Exam 7: Industrial Espionage in Cyberspace
Exam 1: Introduction to Computer Security24 Questions
Exam 2: Networks and the Internet25 Questions
Exam 3: Cyber Stalking, Fraud, and Abuse25 Questions
Exam 4: Denial of Service Attacks25 Questions
Exam 5: Malware25 Questions
Exam 6: Techniques Used by Hackers25 Questions
Exam 7: Industrial Espionage in Cyberspace25 Questions
Exam 8: Encryption25 Questions
Exam 9: Computer Security Software23 Questions
Exam 10: Security Policies25 Questions
Exam 11: Network Scanning and Vulnerability Scanning21 Questions
Exam 12: Cyber Terrorism and Information Warfare23 Questions
Exam 13: Cyber Detective24 Questions
Exam 14: Introduction to Forensics25 Questions
Select questions type
The process to list assets that you believe support your organization is called ________.
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
B
Microsoft Windows includes BitLocker in some editions,so entire hard drives can be encrypted.
Free
(True/False)
4.8/5
(30)
Correct Answer:
True
Funcrypt is a free tool that can be used to encrypt drives,folders,or partitions.
Free
(True/False)
4.8/5
(35)
Correct Answer:
False
Quick Stego and Invisible Secrets are two software tools that can be used for __________.
(Multiple Choice)
4.7/5
(35)
The Patriot Act was the first U.S.law to criminalize theft of commercial trade secrets.
(True/False)
4.9/5
(33)
Which of the following is NOT an example of industrial espionage?
(Multiple Choice)
4.7/5
(36)
Data stored in computer systems has a high value because there is a great deal of time and effort that goes into creating an analyzing it and ________________.
(Multiple Choice)
4.7/5
(35)
The chief executive officer of Oracle defends his practice to hire private investigators to sift through the garbage of which competitor?
(Multiple Choice)
4.8/5
(32)
The company whose chief executive officer was indicted for copyright infringement of allegedly stealing technology from D-Link,which was one of its own customers,was _________.
(Multiple Choice)
4.8/5
(28)
VI (value of information)= C (cost to produce)+ VG (value gained).
(True/False)
4.8/5
(40)
Crafting email and websites to specifically target certain victims is called dive bombing.
(True/False)
4.7/5
(38)
______________ is the use of spying techniques to find out key information that is of economic value.
(Multiple Choice)
4.8/5
(24)
Giving personnel access to only data that they absolutely need to perform their jobs is referred to as _________.
(Multiple Choice)
4.8/5
(39)
Employees with access to any sensitive information should be asked to sign nondisclosure agreements.
(True/False)
4.7/5
(31)
VI (value of information)= C (cost to produce)+ ___________.
(Multiple Choice)
4.8/5
(37)
Industrial espionage is the use of spying techniques to find out key information that is of economic value.
(True/False)
4.8/5
(40)
Sending an email that claims to come from a different sender,and asking for sensitive data is an example of ___________.
(Multiple Choice)
4.8/5
(38)
The single greatest security risk to any organization is _________.
(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)