Exam 26: Data Breaches

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The purpose of a business continuity planning session in an organization is to ________.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

A

A student at the MSA University hacked into the university's official Web site and stole some confidential information about the scholarship program.This incident is an example of ________.

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

A

Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hack into its Web site.Which of the following can Bob use to take advantage of this liability?

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

A

Why should organizations respond quickly to data breaches?

(Essay)
4.8/5
(31)

________ are countermeasures designed to prevent sensitive data from being released to unauthorized persons.

(Multiple Choice)
4.8/5
(30)

Explain how hackers use information stolen from data breaches for credit card forgery.

(Essay)
4.9/5
(32)

Direct costs of handling a data breach do not include paying for detection of the breach.

(True/False)
4.9/5
(42)

Which of the following should be done by employees to protect against data breaches?

(Multiple Choice)
4.7/5
(40)

List some of the regulatory laws that govern the secure storage of data in certain industries.

(Essay)
4.9/5
(38)

A(n)________ is used to examine traffic passing through an organization's internal network.

(Multiple Choice)
4.9/5
(37)

Decisions on how to respond to a data breach are most effective if they are made when the breach is happening.

(True/False)
4.8/5
(38)

Data extrusion helps organizations secure their data from possible data breaches.

(True/False)
4.8/5
(27)

An organization can easily stop a simple SQL injection attack on its online store by additional user training, stronger vendor authentication, or an internal network intrusion detection system.

(True/False)
4.7/5
(37)

The Gramm-Leach-Bliley Act (GLBA)is a universal regulatory law that applies to all types of industries.

(True/False)
4.6/5
(22)

An exploit is a type of attack vector used by hackers.

(True/False)
4.8/5
(36)

Organizations need to understand the body of regulatory law relative to the type of information they store because they will be held accountable for implementing those standards.

(True/False)
4.8/5
(29)

Explain how data breach occurs with an example.

(Essay)
4.8/5
(26)

A group of hackers decide to steal credit card details of the users of Swift Shopping Inc., a leading e-commerce company.They infect the security system of the company's third-party vendor and gain access into its internal network.They compromise an internal Windows server of the company and use a malware to extract customer data.Which of the following is illustrated in this scenario?

(Multiple Choice)
4.9/5
(34)

Sam is a hacker who makes money by stealing and selling credit cards.He has targeted the employees of a local firm and is looking for details such as names, addresses, dates of birth, social security numbers, credit card numbers, or health records.In this case, Sam is looking for ________.

(Multiple Choice)
4.8/5
(36)

Which of the following is true of the measures to be taken by an organization in the event of a data breach?

(Multiple Choice)
4.9/5
(33)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)