Module 2 Challenge - Attempt 2- Google Cert

.docx

School

ECPI University *

*We aren’t endorsed by this school

Course

204

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by ChancellorLeopard3742

Report
Question 1 What is the term for software that is designed to harm devices or networks? Malware Question 2 What historical event used a malware attachment to steal user information and passwords? Brain virus Question 3 Fill in the blank: Social engineering is a manipulation technique that exploits _____ error to gain access to private information. network Question 4
A security professional conducts internal training to teach their coworkers how to identify a social engineering attack. What types of security issues are they trying to avoid? Select all that apply. Phishing attacks Employees inadvertently revealing sensitive data Malicious software being deployed Question 5 A security professional is researching compliance and the law in order to define security goals. Which domain does this scenario describe? Security assessment and testing Question 6 A security professional is optimizing data security by ensuring that effective tools, systems, and processes are in place. Which domain does this scenario describe? Security and risk management Question 7
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help