Question 1:
A hacker locks out users and encrypts their personal computer files and data, holding it hostage until they agree to pay to the attacker. What is this practice called?
- Browser hijacker
- Ransomware
Answer: The most infamous outbreak of ransomware is Wannacry, which swept through systems globally in May 2017. In total, more than 4,000
ransomware attacks occur daily, representing an increase of over 300 percent since 2015 (source:
FBI)
- Brute-force
Question 2:
On the evening news you heard the reporter talking about an Internet threat called a 'Botnet'. What exactly is a Botnet?
Question 3:
This type of attack is designed to hinder the normal operation of a website, or other network resource.
Question 4:
Which of the following is a common example of a "phishing" attack?
- You receive an email from an acquaintance who you are rarely in contact with that contains only a web link.
- You got an email that appears to be from your bank asking you to enter your account number and password, but the web address looks unfamiliar.
- You received a text message claiming that you won a contest and asking you to click on the link.
- All of the above
Question 5:
You are on a business trip and sitting in the local cafe trying to send emails to your colleagues to catch up on a few tasks.
To protect your communications over these public networks you should always do the following:
- Find the strongest WiFi signal near you
- Turn off your file sharing
- Use a Virtual Private Network (VPN)
Answer: A
VPN allows a company to leverage Internet resources, enabling employees to easily collaborate from various locations, including home.
Question 6:
You are attending a business gathering with people discussing GDPR, the new European General Data Protection Regulation that goes into effect this May.
Which of the following statements is true about GDPR?
- The GDPR's protection of EU citizens' data only applies to companies located in Europe.
- GDPR is closely related to IT security.
Answer: In the event of a data breach, GDPR forces companies to inform relevant authorities
within 72 hours and to provide full details of the breach, while proposing measures for mitigating its effects. Therefore,
a comprehensive data security strategy is now more important than ever.
- Failing to comply with GDPR only damages a company's reputation, as there is no financial penalty for noncompliance.