Question 1 A)How does ransomware affect organizational assets?(1 point) Responses A ransomware attack replicates itself from organization A to organization B if any emails have been sent between the organizations. A ransomware attack replicates itself from organization A to organization B if any emails have been sent between the organizations. Ransomware attacks force all networks to send their IP addresses to the dark web. Ransomware attacks force all networks to send their IP addresses to the dark web. A ransomware attack causes users to constantly reboot their computers thereby wasting organizational resources. A ransomware attack causes users to constantly reboot their computers thereby wasting organizational resources. A ransomware attack is designed to render organizational assets unusable until the ransom demands are met. A ransomware attack is designed to render organizational assets unusable until the ransom demands are met.

Question 2 A)How does spyware operate?(1 point) Responses Spyware is designed to slow a computer down until the user is unable to complete their tasks. Spyware is designed to slow a computer down until the user is unable to complete their tasks. Spyware closely monitors computers and potentially sends sensitive or protected information back to its originator. Spyware closely monitors computers and potentially sends sensitive or protected information back to its originator. Spyware is designed to protect systems from virus attacks and keep your computer free of malware. Spyware is designed to protect systems from virus attacks and keep your computer free of malware. Spyware is automated to carry out certain actions within the system. Spyware is automated to carry out certain actions within the system.
Question 3 A)The information technology (IT) department issued you an ethernet cable that will allow you to connect directly to your router when working remotely. You are also given instructions to download an identity authenticator to give you extra protection against unwanted intrusions on your computer. What would be the primary reason for IT giving such explicit instructions concerning your network connection?(1 point) Responses Connecting to the secured network and using an authenticator, allows IT to monitor your keystrokes. Connecting to the secured network and using an authenticator, allows IT to monitor your keystrokes. Connecting to the secured network completely insulates your computer from a malicious attack. Connecting to the secured network completely insulates your computer from a malicious attack. Connecting to unsecured networks can increase the incidents of the stealing of personal data. Connecting to unsecured networks can increase the incidents of the stealing of personal data. Connections to unsecured networks are slower. Connections to unsecured networks are slower.
Question 4 A)You have received several emails from a company offering you a summer internship. You are very interested in the extended learning opportunity; however, you are a little concerned that the company is asking you to verify your social security number by clicking on an embedded link. You ignore your initial concern and follow the link. The company’s website looks legitimate, so you enter your social security information. You later find out this was a scam aimed at high school students. The website you visited is an example of a(1 point) Responses spoofed site. spoofed site. blog. blog. unsecured site. unsecured site. social media site. social media site.
Question 5 A)How can installation media can be used to compromise a computer?(1 point) Responses Installation media is designed to avoid security. Installation media is designed to avoid security. Installation media runs without using all the normal security. Installation media runs without using all the normal security. Installation media cannot be used to compromise a computer. Installation media cannot be used to compromise a computer. Installation media is designed to hack computers. Installation media is designed to hack computers.
Question 6 A)What is one of the major advantages of using a Virtual Private Network (VPN) when browsing the internet?(1 point) Responses prevents hackers from seeing what you are doing prevents hackers from seeing what you are doing speeds up your computer browsing speeds up your computer browsing makes your computer less prone to viruses makes your computer less prone to viruses your location is known your location is known
Question 7 A) You have received a bunch of emails from the same company that makes your indoor exercise bicycle. You are very interested as you want to buy this new add-on, which will enhance the video graphics displayed on the monitor. You keep opening the attachments and browsing the sales. One day you get an email that looks very similar to the ones you have been opening, and you open the attachment, and your item is on sale. You put in your personal and credit card information. You find out later that it was a scam. What type of scam is this an example of? (1 point) Responses bait and switch bait and switch malware attack malware attack phishing attack phishing attack password theft password theft
Question 8 A)You have just befriended someone on social media and the person is asking you for a gift card from a video game store. The person may be(1 point) Responses a person trying to scam you. a person trying to scam you. a hacker. a hacker. impoverished and in need of some money. impoverished and in need of some money. a cyberbully. a cyberbully.
Question 9 A)Your cellphone social media application keeps changing and getting new pictures. The pictures are not any that you know. This started happening after you clicked on an ad you were interested in. You change your password and it still keeps occurring. You figured you have some virus or malicious application on your phone. The person who created the virus or malicious application is called a(1 point) Responses scammer. scammer. cyberbully. cyberbully. friend. friend. hacker. hacker.
Question 10 A)What role does access control have within a physical setting?(1 point) Responses It allows for the surveillance of users as they enter and leave an area within a facility. It allows for the surveillance of users as they enter and leave an area within a facility. It prevents users from gaining unauthorized access to a portion of a facility. It prevents users from gaining unauthorized access to a portion of a facility. It allows for users to freely move around a facility. It allows for users to freely move around a facility. It does not play a role in the physical security of a facility. It does not play a role in the physical security of a facility. Question 11 A)The chief executive officer (CEO) of an organization asked you to audit the physical security of their building. You noticed that individuals could move freely about the building. An individual who does not work at the building was able to take a document off the CEO’s desk and walk out the door. In your report, what physical security measure could prevent this from happening again?(1 point) Responses two-way mirror two-way mirror antivirus software antivirus software biometric lock biometric lock firewall firewall
Question 12 A)You are surfing the internet and see an advertisement for an online contest. It wants you to enter a bunch of information about yourself. It even wants your bank account information. You decide not to enter and close the window. Which best practice would this be associated with?(1 point) Responses use passwords use passwords keep software up to date keep software up to date ensure virus protection ensure virus protection avoid sharing personal information avoid sharing personal information
Question 13 A)A router that connects your local area network (LAN) to the internet has a basic built-in firewall that does not have any network monitoring or filtering. What is its major advantage?(1 point) Responses filters ransomware filters ransomware isolation from the internet isolation from the internet filters zero-day exploits filters zero-day exploits removes viruses removes viruses
Question 14 A)What is the best way to prevent people from reading your data on a hard disk?(1 point) Responses Zip or compress the files. Zip or compress the files. Encrypt the data. Encrypt the data. Hide the directory. Hide the directory. Use weird file names. Use weird file names.
Question 15 A)Your organization has a gross sales of $40 million, and you have 100 employees. What is the maximum amount of loss in dollars you can afford so your cybersecurity return on investment (ROI) is one (1) for a year?(1 point) Responses $328,000 $328,000 $300,000 $300,000 $400,000 $400,000 $50,000

Bot GPT 3.5 Bot GPT 3.5 answered

$400,000