Exam 27: Data Breaches

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A group of hackers decide to steal credit card details of the users of Swift Shopping Inc., a leading e-commerce company. They infect the security system of the company's third-party vendor and gain access into its internal network. They compromise an internal Windows server of the company and use a malware to extract customer data. Which of the following is illustrated in this scenario?

(Multiple Choice)
4.8/5
(33)

Which of the following is a direct cost of handling a data breach?

(Multiple Choice)
4.8/5
(39)

Stuart works for a financial brokerage. His job involves handling sensitive client information such as financial details. Stuart illegally transfers details of some clients from his office computer to his personal email ID, to misuse later. With reference to this situation, Stuart is guilty of ________.

(Multiple Choice)
4.8/5
(37)

Which of the following is TRUE of the measures to be taken by an organization in the event of a data breach?

(Multiple Choice)
4.8/5
(35)

List suggestions for preventing data loss?

(Essay)
5.0/5
(32)

Data extrusion helps organizations secure their data from possible data breaches.

(True/False)
4.7/5
(37)

Stolen credit card information is validated through a process called carding.

(True/False)
4.8/5
(32)

Stolen information is commonly used to pay bills.

(True/False)
5.0/5
(37)

If a company wants to prevent a SQL injection attack, all they have to do is train their users.

(True/False)
4.9/5
(33)

What are the steps involved in an organization's plan for a data breach?

(Essay)
4.7/5
(36)

Venclave Hospital is a privately-owned organization that specializes in treating neurological diseases. Which of the following regulatory laws governs the data security measures to be taken by this hospital for protecting against data breach?

(Multiple Choice)
4.8/5
(35)

When planning for a data breach which of the following should be part of the process?

(Multiple Choice)
4.9/5
(36)

Regulatory fines imposed after a data breach can never be higher than the financial damage done during the data breach.

(True/False)
4.8/5
(44)

Which of the following are NOT ways a company should handle a data breach?

(Multiple Choice)
4.7/5
(33)

________ are countermeasures designed to prevent sensitive data from being released to unauthorized persons.

(Multiple Choice)
4.8/5
(29)

Hackers experiment with new ________ or ways of attacking a target.

(Multiple Choice)
4.9/5
(32)

Decisions on how to respond to a data breach are most effective if they are made when the breach is happening.

(True/False)
4.8/5
(29)

An organization can easily stop a simple SQL injection attack on its online store by additional user training, stronger vendor authentication, or an internal network intrusion detection system.

(True/False)
4.9/5
(36)

Which of the following regulatory laws requires data protection for health care institutions?

(Multiple Choice)
4.7/5
(29)

Direct costs of handling a data breach do not include paying for detection of the breach.

(True/False)
4.9/5
(38)
Showing 21 - 40 of 65
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)