Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

(1) Which of the following are examples of the direct inquiry method of data collection? more than one answer may be selected. ordering food delivery

(1) Which of the following are examples of the direct inquiry method of data collection? more than one answer may be selected. ordering food delivery via smartphone app Registering an account for a new social media platform Tracking the click-through rate of email promotions purchasing data from a third party 2. From the following list, select the common types of malware used today. viruses worms Trojans Spam 3. Which of the following are true about spear phishing attacks? more than one answer may be correct. Spear phishing is a type of attack designed to target specific individuals Spear phishing attacks are designed to install malware on a device Spear phishing attacks are commonly have only the important people from an organization as a target Spear phishing attacks can occur via email, search engine, or social media 4. What questions are answered by the cybersecurity risk assessment recommended by the national institute of standards technology (NIST)? More than one answer may be correct. What data breach would have a major impact on our business? What is the impact is our vulnerabilities are exploited? What are our security strengths, relative to our organizations? How frequently do similar organizations experience security breaches? 5. Explain how Trojans are designed and used. More than one answer may be correct. Trojans are commonly used by hackers to gain access to systems and devices Trojans are designed using some sort of social engineering tactic Hackers use Trojans to create a backdoor that bypasses security Although cleverly designed, Trojans are easily detected by most antivirus software programs 6. From the following list, selecte all examples of cybercrimes Trojan horse viruses Computer hacking Digital identity theft Pop-up advertising 7. Which of the following statements describes phishing? More than one answer may be correct. Phishing scams use emails that appear to be form established organizations Phishing scams try to con a user into giving up private information Phishing scams are relatively easy to spot Phishing scams use viruses to attack computers and steal information

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Project Management in Practice

Authors: Samuel J. Mantel Jr., Jack R. Meredith, Sco

4th edition

470533013, 978-0470533017

More Books

Students also viewed these General Management questions