Exam 26: Data Breaches

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Sam is a hacker who makes money by stealing and selling credit cards.He has targeted the employees of a local firm and is looking for details such as names,addresses,dates of birth,social security numbers,credit card numbers,or health records.In this case,Sam is looking for ________.

(Multiple Choice)
4.7/5
(41)

Explain how hackers use information stolen from data breaches for credit card forgery.

(Essay)
4.9/5
(29)

Performing a walkthrough should be done as part of a business continuity planning session.

(True/False)
4.9/5
(32)

Talgedco Inc. ,a software company,has taken several steps to secure its systems and data.The company has also installed a network intrusion detection system and data loss prevention system.Employees of this company have also been trained on the procedures to be followed to reduce the probability of a data breach.These steps taken by Talgedco are an example of ________.

(Multiple Choice)
4.8/5
(35)

The first step in protecting oneself from data breaches is ________.

(Multiple Choice)
4.8/5
(40)

________ refers to a software used by hackers to take advantage of a newly discovered vulnerability in a target's application or operating system.

(Multiple Choice)
4.8/5
(36)

Which of the following regulatory laws requires data protection for health care institutions?

(Multiple Choice)
4.7/5
(39)

The ________ is a regulatory law that requires security precautions for government agencies.

(Multiple Choice)
4.9/5
(41)

The Gramm-Leach-Bliley Act (GLBA)is a universal regulatory law that applies to all types of industries.

(True/False)
4.9/5
(36)

Organizations can implement countermeasures that make data breaches impossible to occur.

(True/False)
4.8/5
(43)

What are countermeasures? Why is it important for organizations to implement countermeasures?

(Essay)
4.8/5
(44)

The ________ is a regulatory law that provides protection for student education records.

(Multiple Choice)
4.8/5
(42)

A(n)________ is used to examine traffic passing through an organization's internal network.

(Multiple Choice)
4.8/5
(38)

Despite data breach,organizations should refrain from informing their users immediately as it will lead to mass user defection.

(True/False)
4.7/5
(35)

Each type of data breach is different because hackers are continually developing new tools and techniques that enable them to steal more data.

(True/False)
4.8/5
(37)

A group of hackers decide to steal credit card details of the users of Swift Shopping Inc. ,a leading e-commerce company.They infect the security system of the company's third-party vendor and gain access into its internal network.They compromise an internal Windows server of the company and use a malware to extract customer data.Which of the following is illustrated in this scenario?

(Multiple Choice)
4.8/5
(37)

Data breach notifications to users should include ________.

(Multiple Choice)
4.7/5
(30)

According to the reports in Ponemon's 2014 Cost of Data Breach Study,the average costs per stolen record were the highest in the ________ industry.

(Multiple Choice)
4.8/5
(41)

Which of the following is a direct cost of handling a data breach?

(Multiple Choice)
4.7/5
(34)

An exploit is a type of attack vector used by hackers.

(True/False)
4.9/5
(41)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)