MIS: Module 6 Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

What are the three main types of hazards from computers?

a) Electrical, Mechanical, Software

b) Information, Environmental, Health

c) Physical, Network, Cloud

d) Security, Physical, Psychological

b) Information, Environmental, Health

2
New cards

Which of the following is NOT a pillar of information security?

a) Confidentiality

b) Data integrity

c) Availability

d) Automation

d) Automation

3
New cards

What happened in the 2013 Target data breach?

a) Employees accidentally leaked customer data

b) A vendor’s credentials were used to install malware

c) A denial-of-service attack disrupted operations

d) Hackers accessed data through phishing

b) A vendor’s credentials were used to install malware

4
New cards

What is the primary goal of a ransomware attack?

a) To delete user files permanently

b) To encrypt files and demand payment for decryption

c) To steal banking information

d) To monitor user activity

b) To encrypt files and demand payment for decryption

5
New cards

Which attacker type is known for using pre-made hacking tools with little

expertise?

a) Hacktivists

b) Cyberterrorists

c) Script kiddies

d) Insiders

c) Script kiddies

6
New cards

Which of the following is NOT a common motivation for cyberattacks?

a) Extortion

b) Espionage

c) Improving cybersecurity awareness

d) Political activism

c) Improving cybersecurity awareness

7
New cards

Which of the following is an example of e-waste?

a) An old laptop discarded improperly

b) A password stored in a notebook

c) A cloud storage file

d) A deleted email

a) An old laptop discarded improperly

8
New cards

What does a firewall do?

a) Increases internet speed

b) Blocks unauthorized access to a network

c) Encrypts files automatically

d) Prevents computer overheating

b) Blocks unauthorized access to a network

9
New cards

What is social engineering?

a) Manipulating people into revealing confidential information

b) Using encryption to protect data

c) A technique to speed up networks

d) A method for organizing online groups

a) Manipulating people into revealing confidential information

10
New cards

What is pretexting?

a) Creating fake scenarios to obtain sensitive information

b) Sending fraudulent emails to gain user credentials

c) Encrypting user data without permission

d) Using a VPN to protect data

a) Creating fake scenarios to obtain sensitive information

11
New cards

Which type of malware spreads without human interaction?

a) Virus

b) Worm

c) Trojan

d) Ransomware

b) Worm

12
New cards

Which of the following is NOT an online risk?

a) Online banking fraud

b) E-commerce scams

c) Fake websites

d) Using a strong password

d) Using a strong password

13
New cards

What does two-factor authentication require?

a) Two passwords

b) A password and an additional security factor

c) Biometric data only

d) A firewall

b) A password and an additional security factor

14
New cards

What is phishing?

a) A method of tracking online users

b) A fraudulent attempt to obtain sensitive information

c) A software update for security

d) A virus removal technique

b) A fraudulent attempt to obtain sensitive information

15
New cards

Which security measure helps prevent unauthorized access to accounts?

a) Using a different password for each account

b) Sharing passwords with friends

c) Using only four-character passwords

d) Ignoring security updates

a) Using a different password for each account

16
New cards

What is a common sign of a phishing email?

a) A request for personal information from an unknown sender

b) A long, complex password suggestion

c) A message from a known sender without attachments

d) A notification from your antivirus software

a) A request for personal information from an unknown sender

17
New cards

Which of the following best describes “cyberstalking”?

a) A method for gathering secure data

b) Online harassment using digital tools

c) A security technique for tracking hackers

d) A government surveillance strategy

b) Online harassment using digital tools

18
New cards

What is the main goal of identity theft?

a) To gain unauthorized access to a system

b) To collect user credentials for lawful purposes

c) To steal personal information for financial fraud

d) To prevent malware attacks

c) To steal personal information for financial fraud

19
New cards

Which of the following is an example of an insider threat?

a) A hacker from another country

b) A cybercriminal using malware

c) An employee misusing company data

d) A denial-of-service attack

c) An employee misusing company data

20
New cards

What is an example of a secure password?

