Comp1300 Flashcard1

Comp1300 Flashcard1

Assessment

Flashcard

Information Technology (IT)

University

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

8 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which of the following best describes the concept of "Defense in Depth" in cybersecurity? Options: Using a single, highly secure firewall to protect an organization, Keeping all software up to date to prevent attacks, Disconnecting critical systems from the internet entirely.

Back

Implementing multiple layers of security controls to mitigate threats

2.

FLASHCARD QUESTION

Front

What was the primary cause of the 2020 Toll Group cyberattack?

Back

A ransomware attack that exploited an unpatched system.

3.

FLASHCARD QUESTION

Front

Which social engineering attack involves an attacker looking over someone's shoulder to steal information?

Back

Shoulder surfing

4.

FLASHCARD QUESTION

Front

What makes spear phishing different from regular phishing?

Back

It is highly targeted towards a specific individual or organization.

5.

FLASHCARD QUESTION

Front

Which of the following is an example of "system hardening"?
- Ignoring software updates to maintain compatibility
- Disabling unnecessary services and closing unused ports
- Using public Wi-Fi to improve accessibility
- Storing passwords in a text document for easy access

Back

Disabling unnecessary services and closing unused ports

6.

FLASHCARD QUESTION

Front

How can an organization protect itself from smishing attacks?

Back

By training employees not to click on suspicious links in text messages

7.

FLASHCARD QUESTION

Front

Which of the following best explains the concept of "cyber hygiene"? Regularly updating passwords and software to reduce vulnerabilities

Back

Regularly updating passwords and software to reduce vulnerabilities

8.

FLASHCARD QUESTION

Front

In cybersecurity governance, which of the following is the most common impact of a major data breach? Options: Companies refusing to adopt new security measures, The immediate firing of all IT personnel, Cybercriminals returning stolen data voluntarily.

Back

Financial losses, reputational damage, and regulatory fines