SlideShare a Scribd company logo
1. Joe Smith works in the IT department of a large industrial company. He is tasked with
maintaining IT security for the company. He also teaches a night class at the local
career tech center. He has overheard several of the students in the class talking about a
software tool they downloaded that would allow them to launch automated software
attacks. If the students were to use this software, what category of attacker would these
students be considered?
Cyberterrorists
Brokers
Insiders
Cybercriminals
Script Kiddies
2. Sally Wilson works for a small retail business and provides all IT support for the
company. As part of her job, Sally has recently been tasked with ensuring that all IT
systems are secured appropriately. To ensure company-wide IT security, Sally
implemented a security awareness training program for all employees. After this training
was completed, an employee informed Sally about the following situation:
1. The employee (Jim) mentioned that he was at a party and was befriended by a
person that knew several of his other friends. This "new friend" began asking him about
the company he worked for and was particularly interested in his company's marketing
strategy for a new product being developing when Jim mentioned that he was the
marketing manager. Jim was concerned and cautious as to any company information he
provided.
2. As the party progressed, a drinking game was initiated which required players to
provide information like: family member names, pet names, previous addresses, favorite
colors and flowers, and a variety of other personal information.
3. A week for so after the party, Jim noticed that sporadically his email account would
be locked out, and he would be required to reset his password to gain access. This
occurred on several times and was continuing to occur.
4. Jim also received an email that indicated that his system password needed to be
changed, and a URL was provided to access the web location for making the change.
Sally was concerned that someone might be trying to hack into Jim's email and
corporate access account. What security attack topic should she review with the
company employees that was more than likely the beginning of this situation?
Identity Theft
Password Cracking
Social Engineering
Hoaxes
Spear Phishing
Dumpster Diving
3. George Mills works for a government agency in the IT security department. Upon
arriving at work, he reviewed last night's network security logs and found indications that
there was potential for a network security breach. Upon further inspection, it seems that
an intruder from the Internet gained access to the internal network, accessed a server
with enhanced privileges via a documented OS flaw, and installed a keylogger.
Which of the following security defenses seem to be deficient in this situation? (Choose
three)
effective backup strategy
implementation of least privilege
regular operating system patching
Up-to-date malware software
proper firewall rules
requiring password complexity
4. Frank uses a web-based email system. He was told that a web-based email system
will protect him by filtering out spam and phishing attempts. What else might still be a
security concern even with his web-based email?
drive-by downloads
first-party cookies
embedded hyperlinks
third-party cookies
5. Sarah is setting up a wireless router so employees in her office suite can easily
access the Internet. There are other businesses in the same building and Sarah wants
to ensure that other people will not be able to connect to her router. Which setting will
provide the highest level of wireless security?
WPA2-Enterprise
Turn off SSID broadcast
MAC filtering
WEP
1. Joe Smith works in the IT department of a large industrial company. He is tasked with
maintaining IT security for the company. He also teaches a night class at the local career tech
center. He has overheard several of the students in the class talking about a software tool they
downloaded that would allow them to launch automated software attacks. If the students were to
use this software, what category of attacker would these students be considered?
Cyberterrorists
Brokers
Insiders
Cybercriminals
Script Kiddies
2. Sally Wilson works for a small retail business and provides all IT support for the company. As
part of her job, Sally has recently been tasked with ensuring that all IT systems are secured
appropriately. To ensure company-wide IT security, Sally implemented a security awareness
training program for all employees. After this training was completed, an employee informed
Sally about the following situation:
1. The employee (Jim) mentioned that he was at a party and was befriended by a person that
knew several of his other friends. This "new friend" began asking him about the company he
worked for and was particularly interested in his company's marketing strategy for a new product
being developing when Jim mentioned that he was the marketing manager. Jim was concerned
and cautious as to any company information he provided.
2. As the party progressed, a drinking game was initiated which required players to provide
information like: family member names, pet names, previous addresses, favorite colors and
flowers, and a variety of other personal information.
3. A week for so after the party, Jim noticed that sporadically his email account would be locked
out, and he would be required to reset his password to gain access. This occurred on several
times and was continuing to occur.
4. Jim also received an email that indicated that his system password needed to be changed, and
a URL was provided to access the web location for making the change.
Sally was concerned that someone might be trying to hack into Jim's email and corporate access
account. What security attack topic should she review with the company employees that was
more than likely the beginning of this situation?
Identity Theft
Password Cracking
Social Engineering
Hoaxes
Spear Phishing
Dumpster Diving
3. George Mills works for a government agency in the IT security department. Upon arriving at
work, he reviewed last night's network security logs and found indications that there was
potential for a network security breach. Upon further inspection, it seems that an intruder from
the Internet gained access to the internal network, accessed a server with enhanced privileges via
a documented OS flaw, and installed a keylogger.
Which of the following security defenses seem to be deficient in this situation? (Choose three)
effective backup strategy
implementation of least privilege
regular operating system patching
Up-to-date malware software
proper firewall rules
requiring password complexity
4. Frank uses a web-based email system. He was told that a web-based email system will protect
him by filtering out spam and phishing attempts. What else might still be a security concern even
with his web-based email?
drive-by downloads
first-party cookies
embedded hyperlinks
third-party cookies
5. Sarah is setting up a wireless router so employees in her office suite can easily access the
Internet. There are other businesses in the same building and Sarah wants to ensure that other
people will not be able to connect to her router. Which setting will provide the highest level of
wireless security?
WPA2-Enterprise
Turn off SSID broadcast
MAC filtering
WEP

