Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Describe briefly a few of the physical threats posed by hackers to information security with examples for each.

(Essay)
4.7/5
(36)

A vast majority of security breaches are not preventable and happen despite the best security practices.

(True/False)
4.7/5
(25)

Spear phishing attacks specifically target a given organization or group of users.

(True/False)
4.9/5
(34)

In public-key encryption systems, the functions of the public and private keys are interchangeable.

(True/False)
4.8/5
(43)

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.

(Multiple Choice)
4.8/5
(36)

What are some of the key managerial takeaways from the Target security breach?

(Essay)
4.9/5
(38)

The phrase ______________ refers to security where identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form if identification

(Short Answer)
4.8/5
(38)

Briefly explain the steps one should take to ensure that their highest priority accounts are not compromised easily by hackers.

(Essay)
4.8/5
(29)

Which of the following are considered sources of information that can potentially be used by social engineers?

(Multiple Choice)
4.9/5
(36)

Which of the following is a valid statement on information security?

(Multiple Choice)
4.9/5
(39)

A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?

(Multiple Choice)
4.9/5
(38)

One of the reasons organizations delay patches to plug holes in their security applications is:

(Multiple Choice)
4.7/5
(32)

Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:

(Multiple Choice)
4.7/5
(28)

It's bad when a firm's e-mail and password file is stolen; however the impact is minimized because user passwords set up for one system cannot be used on others.

(True/False)
4.8/5
(24)

Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n):

(Multiple Choice)
4.7/5
(33)

Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers.

(True/False)
4.9/5
(31)

Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.

(True/False)
4.7/5
(35)

Updates that plug existing holes in a software are called:

(Multiple Choice)
4.7/5
(33)

Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as:

(Multiple Choice)
4.8/5
(31)

What are botnets and how are criminals using this technology?

(Essay)
4.8/5
(40)
Showing 41 - 60 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)