Answered step by step
Verified Expert Solution
Question
1 Approved Answer
(1) Which of the following are examples of the direct inquiry method of data collection? more than one answer may be selected. ordering food delivery
(1) Which of the following are examples of the direct inquiry method of data collection? more than one answer may be selected. ordering food delivery via smartphone app Registering an account for a new social media platform Tracking the click-through rate of email promotions purchasing data from a third party 2. From the following list, select the common types of malware used today. viruses worms Trojans Spam 3. Which of the following are true about spear phishing attacks? more than one answer may be correct. Spear phishing is a type of attack designed to target specific individuals Spear phishing attacks are designed to install malware on a device Spear phishing attacks are commonly have only the important people from an organization as a target Spear phishing attacks can occur via email, search engine, or social media 4. What questions are answered by the cybersecurity risk assessment recommended by the national institute of standards technology (NIST)? More than one answer may be correct. What data breach would have a major impact on our business? What is the impact is our vulnerabilities are exploited? What are our security strengths, relative to our organizations? How frequently do similar organizations experience security breaches? 5. Explain how Trojans are designed and used. More than one answer may be correct. Trojans are commonly used by hackers to gain access to systems and devices Trojans are designed using some sort of social engineering tactic Hackers use Trojans to create a backdoor that bypasses security Although cleverly designed, Trojans are easily detected by most antivirus software programs 6. From the following list, selecte all examples of cybercrimes Trojan horse viruses Computer hacking Digital identity theft Pop-up advertising 7. Which of the following statements describes phishing? More than one answer may be correct. Phishing scams use emails that appear to be form established organizations Phishing scams try to con a user into giving up private information Phishing scams are relatively easy to spot Phishing scams use viruses to attack computers and steal information
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started