a) Password123

b) ILoveMyDog

c) !R8s&vT#zWm2@6L

d) 123456789

c) !R8s&vT#zWm2@6L

21
New cards

What is a major risk of using public Wi-Fi?

a) Improved internet speed

b) Data interception by attackers

c) Automatic software updates

d) Secure encryption for all traffic

b) Data interception by attackers

22
New cards

Which of the following best defines spyware?

a) A program that removes viruses

b) A program that secretly collects user data

c) A tool used for encryption

b) A program that secretly collects user data

23
New cards

Which type of malware is disguised as legitimate software?

a) Virus

b) Trojan

c) Worm

d) Ransomware

b) Trojan

24
New cards

What does social engineering rely on?

a) Encryption techniques

b) Network vulnerabilities

c) Psychological manipulation

d) Cloud computing

c) Psychological manipulation

25
New cards

What is an example of vishing?

a) A fake email requesting credentials

b) A fraudulent text message asking for account information

c) A phone call impersonating a bank to obtain user details

d) An attacker using an unauthorized USB device

c) A phone call impersonating a bank to obtain user details

26
New cards

What is the purpose of a digital certificate?

a) To encrypt a website

b) To verify a website's authenticity

c) To store passwords securely

d) To remove malware

b) To verify a website's authenticity

27
New cards

What is the best way to store backup data?

a) On the main computer hard drive

b) On multiple unsecured USB drives

c) On a separate external device or cloud storage

d) By emailing copies to yourself

c) On a separate external device or cloud storage

28
New cards

Which of the following is an example of spam?

a) A legitimate business email

b) An unsolicited email promoting products or scams

c) A notification from an antivirus program

d) A two-factor authentication request

b) An unsolicited email promoting products or scams

29
New cards

What type of hacker helps improve security by finding vulnerabilities?

a) Black hat hacker

b) Gray hat hacker

c) White hat hacker

d) Script kiddie

c) White hat hacker

30
New cards

What is shoulder surfing?

a) Watching someone enter their credentials without their knowledge

b) A method for tracking hackers

c) A software encryption technique

a) Watching someone enter their credentials without their knowledge

31
New cards

True or False:Cybersecurity only affects businesses, not individuals.

False

32
New cards

True or False: Multi-factor authentication increases security.

True

33
New cards

True or False: Encryption makes data unreadable without proper authorization.

True

34
New cards

True or False: Phishing is a type of social engineering attack

True

35
New cards

True or False: Hackers only target government organizations

False

36
New cards

True or False: A botnet consists of compromised computers used for malicious activities.

True

37
New cards

True or False: Cyberbullying is less harmful than traditional bullying.

False

38
New cards

True or False: Using strong passwords is a best practice for online security

True

39
New cards

True or False: Shoulder surfing is a technique where attackers observe people typing

passwords

True

40
New cards

True or False: A DoS attack floods a system with too much traffic, causing it to crash.

True

41
New cards

True or False: Firewalls prevent all cyberattacks

False

42
New cards

True or False: Updating software regularly helps protect against security vulnerabilities.

True

43
New cards

True or False: A brute-force attack systematically tries different password combinations.

True

44
New cards

True or False: Cybercriminals use social engineering to exploit human behavior

True

45
New cards

True or False: Using a VPN while on public Wi-Fi enhances security

True

46
New cards

True or False: Spam emails are always harmless.

False

47
New cards

True or False: Data breaches can lead to identity theft.

True

48
New cards

True or False: A ransomware attack locks or encrypts files until a ransom is paid.

true

49
New cards

True or False: Social engineering attacks only occur online

False

50
New cards

True or False: Pretexting involves pretending to be someone else to gain information.

True

51
New cards

T/F: Using the same password for multiple accounts is a secure practice.

False

52
New cards

T/F:E-waste disposal can harm the environment.

