Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.

(True/False)
4.8/5
(28)

The _____ technique zeros in on a sloppy programming practice where software developers don't validate user input.

(Short Answer)
4.8/5
(32)

A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is known as a(n):

(Multiple Choice)
4.9/5
(34)

Online backup services are considered a poor choice for end-users, since this only increases the liklihood that an individual's data will be hacked.

(True/False)
4.8/5
(35)

The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining and improving organizational security.

(True/False)
4.9/5
(40)

What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways?

(Multiple Choice)
4.7/5
(30)

Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n):

(Multiple Choice)
4.8/5
(38)

It's bad when a firm's e-mail and password file is stolen however the impact is minimized because user passwords set up for one system cannot be used on others.

(True/False)
4.9/5
(31)

_____ are scrambled character images used to thwart things like automated account setup or ticket buying.

(Short Answer)
4.8/5
(26)

Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because:

(Multiple Choice)
4.7/5
(34)

One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, reroutiing a user to an alternate online destination.

(True/False)
4.8/5
(33)

Hackers might infiltrate computer systems to enlist ware for subsequent illegal acts.

(True/False)
4.8/5
(32)

_____ are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

(Short Answer)
4.9/5
(42)

Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites?

(Multiple Choice)
4.8/5
(39)

Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:

(Multiple Choice)
4.9/5
(28)

Web sites of reputed companies can also be sources of malware.

(True/False)
4.9/5
(38)

Worms require an executable (a running program) to spread, attaching to other executables.

(True/False)
4.9/5
(23)

Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the complexity of managing security in an organization.

(True/False)
4.8/5
(31)

Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.

(True/False)
4.9/5
(27)

What is the key takeaway from the Heartland breach? a. Even widely-used open source software is vulnerable. b. Compliance does not equal security and firms that have passed multiple compliance audits may still remain vulnerable. c. SSL public-key encrpytion can be hacked. d. GitHub is a horrible place to store widely-used code. e. Firms that fail to employ ISO 27000 will remain vulnerable.

(Short Answer)
4.9/5
(25)
Showing 41 - 60 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)