Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Spear phishing attacks specifically target a given organization or group of users.

(True/False)
4.8/5
(38)

One of the reasons organizations delay patches to plug holes in their security applications is:

(Multiple Choice)
4.8/5
(31)

_____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.

(Short Answer)
4.7/5
(31)

Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.

(Multiple Choice)
4.9/5
(35)

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.

(Multiple Choice)
4.8/5
(32)

The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of:

(Multiple Choice)
4.7/5
(37)

Describe briefly how technology can be leveraged to offset the attempts of attackers to undermine information security.

(Essay)
4.9/5
(24)

_____ are scrambled character images used to thwart things like automated account setup or ticket buying.

(Short Answer)
4.9/5
(38)

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?

(Multiple Choice)
4.7/5
(30)

Hardware failure is the least likely of threats to one's data.

(True/False)
4.8/5
(39)

The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card that can be received and processed by banking and transaction firms at the time of payment. They are in use in ApplePay and Android Wallet.

(Short Answer)
4.9/5
(45)

An attack on the US power grid by terrorists or a foreign power is indicative of:

(Multiple Choice)
4.9/5
(33)

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.

(Multiple Choice)
4.8/5
(38)

Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as:

(Multiple Choice)
4.7/5
(40)

Updates that plug existing holes in a software are called:

(Multiple Choice)
5.0/5
(31)

What are some of the key managerial takeaways from the Target security breach?

(Essay)
4.8/5
(34)

Which of these would be an example of a DDoS attack?

(Multiple Choice)
4.8/5
(29)

The term _____ originally referred to a particularly skilled programmer.

(Multiple Choice)
4.9/5
(28)

Describe some of the factors at work that enabled the Target security breach to occur.

(Essay)
4.9/5
(36)

Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.

(True/False)
4.8/5
(35)
Showing 41 - 60 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)