Questions LLC
Login
or
Sign Up
Ask a New Question
Cybersecurity
Page 10
Questions (831)
If you are a hacker trying to target someone who has a bank account to steal money, what reason might you avoid targeting
1 answer
asked anonymously
11 views
If you are a hacker trying to target someone who has a bank account to steal money, what reason might you avoid targeting
1 answer
asked anonymously
11 views
Methods used by cybercriminals to trick people into giving their information so they can use it for fraudulent purposes.
3 answers
asked anonymously
13 views
who does the computer misuse act 1990 protect
1 answer
asked anonymously
9 views
Important advice to include about spyware, viruses, and other types of malware:
for a Purpose of PSA Advertisement
1 answer
asked by
Bot GPT 3.5
16 views
how to guard against malware
PSA 6TH GRADER
1 answer
asked by
Bot GPT 3.5
17 views
how to get attention from readers who read PSA about spyware and adware, and Malware Cybersecurity
6th grade
1 answer
asked by
Bot GPT 3.5
18 views
how to get attention from readers who read PSA about spyware and adware, and Malware Cybersecurity
6th grade examples you say
1 answer
asked by
Bot GPT 3.5
25 views
Generate a PSA script that could be read out on a radio stations about cybersecurity.
Include these things: What spyware is and
1 answer
asked by
Bot GPT 3.5
23 views
Phishing
1 answer
asked anonymously
13 views
Does SA have a special legislation for digital identity theft
1 answer
asked anonymously
7 views
If you are a hacker trying to target someone who has a bank account to steal money, what reason
might you avoid targeting someone
1 answer
asked anonymously
54 views
Which of the following is not an example of malicious code?
Responses Trojan horse worm virus spy gear
1 answer
asked anonymously
22 views
You are worried about your password being stolen, but you have had this password for a long time. It is a good password and hard
1 answer
asked by
young_240sx
34 views
Why would you shut down operations when a breach was detected?
A. to stop the breach B. to stop email from sending out bad emails
1 answer
asked by
young_240sx
21 views
What is the effect of a security breach?
A. increase B. labor loss C. data loss D. reputational well-being
1 answer
asked by
young_240sx
21 views
When a breach occurs on a small- or medium-sized business, and they have customer data exposed, the business has a 60% rate of
1 answer
asked by
young_240sx
19 views
You have been surfing the internet and have decided to download a new game. Your computer issues a warning that the software may
1 answer
asked by
young_240sx
24 views
a student has been prompted by their computer to install a patch for their operating system. They decide to ignore the message
1 answer
asked by
young_240sx
16 views
What is generally traded when securing systems?
A. system being compatible B. being able to easily use the system C. the cost of
1 answer
asked by
young_240sx
15 views
You install antimalware software on your computer. What is the major attack you are trying to prevent the users from executing?
A
1 answer
asked by
young_240sx
19 views
Backup software must be capable of proving which of the following functions to ensure the backup tapes are safe if they are
1 answer
asked by
young_240sx
26 views
What is the best action that a company should take when a mobile device is lost with an active network connection, and a copy of
1 answer
asked by
young_240sx
18 views
How can you protect your home computer from being accessed by anyone in your household and getting into your personal data and
1 answer
asked by
young_240sx
26 views
A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus
1 answer
asked by
young_240sx
12 views
From a cost point of view, an orginization knows it needs to implement some cybersecurity protection on its personal computers.
1 answer
asked by
young_240sx
21 views
San Antonio is thought to have the highest concentration of cyber intelligence employees outside of Washington, D.C. Which
1 answer
asked anonymously
22 views
Problem
Personal identifiable information (PII) is any information that can be used to identify or contact a specific person. It
1 answer
asked anonymously
13 views
Phishing scams are attempts by scammers to trick you into giving out personal information.
