In: Computer Science
QUESTION 1
Briefly describe how social engineering can be used to take advantage of unwitting insider threats
QUESTION 2
True or False - Insiders aren't threats unless they recently came from outside the organization
True
False
QUESTION 3
Why is spear phishing particularly relevant to the problem of insider threats?
It is specifically crafted to bypass firewalls
It is specifically crafted to target computers running the Windows operating system
It is specifically crafted to appear relevant to particular insiders
It is crafted by specifically talented insiders
QUESTION 4
Why is an insider threat potentially more serious than an external threat?
Insiders often already have access to sensitive information or restricted areas
Insiders have better social engineering skills
External threats aren't interested in industrial espionage but insiders are
External threats have comparatively weak technical skills
QUESTION 5
Industrial Espionage is most likely driven by which component of the MICE motivation acronym?
Ideology
Money
Coercion
Ego
QUESTION 6
Match each potential insider threat with the most likely motivation from the MICE motivation acronym
Nurse that has a gambling problem
Research Scientist being blackmailed
Employee that believes their company is harming the environment
Supervisor recently passed over for a promotion to manager
A.
Ego
B.
Money
C.
Coercion
D.
Ideology
QUESTION 7
Which type of malware is most closely related to the problem of insider threats?
Macro Virus
Trojan Horse
Worm
Spyware
QUESTION 8
True or False - The threats that insiders pose can be eliminated by using the right technologies
True
False
QUESTION 9
Behavioral indicators of potential insider threats often violate which cybersecurity concepts? (Choose two)
Availability
Least Privilege
Perimeter security
Confidentiality
Filtering
QUESTION 1 Briefly describe how social engineering can be used to take advantage of unwitting insider threats
Answer -
QUESTION 2 True or False - Insiders aren't threats unless they recently came from outside the organization
Answer - False as attackers can also target them when they are inside the organization.
QUESTION 3 Why is spear phishing particularly relevant to the problem of insider threats?
Answer - It is specifically crafted to appear relevant to particular insiders
QUESTION 4 Why is an insider threat potentially more serious than an external threat?
Answer - Insiders often already have access to sensitive information or restricted areas.
QUESTION 5 Industrial Espionage is most likely driven by which component of the MICE motivation acronym?
Answer - Money : Espionage is the act of obtaining sensitive information without permission and Industrial Espionage is carried out generally by an organisation's competitors for commercial purposes.
QUESTION 6 Match each potential insider threat with the most likely motivation from the MICE motivation acronym
A. Ego
B. Money
C. Coercion
D. Ideology
Answer -
QUESTION 7 Which type of malware is most closely related to the problem of insider threats?
Answer- Spyware as Spyware is a generic term for any software(including Trojan Horse) that is designed to steal sensitive information from the user's system.
QUESTION 8 True or False - The threats that insiders pose can be eliminated by using the right technologies
Answer - False as the information passed by Insiders either knowingly or unknowingly can't be stopped with the help of technology.
QUESTION 9 Behavioral indicators of potential insider threats often violate which cybersecurity concepts? (Choose two)
Answer -