Question 1
A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source is:
Answer: Spear Phishing
Reason: Spear Phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific individual, often by masquerading as a trustworthy entity or person in electronic communications.
Question 2
A malicious attack where hackers encrypt an organization's data and demand payment to restore access is known as:
Answer: Ransomware
Reason: Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid.
Question 3
Which of the following characteristics are most likely to be found in a phishing email?
Answer: All of the above
Reason: Phishing emails often have a sense of urgency, unusual or inappropriate requests, and incorrect sender name or email address to deceive the recipient into taking immediate action without due diligence.
Question 4
From a managerial perspective, Information Security is generally understood as a:
Answer: Product, Technology, and Process
Reason: Information Security encompasses multiple dimensions including products (security software), technologies (encryption), and processes (policies and procedures) to protect information.
Question 5
The practice of keeping an organization's network infrastructure secure from unauthorized access is known as:
Answer: Network Security
Reason: Network Security involves measures to protect the integrity, confidentiality, and accessibility of networks and data through hardware and software technologies.
Question 6
Which of the following statements most accurately reflects the complex role of technology in cybersecurity?
Answer: Technology serves as a defense weapon against cyberattacks.
Reason: Technology is not only a potential source of threats but also acts as a crucial defense mechanism in protecting assets and information from cyberattacks.
Question 7
____ is a manipulation technique that exploits human weakness to gain private information, access, or valuables.
Answer: Social Engineering
Reason: Social Engineering is the art of manipulating people so they give up confidential information, often exploiting human psychology rather than technical hacking techniques.
Question 8
True or False: The word "Cyber" in "Cybernetics" originates from the French language.
Answer: False
Reason: The word "Cyber" in "Cybernetics" originates from the Greek word "kybernetes" which means steersman, governor, pilot, or rudder.
Question 9
The impact of a cyber security incident on organizations can include:
Answer: All of the above
Reason: Cybersecurity incidents can lead to financial loss, regulatory fines, and reputational damage, impacting the organization's operations and trustworthiness.
Question 10
True or False: A Vendor guarantees that their IoT solutions are 100% safe from cyberattacks. This statement can be:
Answer: False
Reason: No vendor can guarantee 100% safety from cyberattacks due to the evolving nature of threats and vulnerabilities in IoT devices and systems.