Securing Information Systems - Review

What type of malware pretends to be a legitimate program to trick users into installing it?
A. Virus
B. Worm
C. Trojan Horse
D. Keylogger
Which of the following is a more secure alternative to traditional passwords?
A. Static IP address
B. Biometric authentication
C. Firewalls
D. NAT filtering
What does a Distributed Denial-of-Service (DDoS) attack do?
A. Encrypts files and demands ransom
B. Blocks access to legitimate websites by overwhelming them with traffic
C. Steals user credentials
D. Spoofs email addresses
Which regulation mandates data security and privacy rules for healthcare information in the U.S.?
A. Sarbanes-Oxley Act
B. Gramm-Leach-Bliley Act
C. HIPAA
D. GDPR
Why are small businesses more vulnerable to cyberattacks?
A. They don't use computers
B. They have no customer data
C. Their networks are less protected
D. Hackers avoid targeting them
0
{"name":"Securing Information Systems - Review", "url":"https://www.quiz-maker.com/QPTVYWPPW","txt":"What type of malware pretends to be a legitimate program to trick users into installing it?, Which of the following is a more secure alternative to traditional passwords?, What does a Distributed Denial-of-Service (DDoS) attack do?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Make your own Survey
- it's free to start.