Exam 14: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ can be either software-based or hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.

(Multiple Choice)
4.9/5
(30)

Viruses are programs that infect other software or files and require:

(Multiple Choice)
5.0/5
(33)

An attack on the US power grid by terrorists or a foreign power is indicative of:

(Multiple Choice)
4.9/5
(27)

Which of the following measures can a firm undertake to counter the threat of an SQL injection?

(Multiple Choice)
4.7/5
(40)

The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.

(Short Answer)
4.9/5
(34)

Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.

(True/False)
4.8/5
(43)

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.

(Multiple Choice)
4.8/5
(41)

Programs that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are known as:

(Multiple Choice)
4.9/5
(39)

The market for stolen data is stagnant and most hackers use stolen data like credit card numbers for personal use.

(True/False)
4.8/5
(42)

Which of the following statements holds true for the term spoof?

(Multiple Choice)
4.8/5
(37)

Which of the following best represents a method a social engineer might use to infiltrate a system?

(Multiple Choice)
4.8/5
(43)

Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.

(Multiple Choice)
5.0/5
(39)

Cyber criminals who infiltrate systems and collect data for illegal resale are called cash-out fraudsters.

(True/False)
4.9/5
(37)

When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.

(True/False)
4.9/5
(40)

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:

(Multiple Choice)
4.8/5
(32)

_____ are scrambled character images used to thwart things like automated account setup or ticket buying.

(Short Answer)
4.9/5
(37)

The e-mail password of a senior employee in an organization was compromised by someone looking over as the employee accessed his account. This is most likely a case of:

(Multiple Choice)
4.9/5
(38)

URL-shortening services such as bit.ly help expose the intention of phishing posts.

(True/False)
4.8/5
(33)

Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.

(True/False)
4.9/5
(40)

Which weakness of Web sites to launch attacks does an SQL injection technique exploit?

(Multiple Choice)
4.8/5
(40)
Showing 41 - 60 of 90
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)