A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?

CCST Cyber Flashcard Test #1

Flashcard
•
Quizizz Content
•
Information Technology (IT)
•
9th Grade
•
Hard
Student preview

8 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Back
Patient records
Answer explanation
Explanation: An email message is transmitted in plain text and can be read by anyone who has access to the data while it is en route to a destination. Patient records include confidential or sensitive information that should be transmitted in a secure manner.
2.
FLASHCARD QUESTION
Front
What is the best way to avoid getting spyware on a machine? Options: Install the latest antivirus updates, Install the latest web browser updates, Install software only from trusted websites, Install the latest operating system updates
Back
Install software only from trusted websites
3.
FLASHCARD QUESTION
Front
Which certification meets the U.S. Department of Defense Directive 8570.01-M requirements for IT security in the federal government? Options: ISC2 Certified Information Systems Security Professional, ISACA CSX Cybersecurity Fundamentals, Microsoft Technology Associate Security Fundamentals, EC Council Certified Ethical Hacker, CompTIA Security+
Back
CompTIA Security+
Answer explanation
Explanation: This is an entry-level security certification that meets the U.S. Department of Defense Directive 8570.01-M requirements, which is an important item for anyone looking to work in IT security for the federal government.
4.
FLASHCARD QUESTION
Front
Which certification tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner? Options: EC Council Certified Ethical Hacker, Palo Alto Networks Certified Cybersecurity Associate, ISC2 Certified Information Systems Security Professional, Microsoft Technology Associate Security Fundamentals, CompTIA Security+
Back
EC Council Certified Ethical Hacker
Answer explanation
Explanation: This certification tests your understanding and knowledge of how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker but in a lawful and legitimate manne
5.
FLASHCARD QUESTION
Front
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
Back
Weaknesses in security practices
Answer explanation
Explanation: Systems and sensitive data can be protected through techniques such as authentication, authorization and encryption. Developers should stick to using security techniques and libraries that have already been created, tested and verified and should not attempt to create their own security algorithms. These will only likely introduce new vulnerabilities.
6.
FLASHCARD QUESTION
Front
Which of the following firewalls filters traffic based on source and destination IP addresses? Network layer firewall, Proxy server, Application layer firewall
Back
Network layer firewall
7.
FLASHCARD QUESTION
Front
Which of the following firewalls filters web content requests such as URLs and domain names? Application layer firewall, Proxy server, Reverse proxy server, Network layer firewall, Network address translation firewall
Back
Proxy server
8.
FLASHCARD QUESTION
Front
When describing malware, what is a difference between a virus and a worm?
Back
A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.
Answer explanation
Explanation: Malware can be classified as follows:
Virus (self-replicates by attaching to another program or file)
Worm (replicates independently of another program)
Trojan horse (masquerades as a legitimate file or program)
Rootkit (gains privileged access to a machine while concealing itself)
Spyware (collects information from a target system)
Adware (delivers advertisements with or without consent)
Bot (waits for commands from the hacker)
Ransomware (holds a computer system or data captive until payment is received)
Similar Resources on Quizizz
9 questions
Bezpieczeństwo w sieci

Flashcard
•
KG
10 questions
Ripasso di Informatica

Flashcard
•
9th Grade
4 questions
Hacking/Scams flashcard for Mr. Hughes class

Flashcard
•
KG
11 questions
Malware and Viruses Mod.

Flashcard
•
7th - 8th Grade
8 questions
Cybersecurity Fundamentals Flashcard CCST #1

Flashcard
•
9th - 12th Grade
6 questions
Network Security Issues

Flashcard
•
8th Grade
11 questions
Malware and Viruses

Flashcard
•
7th - 8th Grade
5 questions
APPLICATION SOFTWARE

Flashcard
•
9th Grade
Popular Resources on Quizizz
19 questions
Naming Polygons

Quiz
•
3rd Grade
14 questions
Prime Factorization

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
21 questions
6th Grade Math CAASPP Practice

Quiz
•
6th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
35 questions
4th Grade Math SOL Review

Quiz
•
4th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
Discover more resources for Information Technology (IT)
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
20 questions
Managing Credit

Quiz
•
9th - 12th Grade
20 questions
Investing

Quiz
•
9th - 12th Grade
20 questions
EOC Math 1 Review

Quiz
•
9th Grade
20 questions
Insurance

Quiz
•
9th - 12th Grade
20 questions
Act 1 of Romeo and Juliet

Quiz
•
9th Grade
20 questions
Common Grammar Mistakes

Quiz
•
7th - 12th Grade