Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.

(Short Answer)
4.8/5
(40)

Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.

(Short Answer)
4.8/5
(33)

Which of the following statements is consistent with ground realities regarding information security?

(Multiple Choice)
4.9/5
(34)

A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.

(Multiple Choice)
4.8/5
(36)

ware failure is the least likely of threats to one's data.

(True/False)
4.7/5
(37)

Some of the most common guidelines issued by Web sites when designing a secure password include:

(Multiple Choice)
4.9/5
(21)

The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of:

(Multiple Choice)
4.9/5
(41)

A vast majority of security breaches are not preventable and happen despite the best security practices.

(True/False)
4.8/5
(38)

A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.

(True/False)
4.9/5
(34)

Which of the following statements holds true for the term spoof?

(Multiple Choice)
4.8/5
(41)

Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.

(Short Answer)
4.8/5
(36)

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:

(Multiple Choice)
4.9/5
(30)

_____ refers to confidence scams executed through technology.

(Short Answer)
4.7/5
(39)

The phrase ______________ refers to security where identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form if identification

(Short Answer)
4.8/5
(34)

When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.

(True/False)
4.8/5
(33)

Viruses are programs that infect other software or files and require:

(Multiple Choice)
4.8/5
(29)

An attack on the US power grid by terrorists or a foreign power is indicative of:

(Multiple Choice)
4.8/5
(36)

Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.

(Short Answer)
4.9/5
(36)

_____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.

(Short Answer)
4.7/5
(41)

A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?

(Multiple Choice)
4.9/5
(43)
Showing 61 - 80 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)