Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Some of the most common guidelines issued by Web sites when designing a secure password include:

(Multiple Choice)
4.8/5
(28)

Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.

(True/False)
4.9/5
(32)

According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.

(True/False)
4.8/5
(41)

The topic of U.S. government surveilance continues to be hotly debated, with strong opinions in favor of surveilance programs, as well as vocal protestations of government overreach. Briefly give the argument for and against U.S. government surveilance practices.

(Essay)
4.9/5
(38)

The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining and improving organizational security.

(True/False)
4.7/5
(20)

What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways?

(Multiple Choice)
4.8/5
(35)

What are botnets and how are criminals using this technology?

(Essay)
5.0/5
(37)

Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.

(True/False)
4.9/5
(32)

A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is known as a(n):

(Multiple Choice)
4.9/5
(32)

The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of:

(Multiple Choice)
4.9/5
(33)

One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, reroutiing a user to an alternate online destination.

(True/False)
4.8/5
(32)

When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.

(True/False)
4.8/5
(30)

_____ are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

(Short Answer)
4.9/5
(30)

Hardware failure is the least likely of threats to one's data.

(True/False)
4.9/5
(35)

The phrase ______________ refers to security where identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form if identification

(Short Answer)
4.7/5
(35)

What is the key takeaway from the Heartland breach?

(Multiple Choice)
4.8/5
(40)

Describe briefly how technology can be leveraged to offset the attempts of attackers to undermine information security.

(Essay)
4.8/5
(35)

The information systems of several firms have been compromised by insiders that can include contract employees, cleaning staff, and temporary staffers.

(True/False)
4.8/5
(33)

_____ refers to confidence scams executed through technology.

(Short Answer)
4.7/5
(34)

Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?

(Multiple Choice)
4.9/5
(34)
Showing 41 - 60 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)