Which of the following is an example
1 answer
asked anonymously
14 views
Common Security Threats Quick Check
1 of 51 of 5 Items Question What is adware?(1 point) Responses Adware is designed to carry
1 answer
asked by
Donald Craven
65 views
What is a general term for a wide variety of harmful software that infects, explores, or exposes user data to without that
1 answer
asked by
Donald Craven
25 views
What is a general term for a wide variety of harmful software that infects, explores, or exposes user data to without that
1 answer
asked by
Donald Craven
25 views
What security feature should you always turn on when your laptop is connected to public Wi-Fi to ensure a layer of security that
1 answer
asked by
Donald Craven
29 views
Digital and Social Risks Quick Check
2 of 52 of 5 Items Question What would you use to hide and encrypt your internet traffic?(1
1 answer
asked by
Donald Craven
26 views
What type of person tries to get your personal information by sending out friend requests from a fake profile?(1 point)
Responses
1 answer
asked by
Donald Craven
30 views
You are worried about your password being stolen, but you have had this password for a long time. It is a good password and hard
1 answer
asked by
Donald Craven
50 views
You have been surfing the internet and have decided to download a new game. Your computer issues a warning that the software may
1 answer
asked by
Donald Craven
24 views
A student has been prompted by their computer to install a patch for their operating system. They decide to ignore the message
1 answer
asked by
Donald Craven
25 views
What is generally traded when securing systems?(1 point)
Responses the time to configure the systems the time to configure the
1 answer
asked by
Donald Craven
22 views
Which of the following is an example of an internal threat?(1 point)
Responses a power surge from a thunderstorm a power surge
1 answer
asked by
Donald Craven
19 views
Which of the following passwords would be considered the strongest and most secure?(1 point)
Responses ready2go123!@
1 answer
asked by
Donald Craven
22 views
Devising Security Solutions Quick Check
1 of 51 of 5 Items Question You install antimalware software on your computer. What is
1 answer
asked by
Donald Craven
29 views
From a cost point of view, an organization knows it needs to implement some cybersecurity protection on its personal computers
1 answer
asked by
Donald Craven
27 views
A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus
1 answer
asked by
Donald Craven
29 views
A small company with 25 employees is attacked and its data are encrypted. The chief executive officer (CEO) does not think their
1 answer
asked by
Donald Craven
33 views
What is the most complete explanation of the Zero Trust Methodology?(1 point)
Responses No one is considered trusted, and each
1 answer
asked by
Donald Craven
29 views
A corporation is concerned that their code is being stolen by a different company, so they implement new procedures for logging
1 answer
asked by
Donald Craven
33 views
Virtual private networks (VPNs) employ which protection mechanism?(1 point)
Responses hash algorithms hash algorithms multifactor
1 answer
asked by
Donald Craven
36 views
How does ransomware affect organizational assets?(1 point)
Responses A ransomware attack causes users to constantly reboot their
1 answer
asked by
Donald Craven
31 views
How does ransomware affect organizational assets?(1 point)
Responses A ransomware attack causes users to constantly reboot their
1 answer
asked by
Donald Craven
59 views
Pages
1
2
3
4
5
6
7
8
9
10
Parent Categories (47)
Artificial Intelligence/Machine Learning
Business
Business Technology
Career
Career Focus
Career Opportunities
Careers
Certification
Computer Science
Computer Science and Technology
Computer Science/Information Technology
Computer Science/Technology
Computers
Computers and Technology
Computing
Computing Specializations
Concerns
Education
Information & Communication Technology
Information Security
Information Technology
Internet
Internet Safety
Internet Security
IT/Technology
Job Market
Job Titles
Law
Law and Ethics
Law and Legislation
Legal
Legal Issues
Networks
Online Safety
Personal Safety
Return on Investment (ROI)
Risk Management
Security
Security and Privacy
Social Issues
Technology
Technology and Computer Science
Technology and Computing
Technology and Internet
Technology and Security
Technology Education
Technology or Computer Science