Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.

(True/False)
4.8/5
(32)

When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.

(True/False)
4.9/5
(40)

Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the complexity of managing security in an organization.

(True/False)
4.9/5
(37)

In security circles the phrase "compliance" refers to:

(Multiple Choice)
4.9/5
(32)

Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.

(True/False)
4.8/5
(45)

A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.

(Multiple Choice)
4.7/5
(32)

What is the key takeaway from the Heartland breach?

(Multiple Choice)
4.9/5
(37)

Web sites of reputed companies can also be sources of malware.

(True/False)
4.8/5
(31)

_____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.

(Short Answer)
4.9/5
(34)

Some of the most common guidelines issued by Web sites when designing a secure password include:

(Multiple Choice)
4.8/5
(25)

Two-factor authentication is favored for most security situations since it's considered to be fast and conveient for customres.

(True/False)
4.8/5
(33)

The term _____ originally referred to a particularly skilled programmer.

(Multiple Choice)
4.8/5
(39)

The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of:

(Multiple Choice)
4.8/5
(33)

Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.

(Short Answer)
4.8/5
(36)

What are the steps to be taken with respect to firm employees in order to ensure organizational security?

(Essay)
4.9/5
(36)

A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is known as a(n):

(Multiple Choice)
4.7/5
(43)

Which of the following statements holds true for the term spoof?

(Multiple Choice)
4.8/5
(28)

Information security policies would be ineffective without _____ and _____.

(Multiple Choice)
4.9/5
(30)

Regularly updated software lowers a system's vulnerable attack surface.

(True/False)
4.7/5
(28)

_____ are scrambled character images used to thwart things like automated account setup or ticket buying.

(Short Answer)
4.7/5
(34)
Showing 61 - 80 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)