Your browser either does not support JavaScript or you have turned JavaScript off.

Cyber Security Knowledge Answer

Cyber Security Knowledge Answer

Question 1:

A hacker locks out users and encrypts their personal computer files and data, holding it hostage until they agree to pay to the attacker. What is this practice called?

  • Browser hijacker
  • Ransomware
    Answer: The most infamous outbreak of ransomware is Wannacry, which swept through systems globally in May 2017. In total, more than 4,000 ransomware attacks occur daily, representing an increase of over 300 percent since 2015 (source: FBI)
  • Brute-force

Question 2:

On the evening news you heard the reporter talking about an Internet threat called a 'Botnet'. What exactly is a Botnet?

  • It is a malicious program that attempts to hide itself, other files, or computer data so they cannot be found on a computer.
  • A group of computers running malicious programs that are remotely controlled by cybercriminals.
    Answer: Attackers use botnets consisting of thousands or more of computers to perform a variety of malicious tasks, usually targeting systems that are not safeguarded with firewalls and/or anti-virus software.
  • A new type of cyber virus spread from China causing havoc around the globe.

Question 3:

This type of attack is designed to hinder the normal operation of a website, or other network resource.

  • DoS attack
    Answer: If the requests come from multiple sources, it is a DDoS (Distributed-Denial-of-Service) attack.
  • POS attack
  • Phishing

Question 4:

Which of the following is a common example of a "phishing" attack?

  • You receive an email from an acquaintance who you are rarely in contact with that contains only a web link.
  • You got an email that appears to be from your bank asking you to enter your account number and password, but the web address looks unfamiliar.
  • You received a text message claiming that you won a contest and asking you to click on the link.
  • All of the above

Question 5:

You are on a business trip and sitting in the local cafe trying to send emails to your colleagues to catch up on a few tasks.

To protect your communications over these public networks you should always do the following:

  • Find the strongest WiFi signal near you
  • Turn off your file sharing
  • Use a Virtual Private Network (VPN)
    Answer: A VPN allows a company to leverage Internet resources, enabling employees to easily collaborate from various locations, including home.

Question 6:

You are attending a business gathering with people discussing GDPR, the new European General Data Protection Regulation that goes into effect this May.

Which of the following statements is true about GDPR?

  • The GDPR's protection of EU citizens' data only applies to companies located in Europe.
  • GDPR is closely related to IT security.
    Answer: In the event of a data breach, GDPR forces companies to inform relevant authorities within 72 hours and to provide full details of the breach, while proposing measures for mitigating its effects. Therefore, a comprehensive data security strategy is now more important than ever.
  • Failing to comply with GDPR only damages a company's reputation, as there is no financial penalty for noncompliance.