
Comp1300 Flashcard1
Flashcard
•
Information Technology (IT)
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

8 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which of the following best describes the concept of "Defense in Depth" in cybersecurity? Options: Using a single, highly secure firewall to protect an organization, Keeping all software up to date to prevent attacks, Disconnecting critical systems from the internet entirely.
Back
Implementing multiple layers of security controls to mitigate threats
2.
FLASHCARD QUESTION
Front
What was the primary cause of the 2020 Toll Group cyberattack?
Back
A ransomware attack that exploited an unpatched system.
3.
FLASHCARD QUESTION
Front
Which social engineering attack involves an attacker looking over someone's shoulder to steal information?
Back
Shoulder surfing
4.
FLASHCARD QUESTION
Front
What makes spear phishing different from regular phishing?
Back
It is highly targeted towards a specific individual or organization.
5.
FLASHCARD QUESTION
Front
Which of the following is an example of "system hardening"?
- Ignoring software updates to maintain compatibility
- Disabling unnecessary services and closing unused ports
- Using public Wi-Fi to improve accessibility
- Storing passwords in a text document for easy access
Back
Disabling unnecessary services and closing unused ports
6.
FLASHCARD QUESTION
Front
How can an organization protect itself from smishing attacks?
Back
By training employees not to click on suspicious links in text messages
7.
FLASHCARD QUESTION
Front
Which of the following best explains the concept of "cyber hygiene"? Regularly updating passwords and software to reduce vulnerabilities
Back
Regularly updating passwords and software to reduce vulnerabilities
8.
FLASHCARD QUESTION
Front
In cybersecurity governance, which of the following is the most common impact of a major data breach? Options: Companies refusing to adopt new security measures, The immediate firing of all IT personnel, Cybercriminals returning stolen data voluntarily.
Back
Financial losses, reputational damage, and regulatory fines
Similar Resources on Wayground
2 questions
W6.4
Flashcard
•
KG - University
2 questions
[2025]U5R2_Post-reading
Flashcard
•
University
6 questions
Unit 3.8 Market Structure
Flashcard
•
11th Grade
6 questions
Kartu Flash Pilihan Ganda
Flashcard
•
Professional Development
10 questions
Conversation between Jon and Mary
Flashcard
•
University
8 questions
Soalan Kelestarian Alam
Flashcard
•
Professional Development
11 questions
AT WORK 1
Flashcard
•
University
10 questions
Strategies to Avoid Communication Breakdown
Flashcard
•
11th - 12th Grade
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)
Quiz
•
8th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
9 questions
Principles of the United States Constitution
Interactive video
•
University
18 questions
Realidades 2 2A reflexivos
Quiz
•
7th Grade - University
10 questions
Dichotomous Key
Quiz
•
KG - University
25 questions
Integer Operations
Quiz
•
KG - University
7 questions
What Is Narrative Writing?
Interactive video
•
4th Grade - University
20 questions
SER vs ESTAR
Quiz
•
7th Grade - University