Exam 8: Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Internal threats are considered the most lethal threat. What are they, why are they so lethal and what can a company do to protect against them?

Free
(Essay)
4.7/5
(41)
Correct Answer:
Verified

On the black market, stolen data in a "kit" that contains credit card information plus social security number and medical information is worth:

Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
Verified

D

Two factor authentication is when you use two different methods for people trying to use the system. For instance, you can use a password and a challenge question

Free
(True/False)
5.0/5
(38)
Correct Answer:
Verified

True

When the Office of Personnel Management was hacked, all of the following are true except:

(Multiple Choice)
4.9/5
(39)

In the Office of Personnel Management's case, the security breach made many people vulnerable to this.

(Multiple Choice)
4.8/5
(41)

A challenge question is when you are stopped at the gate and the guard asks who you are.

(True/False)
4.9/5
(36)

Who is responsible for developing security education, awareness, and training programs?

(Multiple Choice)
4.7/5
(36)

In the Target breach, the IT department was warned on or about the time the files were transferred.

(True/False)
4.8/5
(41)

The cost of a data breach in 2015 is estimated to be:

(Multiple Choice)
4.9/5
(30)

In the Target breach, the HVAC systems were actually attached to the retail sales system.

(True/False)
4.8/5
(34)

What is a piece of software that traps keystrokes and stores them for hackers to inspect later?

(Short Answer)
4.8/5
(38)

What are the shortcomings of passwords?

(Short Answer)
4.7/5
(36)

Firewalls can be either in hardware or software form.

(True/False)
4.8/5
(32)

Spoofing is:

(Multiple Choice)
4.9/5
(41)

___ of breaches are caused by stealing a password

(Multiple Choice)
4.8/5
(33)

An "evil twin" in the context of computer security is:

(Multiple Choice)
4.8/5
(37)

A hacker who buys credit card information from hackers receives a short-term guarantee in case the card is declined.

(True/False)
4.7/5
(36)

In the Anthem Blue Cross breach, where 80 million names, birthdays, social security numbers, etc., were stolen, the hackers got in by:

(Multiple Choice)
4.9/5
(22)

Many organizations and even consumers use this to control access to a network like the Internet, allowing only authorized traffic to pass.

(Multiple Choice)
4.9/5
(33)

It is estimated that ___ % of all firms have been breached:

(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)