Exam 4: Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information.

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

C

Blacklisting is when everything can run except what is on the list.

Free
(True/False)
5.0/5
(31)
Correct Answer:
Verified

True

A ___________ is an attack by a programmer developing a system.

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

A

Shodan's primary purpose is ___________.

(Multiple Choice)
4.9/5
(27)

The main problem with multifactor authentication is _____________.

(Multiple Choice)
4.9/5
(36)

_____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

(Multiple Choice)
4.8/5
(37)

_________ is any danger to which a system may be exposed.

(Multiple Choice)
4.9/5
(28)

Which country is currently in a dispute with the US over bilateral hacking?

(Multiple Choice)
4.9/5
(34)

________________ is software that causes pop-up advertisements to appear on your screen.

(Short Answer)
4.7/5
(23)

Biometrics is something the user _______.

(Multiple Choice)
4.8/5
(29)

Wireless is an untrusted network.

(True/False)
5.0/5
(49)

You decide to use the password "1234" on your computer because you figure nobody cares enough about your information to steal it. This is a risk __________ strategy.

(Multiple Choice)
4.8/5
(32)

The Shodan case illustrates ___________.

(Multiple Choice)
4.7/5
(36)

Tracking down cybercriminals is the most difficult and only real challenge authorities face.

(True/False)
4.8/5
(35)

Biometrics is an authentication tool.

(True/False)
4.7/5
(36)

Janitors are no threat to information security since they have no access to company systems.

(True/False)
4.8/5
(46)

Whitelisting is when nothing can run unless it is on the list.

(True/False)
4.9/5
(23)

A ___________ is a remote attack requiring user action.

(Multiple Choice)
4.8/5
(30)

According to the "Catching a Hacker" case, ____________ is one of the most sophisticated and destructive malicious software programs ever developed.

(Multiple Choice)
4.8/5
(41)

Social engineering is a(n)___________ threat on the part of the employee and a(n)_________ threat on the part of the social engineer.

(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)