Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card that can be received and processed by banking and transaction firms at the time of payment. They are in use in ApplePay and Android Wallet.

Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Verified

tokenization

Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

True

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

E

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.

(Multiple Choice)
4.9/5
(39)

The information systems of several firms have been compromised by insiders that can include contract employees, cleaning staff, and temporary staffers.

(True/False)
4.9/5
(24)

Which of the following are considered sources of information that can potentially be used by social engineers?

(Multiple Choice)
4.9/5
(44)

Which of these would be an example of a DDoS attack?

(Multiple Choice)
4.8/5
(35)

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.

(Multiple Choice)
4.8/5
(36)

The term _____ originally referred to a particularly skilled programmer.

(Multiple Choice)
4.8/5
(36)

Describe briefly a few of the physical threats posed by hackers to information security with examples for each.

(Essay)
4.7/5
(33)

According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.

(True/False)
4.8/5
(27)

Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.

(Multiple Choice)
4.9/5
(42)

Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers.

(True/False)
4.9/5
(35)

What are the steps to be taken with respect to firm employees in order to ensure organizational security?

(Essay)
4.9/5
(36)

In security circles the phrase "compliance" refers to:

(Multiple Choice)
5.0/5
(35)

Describe briefly how technology can be leveraged to offset the attempts of attackers to undermine information security.

(Essay)
4.7/5
(32)

Which of the following is a valid statement on information security?

(Multiple Choice)
4.9/5
(25)

What are botnets and how are criminals using this technology?

(Essay)
4.9/5
(35)

Updates that plug existing holes in a software are called:

(Multiple Choice)
4.9/5
(41)

Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was thought to have occurred during the Target security breach? a. Target had security software, but the notification alerts from the software were ignored. b. Target had properly installed and configured its security software, but hackers got in, anyway. c. Credit card databases were on entirely separate systems, not connected to other parts of the firm's information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection. d. Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn't be detected. e. All of the above

(Short Answer)
4.8/5
(29)
Showing 1 - 20 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)