Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following statements holds true for the term encryption?

(Multiple Choice)
4.8/5
(40)

One of the reasons organizations delay patches to plug holes in their security applications is:

(Multiple Choice)
4.8/5
(24)

_____ are seemingly tempting, but bogus targets meant to draw hacking attempts.

(Short Answer)
4.9/5
(39)

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.

(Multiple Choice)
5.0/5
(36)

Spear phishing attacks specifically target a given organization or group of users.

(True/False)
4.8/5
(34)

_____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.

(Short Answer)
4.9/5
(36)

Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n):

(Multiple Choice)
4.8/5
(28)

Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.

(Short Answer)
4.9/5
(36)

A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.

(True/False)
4.8/5
(34)

Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.

(Multiple Choice)
4.9/5
(34)

Two-factor authentication is favored for most security situations since it's considered to be fast and conveient for customres.

(True/False)
4.8/5
(39)

Which of the following statements is consistent with ground realities regarding information security?

(Multiple Choice)
4.9/5
(34)

One of the major problems with the Heartbleed bug in OpenSSL software is that:

(Multiple Choice)
4.8/5
(41)

Briefly explain the steps one should take to ensure that their highest priority accounts are not compromised easily by hackers.

(Essay)
4.7/5
(38)

_____ refers to a term that either means breaking into a computer system or a particularly clever solution.

(Short Answer)
4.9/5
(37)

_____ are scrambled character images used to thwart things like automated account setup or ticket buying.

(Short Answer)
4.8/5
(37)

Which of the following statements holds true for the term spoof?

(Multiple Choice)
4.8/5
(45)

Web sites of reputed companies can also be sources of malware.

(True/False)
4.7/5
(27)

Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.

(Short Answer)
4.9/5
(34)

Describe some of the factors at work that enabled the Target security breach to occur.

(Essay)
4.8/5
(33)
Showing 61 - 80 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)