A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?

CCST Cyber Flashcard Test #1

Flashcard
•
Information Technology (IT)
•
9th Grade
•
Hard
Quizizz Content
FREE Resource
Student preview

8 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Back
Patient records
Answer explanation
Explanation: An email message is transmitted in plain text and can be read by anyone who has access to the data while it is en route to a destination. Patient records include confidential or sensitive information that should be transmitted in a secure manner.
2.
FLASHCARD QUESTION
Front
What is the best way to avoid getting spyware on a machine? Options: Install the latest antivirus updates, Install the latest web browser updates, Install software only from trusted websites, Install the latest operating system updates
Back
Install software only from trusted websites
3.
FLASHCARD QUESTION
Front
Which certification meets the U.S. Department of Defense Directive 8570.01-M requirements for IT security in the federal government? Options: ISC2 Certified Information Systems Security Professional, ISACA CSX Cybersecurity Fundamentals, Microsoft Technology Associate Security Fundamentals, EC Council Certified Ethical Hacker, CompTIA Security+
Back
CompTIA Security+
Answer explanation
Explanation: This is an entry-level security certification that meets the U.S. Department of Defense Directive 8570.01-M requirements, which is an important item for anyone looking to work in IT security for the federal government.
4.
FLASHCARD QUESTION
Front
Which certification tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner? Options: EC Council Certified Ethical Hacker, Palo Alto Networks Certified Cybersecurity Associate, ISC2 Certified Information Systems Security Professional, Microsoft Technology Associate Security Fundamentals, CompTIA Security+
Back
EC Council Certified Ethical Hacker
Answer explanation
Explanation: This certification tests your understanding and knowledge of how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker but in a lawful and legitimate manne
5.
FLASHCARD QUESTION
Front
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
Back
Weaknesses in security practices
Answer explanation
Explanation: Systems and sensitive data can be protected through techniques such as authentication, authorization and encryption. Developers should stick to using security techniques and libraries that have already been created, tested and verified and should not attempt to create their own security algorithms. These will only likely introduce new vulnerabilities.
6.
FLASHCARD QUESTION
Front
Which of the following firewalls filters traffic based on source and destination IP addresses? Network layer firewall, Proxy server, Application layer firewall
Back
Network layer firewall
7.
FLASHCARD QUESTION
Front
Which of the following firewalls filters web content requests such as URLs and domain names? Application layer firewall, Proxy server, Reverse proxy server, Network layer firewall, Network address translation firewall
Back
Proxy server
8.
FLASHCARD QUESTION
Front
When describing malware, what is a difference between a virus and a worm?
Back
A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.
Answer explanation
Explanation: Malware can be classified as follows:
Virus (self-replicates by attaching to another program or file)
Worm (replicates independently of another program)
Trojan horse (masquerades as a legitimate file or program)
Rootkit (gains privileged access to a machine while concealing itself)
Spyware (collects information from a target system)
Adware (delivers advertisements with or without consent)
Bot (waits for commands from the hacker)
Ransomware (holds a computer system or data captive until payment is received)
Similar Resources on Quizizz
11 questions
Malware and Viruses Mod.

Flashcard
•
7th - 8th Grade
10 questions
DPK Elemen 6 Flashcard

Flashcard
•
10th Grade
11 questions
Updated Laws To A Technician's Scope Of Practice

Flashcard
•
9th Grade
7 questions
National Security Pathway

Flashcard
•
8th Grade
10 questions
Online Safety

Flashcard
•
9th Grade
9 questions
CCST Test #2 for cert exam

Flashcard
•
9th Grade
10 questions
DPK Elemen 5 Flashcard

Flashcard
•
10th Grade
7 questions
CISCO CCST Cyber Flashcard #2

Flashcard
•
9th - 12th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University