Module 2 challenge- Google Cert

.docx

School

ECPI University *

*We aren’t endorsed by this school

Course

204

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by ChancellorLeopard3742

Question 1 Which of the following threats are examples of malware? Select two answers. Viruses Worms Question 2 Fill in the blank: The _____ spread globally within a couple of months due to users inserting a disk into their computers that was meant to track illegal copies of medical software. Brain virus Question 3 Fill in the blank: Social engineering is a _____ that exploits human error to gain private information, access, or valuables. manipulation technique Question 4
Which of the following threats are most likely to occur in the event of a phishing attack? Select all that apply. Employees inadvertently revealing sensitive data Malicious software being deployed Question 5 A security professional is researching compliance and the law in order to define security goals. Which domain does this scenario describe? Identity and access management Question 6 Which of the following tasks may be part of the security architecture and engineering domain? Select all that apply. Configuring a firewall Ensuring that effective systems and processes are in place Question 7
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help