Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which of the following is a valid statement on information security?

(Multiple Choice)
4.8/5
(43)

Two-factor authentication is favored for most security situations since it's considered to be fast and conveient for customres.

(True/False)
4.9/5
(35)

What is the key takeaway from the Heartland breach?

(Multiple Choice)
4.8/5
(37)

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.

(Multiple Choice)
4.8/5
(34)

What are botnets and how are criminals using this technology?

(Essay)
4.9/5
(27)

The _____ technique zeros in on a sloppy programming practice where software developers don't validate user input.

(Short Answer)
4.8/5
(35)

_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.

(Short Answer)
4.8/5
(35)

Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.

(Short Answer)
4.9/5
(43)

Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.

(True/False)
5.0/5
(44)

_____ are seemingly tempting, but bogus targets meant to draw hacking attempts.

(Short Answer)
4.8/5
(42)

Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n):

(Multiple Choice)
4.8/5
(39)

Viruses are programs that infect other software or files and require:

(Multiple Choice)
4.8/5
(39)

Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.

(True/False)
4.8/5
(33)

In security circles the phrase "compliance" refers to:

(Multiple Choice)
4.9/5
(24)

The topic of U.S. government surveilance continues to be hotly debated, with strong opinions in favor of surveilance programs, as well as vocal protestations of government overreach. Briefly give the argument for and against U.S. government surveilance practices.

(Essay)
4.8/5
(38)

Which of the following statements holds true for the term encryption?

(Multiple Choice)
4.8/5
(41)

_____ are systems that act as controls for network traffic, blocking unauthorized traffic while permitting acceptable use.

(Short Answer)
4.8/5
(43)

Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.

(True/False)
4.8/5
(44)

Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.

(Short Answer)
4.7/5
(32)

_____ refers to a trusted third party that provides authentication services in public key encryption schemes.

(Short Answer)
4.8/5
(36)
Showing 61 - 80 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)