Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

_____ refers to confidence scams executed through technology.

(Short Answer)
4.8/5
(27)

In public-key encryption systems, the functions of the public and private keys are interchangeable.

(True/False)
4.8/5
(30)

The phrase ______________ refers to security where identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form if identification

(Short Answer)
4.9/5
(41)

Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because:

(Multiple Choice)
4.8/5
(30)

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:

(Multiple Choice)
5.0/5
(31)

Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.

(Short Answer)
4.7/5
(41)

What are the steps to be taken with respect to firm employees in order to ensure organizational security?

(Essay)
4.9/5
(32)

The information systems of several firms have been compromised by insiders that can include contract employees, cleaning staff, and temporary staffers.

(True/False)
4.9/5
(42)

Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites?

(Multiple Choice)
4.9/5
(36)
Showing 81 - 89 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)