Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is a valid statement on information security?

(Multiple Choice)
4.8/5
(33)

A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?

(Multiple Choice)
4.8/5
(38)

A vast majority of security breaches are not preventable and happen despite the best security practices.

(True/False)
4.8/5
(39)

The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card that can be received and processed by banking and transaction firms at the time of payment. They are in use in ApplePay and Android Wallet.

(Short Answer)
4.9/5
(29)

Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.

(Multiple Choice)
4.8/5
(35)

Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.

(True/False)
4.8/5
(32)

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.

(Multiple Choice)
4.9/5
(26)

Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites?

(Multiple Choice)
4.8/5
(29)

Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.

(True/False)
4.9/5
(33)

Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.

(Short Answer)
4.9/5
(35)

Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as:

(Multiple Choice)
4.8/5
(37)

Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.

(True/False)
4.7/5
(34)

Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers.

(True/False)
4.9/5
(35)

_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.

(Short Answer)
4.8/5
(39)

Regularly updated software lowers a system's vulnerable attack surface.

(True/False)
4.7/5
(43)

In security circles the phrase "compliance" refers to:

(Multiple Choice)
4.9/5
(40)

The term _____ originally referred to a particularly skilled programmer.

(Multiple Choice)
4.8/5
(26)

Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.

(True/False)
4.7/5
(29)

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?

(Multiple Choice)
4.9/5
(37)

Which of these would be an example of a DDoS attack?

(Multiple Choice)
4.9/5
(36)
Showing 21 - 40 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)