Malware

A blackout — whether it’s caused by natural disasters or external forces — can last hours, days, or weeks and affect millions of people. Without standby generators or other alternative backup systems, refrigeration, light, and running water are not available, and financial transactions can’t be made electronically. As medical and food supplies dwindle, law and order are tested.

So if the utility grid becomes compromised, how will the critical infrastructure that supports companies and operations across the globe maintain availability?

1. Partnering with IT experts will ensure networks and IT systems are:
A. Monitored continuously
B. Hardened
C. 3 Up to the latest standards to prevent hacking
D. All of the above
2. If standby generators or other alternative backup systems are not available, which one of the following will occur?
A. No access to refrigeration
B. No access to light
C. No access to running water
D. All of the above
3. During a cyberattack, to the electrical grid, ____________________ will provide backup power until __________ is unavailable.
A. Medium-sized batteries; oil
B. Large batteries; biogas
C. Emergency generators; fuel
D. Wall outlets; coal
4. Why are data breaches gaining increased attention?
A. It is easier to hack a computer now more than ever
B. We are more dependent on the digital processing and storage of data
C. The cost of data breaches is decreasing
D. None of the above
5. User’s can protect themselves against data breaches by using __________ while companies can use ____________.
A. Two-factor authentication; multifactor authentication
B. Keeping up with the news; anti-malware
C. Multifactor authentication; two-factor authentication
D. None of the above
6. How can you guard and protect sensitive data from hackers?
A. Sensitive data must be printed and stored in a secured room
B. Data files must be encrypted before they are stored
C. Store sensitive data on a computer not connected to the internet
D. Sensitive data should be uploaded to a secured cloud database
7. What are some of the common types of cyberattacks experienced by American businesses and companies?
A. Phishing emails
B. Malware
C. Denial-of-Services Attacks (DoS)
D. Viruses, worms, Trojans, and malware
8. What is Stuxnet?
A. Virus
B. Malware
C. Cyberworm
D. Ransomware
9. Which one of the following is not a focus of the cyberfraud task force?
A. Auctions on the dark web
B. Business email compromise scams
C. Crypto-jacking
D. d. Theft of intellectual property
10. The use of __________ can limit traffic to and from critical data storage, systems, and other peripheral hardware.
A. Anti-malware
B. Firewalls
C. Physical storage devices
D. Multiple master keys
Thank you!
Your score is