Exam 14: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Updates that plug existing holes in a software are called:

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

A

Regularly updated software lowers a system's vulnerable attack surface.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

True

Which of the following statements is consistent with ground realities regarding information security?

Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
Verified

D

Which of the following could be one of the ways firms lockdown personnel hardware?

(Multiple Choice)
4.9/5
(31)

The information systems of several firms have been compromised by contract employees,cleaning staff, and temporary staffers.

(True/False)
4.8/5
(26)

It should be evident from the TJX example that:

(Multiple Choice)
4.8/5
(25)

Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.

(True/False)
4.9/5
(39)

Spyware is defined as a type of software that:

(Multiple Choice)
4.9/5
(40)

A domain name service is a collection of software that:

(Multiple Choice)
4.8/5
(27)

Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.

(True/False)
4.9/5
(37)

Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.

(True/False)
4.9/5
(34)

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.

(Multiple Choice)
4.7/5
(41)

Even the best implemented encryption programs have not been immune to brute-force attacks by hackers.

(True/False)
4.9/5
(37)

One of the reasons organizations delay patches to plug holes in their security applications is:

(Multiple Choice)
4.7/5
(32)

An organization's partner firms that should be regularly audited to ensure that they are compliant with security frameworks include:

(Multiple Choice)
4.9/5
(31)

A vast majority of security breaches are not preventable and happen despite the best security practices.

(True/False)
4.7/5
(31)

In public-key encryption systems, the functions of the public and private keys are interchangeable.

(True/False)
4.8/5
(35)

Describe briefly how technology can be leveraged to offset the attempts of attackers to undermine information security.

(Essay)
4.7/5
(39)

The typical Web user has 6.5 passwords, each of which is used at four sites, on average.

(True/False)
4.9/5
(43)

A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?

(Multiple Choice)
4.7/5
(40)
Showing 1 - 20 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)