Security Flashcards
(51 cards)
Which law focuses on protecting health information in the United States?
HIPAA
What is the purpose of creating separate network segments?
To isolate sensitive information and systems
Why should you be cautious about participating in social media quizzes and games?
They can collect personal data.
What can happen if people rely too much on automated security tools?
They might miss subtle signs of a security breach
What is a zero-day attack?
An attack that exploits an unknown vulnerability
What happens to your purchased apps if you delete them from your device?
You can re-download them without paying again
Which of the following is an example of “Something You Know”?
Passphrase
Why is end-to-end encryption important for instant messaging?
It prevents third parties from reading your messages.
What is a site license?
A license that allows software to be installed on multiple computers for one price.
What is an example of Indirect PII?
Postal code or ZIP code
If you use the same password on multiple sites and one site gets hacked, what should you do?
Change your password on all sites.
What is targeted advertising?
Using your data to show ads for products you might like
What should you do if a virus spreads over a network?
Disconnect the network
Which of the following is a sign of a potentially fake email?
The email contains spelling or grammar mistakes.
Which of the following is a common protocol for encrypting data in transit?
HTTPS
What is a primary reason websites want you to accept their cookies?
To show you more ads based on your interests
What is the first step to remove an app on Windows?
Open Settings and go to Apps
What should you do if you change your mind after deleting an app on macOS?
Drag the app back from the trash can tp the Application Folder
Which of the following is NOT a privacy issue that is related to using a social networking site?
You need to ensure that private information is physically shredded prior to disposal.
Who usually owns the data you share on social media platforms?
The social media platform
Why are computers considered high-value targets?
They are expensive and store valuable data
What is the purpose of creating separate network segments?
To isolate sensitive information and systems
What does the “Detect” function in the NIST Cybersecurity Framework involve?
Monitoring to ensure controls are effective
What is real-time scanning in antivirus software?
Constantly watching your computer for threats