Deck 7: Industrial Espionage in Cyberspace
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 7: Industrial Espionage in Cyberspace
1
Crafting email and websites to specifically target certain victims is called dive bombing.
False
2
VI (value of information)= C (cost to produce)+ ___________.
A)MU (markup)
B)GM (gross margin)
C)VG (value gained)
D)VL (value lost)
A)MU (markup)
B)GM (gross margin)
C)VG (value gained)
D)VL (value lost)
C
3
A key logger can be hardware-based of software-based.
True
4
Funcrypt is a free tool that can be used to encrypt drives,folders,or partitions.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT an example of industrial espionage?
A)Details on a competitor's new project
B)A list of a competitor's clients
C)Denial-of-service attack
D)None of the above
A)Details on a competitor's new project
B)A list of a competitor's clients
C)Denial-of-service attack
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Data stored in computer systems has a high value because there is a great deal of time and effort that goes into creating an analyzing it and ________________.
A)Data often has intrinsic value.
B)Data is an asset that appreciates.
C)Data lasts forever.
D)None of the above.
A)Data often has intrinsic value.
B)Data is an asset that appreciates.
C)Data lasts forever.
D)None of the above.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Hiding a message in images is an example of stenography.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Sending a forged email asking for sensitive data is an example of steganography.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Cookies and key loggers are examples of ____________.
A)Viruses
B)Worms
C)Spyware
D)None of the above
A)Viruses
B)Worms
C)Spyware
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
The chief executive officer of Oracle defends his practice to hire private investigators to sift through the garbage of which competitor?
A)Red Hat
B)McAfee
C)Norton
D)Microsoft
A)Red Hat
B)McAfee
C)Norton
D)Microsoft
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Microsoft Windows includes BitLocker in some editions,so entire hard drives can be encrypted.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
The Patriot Act was the first U.S.law to criminalize theft of commercial trade secrets.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The company involved in an attack by Oleg Zezev from Kazahkstan,in which Zezev accessed computer data and copied personal information for purposes of blackmail was ______.
A)General Motors
B)Interactive Television Technologies,Inc.
C)Bloomberg,Inc.
D)None of the above
A)General Motors
B)Interactive Television Technologies,Inc.
C)Bloomberg,Inc.
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
______________ is the use of spying techniques to find out key information that is of economic value.
A)Industrial espionage
B)Scanning
C)Electronic monitoring
D)None of the above
A)Industrial espionage
B)Scanning
C)Electronic monitoring
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
For security reasons,when an employee leaves a company,you should conduct a(n)________ interview.
A)Security
B)Exit
C)Employment
D)Scanning
A)Security
B)Exit
C)Employment
D)Scanning
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
The process to list assets that you believe support your organization is called ________.
A)Business planning
B)Asset identification
C)Making a balance sheet
D)Organizational charting
A)Business planning
B)Asset identification
C)Making a balance sheet
D)Organizational charting
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Industrial espionage is the use of spying techniques to find out key information that is of economic value.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
The company whose chief executive officer was indicted for copyright infringement of allegedly stealing technology from D-Link,which was one of its own customers,was _________.
A)General Motors
B)Interactive Television Technologies,Inc.
C)Bloomberg,Inc.
D)None of the above
A)General Motors
B)Interactive Television Technologies,Inc.
C)Bloomberg,Inc.
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
VI (value of information)= C (cost to produce)+ VG (value gained).
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Employees with access to any sensitive information should be asked to sign nondisclosure agreements.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Quick Stego and Invisible Secrets are two software tools that can be used for __________.
A)Port scanning
B)Steganography
C)Key logging
D)None of the above
A)Port scanning
B)Steganography
C)Key logging
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Sending an email that claims to come from a different sender,and asking for sensitive data is an example of ___________.
A)Phishing
B)Key logging
C)Social engineering
D)None of the above
A)Phishing
B)Key logging
C)Social engineering
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
The single greatest security risk to any organization is _________.
A)A disgruntled employee
B)Lack of a disaster recovery plan
C)Lack of antivirus software
D)Out-of-date software
A)A disgruntled employee
B)Lack of a disaster recovery plan
C)Lack of antivirus software
D)Out-of-date software
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Giving personnel access to only data that they absolutely need to perform their jobs is referred to as _________.
A)Least privileges
B)Job rotation
C)Business continuation planning
D)None of the above
A)Least privileges
B)Job rotation
C)Business continuation planning
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
The most obvious use of ________________involves talking to a targeted employee and getting him to reveal sensitive data.
A)Phishing
B)Key logging
C)Social engineering
D)None of the above
A)Phishing
B)Key logging
C)Social engineering
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck