Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?

(Multiple Choice)
5.0/5
(36)

_____ refers to a trusted third party that provides authentication services in public key encryption schemes.

(Short Answer)
4.9/5
(36)

URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL will clearly reveal the destination arrived at when clicked on.

(True/False)
4.9/5
(32)

_____ refers to a term that either means breaking into a computer system or a particularly clever solution.

(Short Answer)
4.7/5
(37)

Spear phishing attacks specifically target a given organization or group of users.

(True/False)
4.7/5
(27)

Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.

(Short Answer)
4.8/5
(32)

Briefly explain the steps one should take to ensure that their highest priority accounts are not compromised easily by hackers.

(Essay)
4.8/5
(34)

One of the reasons organizations delay patches to plug holes in their security applications is:

(Multiple Choice)
4.9/5
(30)

Two-factor authentication is favored for most security situations since it's considered to be fast and conveient for customres.

(True/False)
4.8/5
(34)
Showing 81 - 89 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)