters, numbers, and special characters.
C:Following a pattern for all passwords, like the name of a favorite vacation destination.
- answerA (Correct! If an attacker obtains the email address and password combination
from one account, it is likely that they will apply it elsewhere.) and C (Correct! People
frequently use patterns or personal information in their patterns, a trend that attackers
are aware of and will exploit.)
With the increased number of people working from home, which practices create more
points for potential attackers to enter a business' internal network? Select all that apply.
A: Employees accessing the network with remote access tools.
B: Businesses use different security tools for employees working from home.
C: Employees accessing the network with their personal devices, under the practice of
bring your own device (BYOD). - answerA (Correct! More employees entering the
network from outside means that the firewall must deal with more traffic.) and C
(Correct! Personal devices typically are not as secure as company-provided devices.)
Which component should you add to increase your computer's processing power?
A: Add more CPUs
B: Add more RAM
C: Add more power - answerAdd more CPU (Adding more CPUs will increase the
processing you can perform by adding additional cores.)
Ram only increases memory
What is the difference between Hardware and Software. - answerHardware is physical
and makes the device operate while Software gives instructions for the hardware to do
functions
What is non-volatile memory - answerNon-volatile memory is permeant for
computer/hard drive if power is being used or not.
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper julianah420. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €17,68. Je zit daarna nergens aan vast.