Exam 7: Industrial Espionage in Cyberspace

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The process to list assets that you believe support your organization is called ________.

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

B

Microsoft Windows includes BitLocker in some editions,so entire hard drives can be encrypted.

Free
(True/False)
4.8/5
(30)
Correct Answer:
Verified

True

Funcrypt is a free tool that can be used to encrypt drives,folders,or partitions.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

False

Quick Stego and Invisible Secrets are two software tools that can be used for __________.

(Multiple Choice)
4.7/5
(35)

The Patriot Act was the first U.S.law to criminalize theft of commercial trade secrets.

(True/False)
4.9/5
(33)

Which of the following is NOT an example of industrial espionage?

(Multiple Choice)
4.7/5
(36)

Cookies and key loggers are examples of ____________.

(Multiple Choice)
4.9/5
(32)

Data stored in computer systems has a high value because there is a great deal of time and effort that goes into creating an analyzing it and ________________.

(Multiple Choice)
4.7/5
(35)

The chief executive officer of Oracle defends his practice to hire private investigators to sift through the garbage of which competitor?

(Multiple Choice)
4.8/5
(32)

The company whose chief executive officer was indicted for copyright infringement of allegedly stealing technology from D-Link,which was one of its own customers,was _________.

(Multiple Choice)
4.8/5
(28)

VI (value of information)= C (cost to produce)+ VG (value gained).

(True/False)
4.8/5
(40)

Crafting email and websites to specifically target certain victims is called dive bombing.

(True/False)
4.7/5
(38)

A key logger can be hardware-based of software-based.

(True/False)
4.9/5
(41)

______________ is the use of spying techniques to find out key information that is of economic value.

(Multiple Choice)
4.8/5
(24)

Giving personnel access to only data that they absolutely need to perform their jobs is referred to as _________.

(Multiple Choice)
4.8/5
(39)

Employees with access to any sensitive information should be asked to sign nondisclosure agreements.

(True/False)
4.7/5
(31)

VI (value of information)= C (cost to produce)+ ___________.

(Multiple Choice)
4.8/5
(37)

Industrial espionage is the use of spying techniques to find out key information that is of economic value.

(True/False)
4.8/5
(40)

Sending an email that claims to come from a different sender,and asking for sensitive data is an example of ___________.

(Multiple Choice)
4.8/5
(38)

The single greatest security risk to any organization is _________.

(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)