True

53
New cards

T/F:Cybersecurity training can help prevent phishing attacks

True

54
New cards

T/F: Two-factor authentication is less secure than using a strong password alone.

False

55
New cards

T/F: Cyberstalking is a form of online harassment.

True

56
New cards

T/F: Strong encryption can prevent unauthorized access to sensitive data.

True

57
New cards

T/F: Social engineering relies on technical vulnerabilities, not human weaknesses.

False

58
New cards

T/F:A white hat hacker helps organizations improve security

True

59
New cards

T/F:Ransomware is a type of malware that steals passwords.

False

60
New cards

T/F:A strong password should include a mix of letters, numbers, and special

characters.

True

61
New cards

T/F: Hacktivists attack computer systems for social or political reasons.

True

62
New cards

T/F: Personal information should not be shared on public forums.

True

63
New cards

T/F: A trojan disguises itself as legitimate software to gain access to a system

True

64
New cards

T/F: A firewall can detect and block unauthorized access to a network.

True

65
New cards

T/F: Monitoring financial statements can help detect identity theft early.

True

66
New cards

T/F: Firewalls can help prevent unauthorized access to networks.

True

67
New cards

T/F: Hackers always require direct access to a computer to carry out cyberattacks.

False

68
New cards

T/F: Ransomware encrypts a user's files and demands payment for decryption.

True

69
New cards

T/F: A strong password should be at least 8 characters long.

False

70
New cards

T/F: Using public Wi-Fi is always secure if the network has a password.

False

71
New cards

T/F: Two-factor authentication adds an extra layer of security to user accounts.

True

72
New cards

T/F: Malware can only spread through email attachments.

False

73
New cards

T/F: Social engineering attacks exploit human weaknesses rather than software

vulnerabilities.

True

74
New cards

T/F: DDoS attacks attempt to overwhelm a system with excessive traffic.

True

75
New cards

T/F:Clicking on unknown email links is a safe practice.

False

76
New cards

T/F:Strong passwords should not contain dictionary words.

True

77
New cards

T/F:Cybersecurity threats only come from external hackers.

False

78
New cards

T/F:A VPN helps protect user data when accessing public networks.

True

79
New cards

T/F: A password manager helps store complex passwords securely.

True

80
New cards

T/F:Encrypting sensitive files before storing them adds an extra layer of security.

True

81
New cards

T/F:A brute-force attack involves trying multiple password combinations to gain

access.

True

82
New cards

T/F: Phishing attacks are always easy to recognize.

False

83
New cards

T/F:A computer virus requires human interaction to spread.

True

84
New cards

T/F:Botnets are networks of compromised computers controlled by attackers.

True

85
New cards

T/F: Cybercriminals never use social media for scams.

False

86
New cards

T/F:It is always safe to share personal information on social media.

False

87
New cards

T/F: Cyberbullying can have serious psychological effects.

True

88
New cards

T/F: A trojan disguises itself as legitimate software to trick users into installing it.

True

89
New cards

T/F: A strong security culture in an organization can reduce the risk of cyberattacks.

True

90
New cards

T/F: Cybersecurity professionals do not use penetration testing to identify

vulnerabilities.

False

91
New cards

T/F: Hacktivists attack computer systems for social or political reasons.

True

92
New cards

T/F: A white hat hacker works with organizations to improve security.

True

93
New cards

T/F: Cybercriminals do not target small businesses.

False

94
New cards

T/F: Using different passwords for multiple accounts reduces security risks

True

95
New cards

T/F:Using a social media account login for multiple sites is a good security practice.

False

96
New cards

T/F:Data breaches can lead to identity theft and financial losses.

True

97
New cards

T/F:A good cybersecurity strategy includes regular software updates.

True

98
New cards

T/F:An unprotected network is more vulnerable to cyberattacks

True

99
New cards

T/F:Spam emails may contain malware.

True

100
New cards

T/F:Shoulder surfing is an outdated attack method.

False