Which of these terms is NOT a type of cyber phishing
[A] Smishing [B] Wishing [C] Quishing [D] Vishing
[B] Wishing
In 2015, over 25 gigabytes of user data was famously leaked by a group self-named "The Impact Team", exposing people seeking extramarital affairs on which two-word Canadian dating network?
Ashley Madison
What does HIPAA stand for?
Health Insurance Portability and Accountability Act
What is the weakest link in cybersecurity?
People inside the organization
Malicious programs that extort money from their victims by blocking access to the computer or encrypting the data stored on it until the victim pays.
Ransomware
If a friendly horse offers you something online that turns out to be malware, that's a cyberattack named for a siege on what ancient city?
Troy (Trojan Horse)
According to the Terrebonne General's password policy, all passwords must be changed after how many days?
90 Days
Which platform is responsible for housing all policies, particularly security policies, for Terrebonne General?
PolicyTech
What acronym is used to describe everyday objects that are connected to the internet and are able to collect and transfer data automatically?
[A] IpS [B] TBD [C] IoT [D] VPN
[C] IoT (Internet of Things)
How many patients were potentially affected following the Baton Rouge Clinic cyber attack on their EHR system in 2020?
[A] 50,000 [B] 120,000 [C] 310,000 [D] 422,000
[C] 310,000
This authentication method is the best way to restrict access to your files and devices?
Multi-Factor/Two-Factor
What communication channel is used in smishing attempts?
text messages
What is the term in network security for an attack where a person or program allows themselves to be identified as someone else by falsifying data?
[A] Deep Fake [B] Spoof [C] Malware [D] Spam
[B] Spoof
Which Louisiana governmental department or entity was affected by the MoveIt security breach in 2023?
Louisiana Department of Transportation
Employing a ______ trust strategy means that every user has to be authenticated no matter what. [A] Encrypted [B] SUS [C] Zero [D] Anti
[C] Zero
What are the common goals of criminals behind a ransomware attack? [A] To disrupt an organization's operations [B] Revenge [C] To install bugs and viruses to infect the computer [D] To steal information from an individual or business
[D] To steal information from an individual or business
Social ______ is the name of the cybersecurity threat where actors trick others into revealing sensitive information.
Engineering
What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016?
______ phishing is a type of phishing assault that targets a small number of high-value targets, usually just one.
Spear
What is the average cost of a data breach in the U.S.?
[A] 9.5 Million [B] 15 Million [C] 1 Billion [D] $20 and a Costco membership [E] 5 Million [F] 1.5 Billion
[A] 9.5 Million