Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.

(Multiple Choice)
4.9/5
(40)

The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.

(Short Answer)
4.8/5
(41)

What are some of the key managerial takeaways from the Target security breach?

(Essay)
5.0/5
(32)

Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.

(True/False)
4.7/5
(42)

Regularly updated software lowers a system's vulnerable attack surface.

(True/False)
4.8/5
(35)

Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.

(True/False)
4.8/5
(31)

One of the major problems with the Heartbleed bug in OpenSSL software is that:

(Multiple Choice)
4.8/5
(32)

Which of the following statements holds true for the term encryption?

(Multiple Choice)
4.8/5
(33)

Information security policies would be ineffective without _____ and _____.

(Multiple Choice)
4.7/5
(41)

Describe some of the factors at work that enabled the Target security breach to occur.

(Essay)
4.7/5
(32)

Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as:

(Multiple Choice)
5.0/5
(31)

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.

(Multiple Choice)
4.7/5
(31)

In public-key encryption systems, the functions of the public and private keys are interchangeable.

(True/False)
4.9/5
(38)

_____ can be either software-based or deployed via ware, such as a recording "dongle" that is plugged in between a keyboard and a PC.

(Multiple Choice)
4.8/5
(30)

Almost all security breaches can be traced back to technology lapses personnel or procedural factors rarely factor in.

(True/False)
4.8/5
(39)

_____ are seemingly tempting, but bogus targets meant to draw hacking attempts.

(Short Answer)
4.8/5
(41)

A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions.

(True/False)
4.9/5
(35)

The topic of U.S. government surveilance continues to be hotly debated, with strong opinions in favor of surveilance programs, as well as vocal protestations of government overreach. Briefly give the argument for and against U.S. government surveilance practices.

(Essay)
4.9/5
(35)

Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?

(Multiple Choice)
4.7/5
(45)

_____ are systems that act as controls for network traffic, blocking unauthorized traffic while permitting acceptable use.

(Short Answer)
4.9/5
(30)
Showing 21 - 40 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)