Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An attack on the US power grid by terrorists or a foreign power is indicative of:

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

C

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

C

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

E

Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.

(Short Answer)
4.7/5
(28)

Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because:

(Multiple Choice)
4.8/5
(27)

_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.

(Multiple Choice)
4.8/5
(34)

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.

(Multiple Choice)
4.9/5
(34)

Information security policies would be ineffective without _____ and _____.

(Multiple Choice)
4.8/5
(30)

Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:

(Multiple Choice)
4.8/5
(46)

Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach?

(Multiple Choice)
4.8/5
(29)

Online backup services are considered a poor choice for end-users, since this only increases the liklihood that an individual's data will be hacked.

(True/False)
4.8/5
(31)

A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions.

(True/False)
4.9/5
(24)

_____ refers to a trusted third party that provides authentication services in public key encryption schemes.

(Short Answer)
4.8/5
(39)

What are some of the key managerial takeaways from the Target security breach?

(Essay)
4.9/5
(37)

Updates that plug existing holes in a software are called:

(Multiple Choice)
4.9/5
(39)

URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL will clearly reveal the destination arrived at when clicked on.

(True/False)
4.9/5
(31)

_____ are systems that act as controls for network traffic, blocking unauthorized traffic while permitting acceptable use.

(Short Answer)
4.9/5
(38)

Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.

(True/False)
4.8/5
(36)

The _____ technique zeros in on a sloppy programming practice where software developers don't validate user input.

(Short Answer)
4.8/5
(37)

The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.

(Essay)
5.0/5
(43)
Showing 1 - 20 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)