More Related Content

Similar to 1- Joe Smith works in the IT department of a large industrial company-.docx

Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
mallisonshavon
 
VCU INFO 644 Critical Thinking 1
VCU INFO 644 Critical Thinking 1VCU INFO 644 Critical Thinking 1
VCU INFO 644 Critical Thinking 1
tgbrunet
 
Social engineering
Social engineeringSocial engineering
Social engineering
Bola Oduyale
 
How the US Military does Risk Management is a little different wha.docx
How the US Military does Risk Management is a little different wha.docxHow the US Military does Risk Management is a little different wha.docx
How the US Military does Risk Management is a little different wha.docx
wellesleyterresa
 
ISE 510 Final Project Scenario Background Limetree In.docx
ISE 510 Final Project Scenario  Background Limetree In.docxISE 510 Final Project Scenario  Background Limetree In.docx
ISE 510 Final Project Scenario Background Limetree In.docx
christiandean12115
 

Similar to 1- Joe Smith works in the IT department of a large industrial company-.docx (20)

Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf Security
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Train like you fight
Train like you fightTrain like you fight
Train like you fight
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
VCU INFO 644 Critical Thinking 1
VCU INFO 644 Critical Thinking 1VCU INFO 644 Critical Thinking 1
VCU INFO 644 Critical Thinking 1
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
How the US Military does Risk Management is a little different wha.docx
How the US Military does Risk Management is a little different wha.docxHow the US Military does Risk Management is a little different wha.docx
How the US Military does Risk Management is a little different wha.docx
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
ISE 510 Final Project Scenario Background Limetree In.docx
ISE 510 Final Project Scenario  Background Limetree In.docxISE 510 Final Project Scenario  Background Limetree In.docx
ISE 510 Final Project Scenario Background Limetree In.docx
 
Data breach
Data breachData breach
Data breach
 
ebay_data_breach
ebay_data_breachebay_data_breach
ebay_data_breach
 

More from Nicholas3uGPooled

1- T-F- Annual borius plans are long-term executive inctitives- and at.docx
1- T-F- Annual borius plans are long-term executive inctitives- and at.docx1- T-F- Annual borius plans are long-term executive inctitives- and at.docx
1- T-F- Annual borius plans are long-term executive inctitives- and at.docx
Nicholas3uGPooled
 
1- In terms of the environment of early earth- what resulted from the.docx
1- In terms of the environment of early earth- what resulted from the.docx1- In terms of the environment of early earth- what resulted from the.docx
1- In terms of the environment of early earth- what resulted from the.docx
Nicholas3uGPooled
 

More from Nicholas3uGPooled (20)

1- The following represent various stages of cell division (mitosis-me.docx
1- The following represent various stages of cell division (mitosis-me.docx1- The following represent various stages of cell division (mitosis-me.docx
1- The following represent various stages of cell division (mitosis-me.docx
 
1- In cats- again- black color is dominant to a special- temperature-s.docx
1- In cats- again- black color is dominant to a special- temperature-s.docx1- In cats- again- black color is dominant to a special- temperature-s.docx
1- In cats- again- black color is dominant to a special- temperature-s.docx
 
1- The ability of a virus to infect one type of organism and not anoth.docx
1- The ability of a virus to infect one type of organism and not anoth.docx1- The ability of a virus to infect one type of organism and not anoth.docx
1- The ability of a virus to infect one type of organism and not anoth.docx
 
1- The 3-part- multiple human brain refers to the A- brainstem- limbi.docx
1- The 3-part- multiple human brain refers to the  A- brainstem- limbi.docx1- The 3-part- multiple human brain refers to the  A- brainstem- limbi.docx
1- The 3-part- multiple human brain refers to the A- brainstem- limbi.docx
 
1- System in science- Types- Feedbacks 2- Nature of Physical Geography.docx
1- System in science- Types- Feedbacks 2- Nature of Physical Geography.docx1- System in science- Types- Feedbacks 2- Nature of Physical Geography.docx
1- System in science- Types- Feedbacks 2- Nature of Physical Geography.docx
 
