Exam 14: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.

(Multiple Choice)
4.8/5
(37)

Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.

(True/False)
4.8/5
(37)

Briefly explain the steps one should take to ensure that their highest priority accounts are not compromised easily by hackers.

(Essay)
4.9/5
(40)

_____ refers to confidence scams executed through technology.

(Short Answer)
4.8/5
(46)

Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.

(Short Answer)
4.8/5
(39)

A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions.

(True/False)
4.8/5
(32)

A security group's R&D function would be involved in:

(Multiple Choice)
4.8/5
(41)

Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.

(Short Answer)
4.8/5
(42)

Spear phishing attacks specifically target a given organization or group of users.

(True/False)
4.8/5
(40)

Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.

(True/False)
4.7/5
(33)

Briefly explain the threat posed by botnets.

(Essay)
4.9/5
(40)

What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways?

(Multiple Choice)
4.7/5
(29)

What security risk could be posed by a botnet large enough to hold a few million zombie computers?

(Multiple Choice)
4.8/5
(43)

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?

(Multiple Choice)
4.9/5
(37)

_____ refers to a term that either means breaking into a computer system or a particularly clever solution.

(Short Answer)
4.7/5
(30)

Web sites of reputed companies can also be sources of malware.

(True/False)
4.8/5
(36)

According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.

(True/False)
4.7/5
(38)

Information security policies would be ineffective without _____ and _____.

(Multiple Choice)
4.8/5
(35)

Worms require an executable (a running program) to spread, attaching to other executables.

(True/False)
4.8/5
(36)

Which of the following actions should users take to protect themselves from security attacks?

(Multiple Choice)
4.9/5
(40)
Showing 21 - 40 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)