Exam 1: The Threat Environment

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The chances of an organization having a data breach over the next two years is approximately ________.

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

D

________ are considered the most dangerous of all employees.

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

B

Which of the following countries was NOT cited by the Foreign Economic Espionage in Cyberspace as being the most capable cyber actors actively engaged in economic espionage?

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

D

Cookies are small text strings stored on your own personal computer.

(True/False)
4.9/5
(33)

Identify theft can (and does) happen to individuals, but it is not a worry or risk that corporations have.

(True/False)
4.9/5
(30)

Indirect costs due to data breaches are estimated to be:

(Multiple Choice)
4.8/5
(35)

More than 67 percent of data breaches come from hackers trying to make money.

(True/False)
4.7/5
(35)

Which of the following is FALSE about rootkits?

(Multiple Choice)
4.9/5
(38)

A distributed denial-of-service attach is the most common type of DoS attack.

(True/False)
4.8/5
(39)

What is a payload?

(Multiple Choice)
4.8/5
(28)

What is Trojan.POSRAM in regard to Target's data breach?

(Multiple Choice)
4.9/5
(27)

Sending packets with false IP source addresses is known as ________.

(Multiple Choice)
4.9/5
(46)

Which of the following is likely the most common criminal attack on individuals?

(Multiple Choice)
4.8/5
(30)

Black-market website programs reward researchers for finding vulnerabilities within their computer systems.

(True/False)
4.8/5
(44)

Which of the following companies experienced the largest data breach in history in 2016?

(Multiple Choice)
4.8/5
(23)

Data breaches are rarely costly to a company.

(True/False)
4.8/5
(30)

________ is a sophisticated computer hack usually perpetrated by a large, well-funded organization.

(Multiple Choice)
4.8/5
(36)

Penalties for hacking are significantly different if you are attempting to steal a million dollars or attempting to steal nothing of value.

(True/False)
4.8/5
(29)

In click fraud, a criminal website owner creates a program so cookies are automatically downloaded to the computer's hard drive.

(True/False)
4.9/5
(34)

Russia, China, and Iran are quite active in cyberwar espionage.

(True/False)
4.8/5
(29)
Showing 1 - 20 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)