1- T-F- Annual borius plans are long-term executive inctitives- and at.docx
1- T-F- Annual borius plans are long-term executive inctitives- and at.docx1- T-F- Annual borius plans are long-term executive inctitives- and at.docx
1- T-F- Annual borius plans are long-term executive inctitives- and at.docx
 
1- Select all that apply- Software testing is a process that helps in.docx
1- Select all that apply- Software testing is a process that helps in.docx1- Select all that apply- Software testing is a process that helps in.docx
1- Select all that apply- Software testing is a process that helps in.docx
 
1- Reflected and stored are types of XSS attacks- 2- An attack has occ.docx
1- Reflected and stored are types of XSS attacks- 2- An attack has occ.docx1- Reflected and stored are types of XSS attacks- 2- An attack has occ.docx
1- Reflected and stored are types of XSS attacks- 2- An attack has occ.docx
 
1- Pandoravirus salinus is virus that infects amoeba- is very large (1.docx
1- Pandoravirus salinus is virus that infects amoeba- is very large (1.docx1- Pandoravirus salinus is virus that infects amoeba- is very large (1.docx
1- Pandoravirus salinus is virus that infects amoeba- is very large (1.docx
 
1- In order to beat- the heart requires A- nervous system input B- h.docx
1- In order to beat- the heart requires  A- nervous system input  B- h.docx1- In order to beat- the heart requires  A- nervous system input  B- h.docx
1- In order to beat- the heart requires A- nervous system input B- h.docx
 
1- In terms of the environment of early earth- what resulted from the.docx
1- In terms of the environment of early earth- what resulted from the.docx1- In terms of the environment of early earth- what resulted from the.docx
1- In terms of the environment of early earth- what resulted from the.docx
 
1- Identify one job position to develop- compentency based job descrip.docx
1- Identify one job position to develop- compentency based job descrip.docx1- Identify one job position to develop- compentency based job descrip.docx
1- Identify one job position to develop- compentency based job descrip.docx
 
1- Implement a Python function that accepts an positive integer and re.docx
1- Implement a Python function that accepts an positive integer and re.docx1- Implement a Python function that accepts an positive integer and re.docx
1- Implement a Python function that accepts an positive integer and re.docx
 
1- How may have the complex lifestyle of digentic trematodes evolved-.docx
1- How may have the complex lifestyle of digentic trematodes evolved-.docx1- How may have the complex lifestyle of digentic trematodes evolved-.docx
1- How may have the complex lifestyle of digentic trematodes evolved-.docx
 
1- identify and discuss the two most imporant factors in population dy (1).docx
1- identify and discuss the two most imporant factors in population dy (1).docx1- identify and discuss the two most imporant factors in population dy (1).docx
1- identify and discuss the two most imporant factors in population dy (1).docx
 
1- How does ancestry and race play into disease genetics- 2- How does.docx
1- How does ancestry and race play into disease genetics- 2- How does.docx1- How does ancestry and race play into disease genetics- 2- How does.docx
1- How does ancestry and race play into disease genetics- 2- How does.docx
 
1- Historical Development of Computing and Information Technology a) H.docx
1- Historical Development of Computing and Information Technology a) H.docx1- Historical Development of Computing and Information Technology a) H.docx
1- Historical Development of Computing and Information Technology a) H.docx
 
1- How has examining your beliefs- assumptions- and values related to.docx
1- How has examining your beliefs- assumptions- and values related to.docx1- How has examining your beliefs- assumptions- and values related to.docx
1- How has examining your beliefs- assumptions- and values related to.docx
 
1- Given the Trilemma- if a country has the free flow of capital and a.docx
1- Given the Trilemma- if a country has the free flow of capital and a.docx1- Given the Trilemma- if a country has the free flow of capital and a.docx
1- Given the Trilemma- if a country has the free flow of capital and a.docx
 
1- Give a definition of heteroscedasticity- 2- For what reasons does h.docx
1- Give a definition of heteroscedasticity- 2- For what reasons does h.docx1- Give a definition of heteroscedasticity- 2- For what reasons does h.docx
1- Give a definition of heteroscedasticity- 2- For what reasons does h.docx
 

Recently uploaded

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 

Recently uploaded (20)

