Ransomware | OT Device Patching | General Cybersecurity Questions | Industrial Control Systems | IoT Security |
---|---|---|---|---|
What is humans
What is the weakest link in cybersecurity?
|
What is patching
The operating system on your industrial machine is a couple versions old and hasn’t been updated since its installation. The OS software needs to be:
|
What is Phishing
What are fake emails or websites that look like real emails and websites and try to steal your data.
|
What is a closed-loop system
What kind of system relies on feedback in order to operate?
|
What is security
What is not the characteristic of IoT technology?
|
What is WannaCry
Which Ransomware is the biggest ransomware attack in history?
|
What is SMS
Which patch management tool should you use to manage a large number of Windows boxes in an enterprise?
|
What is a worm
What is a standalone piece of malware that can self-replicate, mostly without human intervention
|
What is a transducer
How do you call the device that converts a physical quantity, such as pressure or brightness, into an electrical signal, or vice versa.
|
What is transport
The UDP protocol belongs to __________ layer
|
What is encryption
Securing data by encoding it where a key is required for access is known as
|
What is a firewall
What is a standalone piece of malware that can self-replicate, mostly without human intervention
|
What is true
Within systems, every system will have an output. True or false?
|
||
What is Bitcoin
Ransomware payments are often demanded in the form of
|
What is feedback
When the output of a system is used to influence input it is known as?
|
|||
What is AIDS Trojan
Which Ransomware is known as the first ransomware virus?
|
What is a web application firewall
WHat helps you protect your valuable web applications and data by continuously monitoring traffic and enforcing policies to identify and block threats.
|
What is data-logging
Collecting data at regular intervals over a set period of time is called?
|
||