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 

1- Joe Smith works in the IT department of a large industrial company-.docx

  • 1. 1. Joe Smith works in the IT department of a large industrial company. He is tasked with maintaining IT security for the company. He also teaches a night class at the local career tech center. He has overheard several of the students in the class talking about a software tool they downloaded that would allow them to launch automated software attacks. If the students were to use this software, what category of attacker would these students be considered? Cyberterrorists Brokers Insiders Cybercriminals Script Kiddies 2. Sally Wilson works for a small retail business and provides all IT support for the company. As part of her job, Sally has recently been tasked with ensuring that all IT systems are secured appropriately. To ensure company-wide IT security, Sally implemented a security awareness training program for all employees. After this training was completed, an employee informed Sally about the following situation: 1. The employee (Jim) mentioned that he was at a party and was befriended by a person that knew several of his other friends. This "new friend" began asking him about the company he worked for and was particularly interested in his company's marketing strategy for a new product being developing when Jim mentioned that he was the marketing manager. Jim was concerned and cautious as to any company information he provided. 2. As the party progressed, a drinking game was initiated which required players to provide information like: family member names, pet names, previous addresses, favorite colors and flowers, and a variety of other personal information. 3. A week for so after the party, Jim noticed that sporadically his email account would be locked out, and he would be required to reset his password to gain access. This occurred on several times and was continuing to occur. 4. Jim also received an email that indicated that his system password needed to be changed, and a URL was provided to access the web location for making the change. Sally was concerned that someone might be trying to hack into Jim's email and corporate access account. What security attack topic should she review with the company employees that was more than likely the beginning of this situation? Identity Theft Password Cracking
  • 2. Social Engineering Hoaxes Spear Phishing Dumpster Diving 3. George Mills works for a government agency in the IT security department. Upon arriving at work, he reviewed last night's network security logs and found indications that there was potential for a network security breach. Upon further inspection, it seems that an intruder from the Internet gained access to the internal network, accessed a server with enhanced privileges via a documented OS flaw, and installed a keylogger. Which of the following security defenses seem to be deficient in this situation? (Choose three) effective backup strategy implementation of least privilege regular operating system patching Up-to-date malware software proper firewall rules requiring password complexity 4. Frank uses a web-based email system. He was told that a web-based email system will protect him by filtering out spam and phishing attempts. What else might still be a security concern even with his web-based email? drive-by downloads first-party cookies embedded hyperlinks third-party cookies 5. Sarah is setting up a wireless router so employees in her office suite can easily access the Internet. There are other businesses in the same building and Sarah wants to ensure that other people will not be able to connect to her router. Which setting will provide the highest level of wireless security? WPA2-Enterprise
  • 3. Turn off SSID broadcast MAC filtering WEP 1. Joe Smith works in the IT department of a large industrial company. He is tasked with maintaining IT security for the company. He also teaches a night class at the local career tech center. He has overheard several of the students in the class talking about a software tool they downloaded that would allow them to launch automated software attacks. If the students were to use this software, what category of attacker would these students be considered? Cyberterrorists Brokers Insiders Cybercriminals Script Kiddies 2. Sally Wilson works for a small retail business and provides all IT support for the company. As part of her job, Sally has recently been tasked with ensuring that all IT systems are secured appropriately. To ensure company-wide IT security, Sally implemented a security awareness training program for all employees. After this training was completed, an employee informed Sally about the following situation: 1. The employee (Jim) mentioned that he was at a party and was befriended by a person that knew several of his other friends. This "new friend" began asking him about the company he worked for and was particularly interested in his company's marketing strategy for a new product being developing when Jim mentioned that he was the marketing manager. Jim was concerned and cautious as to any company information he provided. 2. As the party progressed, a drinking game was initiated which required players to provide information like: family member names, pet names, previous addresses, favorite colors and flowers, and a variety of other personal information. 3. A week for so after the party, Jim noticed that sporadically his email account would be locked out, and he would be required to reset his password to gain access. This occurred on several times and was continuing to occur. 4. Jim also received an email that indicated that his system password needed to be changed, and a URL was provided to access the web location for making the change. Sally was concerned that someone might be trying to hack into Jim's email and corporate access account. What security attack topic should she review with the company employees that was more than likely the beginning of this situation?
  • 4. Identity Theft Password Cracking Social Engineering Hoaxes Spear Phishing Dumpster Diving 3. George Mills works for a government agency in the IT security department. Upon arriving at work, he reviewed last night's network security logs and found indications that there was potential for a network security breach. Upon further inspection, it seems that an intruder from the Internet gained access to the internal network, accessed a server with enhanced privileges via a documented OS flaw, and installed a keylogger. Which of the following security defenses seem to be deficient in this situation? (Choose three) effective backup strategy implementation of least privilege regular operating system patching Up-to-date malware software proper firewall rules requiring password complexity 4. Frank uses a web-based email system. He was told that a web-based email system will protect him by filtering out spam and phishing attempts. What else might still be a security concern even with his web-based email? drive-by downloads first-party cookies embedded hyperlinks third-party cookies 5. Sarah is setting up a wireless router so employees in her office suite can easily access the Internet. There are other businesses in the same building and Sarah wants to ensure that other
  • 5. people will not be able to connect to her router. Which setting will provide the highest level of wireless security? WPA2-Enterprise Turn off SSID broadcast MAC filtering WEP