Deck 1: The Threat Environment
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/69
Play
Full screen (f)
Deck 1: The Threat Environment
1
Methods that security professionals use to try to stop threats include all of the following EXCEPT ________.
A) safeguards
B) countermeasure
C) protections
D) breaches
A) safeguards
B) countermeasure
C) protections
D) breaches
breaches
2
Costs for all threats is increasing annually.
True
3
Detective countermeasures is considered one of the security goals of computer staff.
False
4
A ________ happens when an unauthorized person is able to view, alter, or steal secured data.
A) countermeasure
B) data breach
C) safeguard
D) compromise
A) countermeasure
B) data breach
C) safeguard
D) compromise
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
5
More than ________ records were stolen in 2018.
A) 2.2 billion
B) 1 million
C) 5 billion
D) 100,000
A) 2.2 billion
B) 1 million
C) 5 billion
D) 100,000
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is true about data breaches in 2018?
A) It's likely that half of all Americans lost their records at least one time in 2018.
B) It's likely that nearly everyone lost their records at least one time in 2018.
C) More than 12 billion people lost their records in 2018.
D) Slightly less than half of the world's population lost their records at least once in 2018.
A) It's likely that half of all Americans lost their records at least one time in 2018.
B) It's likely that nearly everyone lost their records at least one time in 2018.
C) More than 12 billion people lost their records in 2018.
D) Slightly less than half of the world's population lost their records at least once in 2018.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
7
Indirect costs due to data breaches are estimated to be:
A) $3.9 million per incident
B) $150 million per year
C) $10,000 per incident
D) $190,000 per year
A) $3.9 million per incident
B) $150 million per year
C) $10,000 per incident
D) $190,000 per year
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
8
The chances of an organization having a data breach over the next two years is approximately ________.
A) 10 percent
B) 20 percent
C) 42 percent
D) 28 percent
A) 10 percent
B) 20 percent
C) 42 percent
D) 28 percent
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is NOT a direct cost of a major data breach?
A) Loss of reputation
B) Notification costs
C) Legal fees
D) Detection
A) Loss of reputation
B) Notification costs
C) Legal fees
D) Detection
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following companies experienced the largest data breach in history in 2016?
A) Amazon
B) Yahoo! Inc.
C) First American Corp.
D) Facebook
A) Amazon
B) Yahoo! Inc.
C) First American Corp.
D) Facebook
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
11
When a data breach occurs, hackers are primarily looking for ________.
A) personal and business addresses
B) access to systems
C) personally identifiable information
D) cash and credit card numbers
A) personal and business addresses
B) access to systems
C) personally identifiable information
D) cash and credit card numbers
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
12
Stolen information is commonly used for ________.
A) credit card fraud
B) identity theft
C) false claims
D) data mismanagement
A) credit card fraud
B) identity theft
C) false claims
D) data mismanagement
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is typically considered the first step in protecting your company from data breaches?
A) Locking up your data to prevent data breaches
B) Understanding how data breaches happen
C) Purchasing software to prevent data breaches
D) Hiring a qualified data security team
A) Locking up your data to prevent data breaches
B) Understanding how data breaches happen
C) Purchasing software to prevent data breaches
D) Hiring a qualified data security team
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
14
Data from Target customers was stolen ________.
A) online
B) from point-of-sale (POS) systems
C) primary by internal hackers, mostly employees
D) through employee extortion
A) online
B) from point-of-sale (POS) systems
C) primary by internal hackers, mostly employees
D) through employee extortion
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
15
Attackers in the Target data breach used malware and then used ______ or ______ to infect a Target third party vendor.
A) spear phishing; sabotage
B) hacking; sabotage
C) spear phishing; a targeted phishing attack
D) viruses; worms
A) spear phishing; sabotage
B) hacking; sabotage
C) spear phishing; a targeted phishing attack
D) viruses; worms
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
16
What is Trojan.POSRAM in regard to Target's data breach?
A) Employee sabotage
B) Malware
C) A virus
D) A worm
A) Employee sabotage
B) Malware
C) A virus
D) A worm
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
17
The Target data breach helped impact a shift from swipe cards to ________.
A) EMV-compliant smart cards
B) POS systems
C) keystroke logger
D) rootkits
A) EMV-compliant smart cards
B) POS systems
C) keystroke logger
D) rootkits
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
18
One of the long-lasting effects of the data breach to Target was ________.
A) loss of money
B) loss of customer confidence
C) loss of merchandise
D) employee dissatisfaction
A) loss of money
B) loss of customer confidence
C) loss of merchandise
D) employee dissatisfaction
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
19
Data breaches are rarely costly to a company.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
20
Data breaches are always the result of hackers in distant locations.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
21
Indirect cost related to data breaches average an addition $10 million per incident in the U.S.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
22
There is about a one in four chance that your organization will experience a data breach.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
23
More than 67 percent of data breaches come from hackers trying to make money.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
24
Rogue internal employees typically have a more difficult time stealing data than do external hackers.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
25
The Target data breach affected 30 percent of the population of the U.S.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
26
Trojan.POSRAM is a variant of the ILOVEYOU virus.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
27
Hackers sold stolen credit card information gained from the Target breach.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is FALSE about employees being considered dangerous in regard to security?
A) Employees usually have extensive knowledge of systems.
B) Employees often have the credentials needed to access sensitive parts of systems.
C) Companies generally have little trust in their employees.
D) Employees know corporate control mechanisms and so often know how to avoid detection.
A) Employees usually have extensive knowledge of systems.
B) Employees often have the credentials needed to access sensitive parts of systems.
C) Companies generally have little trust in their employees.
D) Employees know corporate control mechanisms and so often know how to avoid detection.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
29
________ are considered the most dangerous of all employees.
A) Financial professionals
B) IT security employees
C) CEOs
D) Data entry clerks
A) Financial professionals
B) IT security employees
C) CEOs
D) Data entry clerks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is considered a trade secret?
A) Product formulations
B) Patents
C) Trade names
D) Trademarks
A) Product formulations
B) Patents
C) Trade names
D) Trademarks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
31
Penalties for hacking are significantly different if you are attempting to steal a million dollars or attempting to steal nothing of value.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
32
If you are explicitly or implicitly allowed to use the resources that you're accessing on a company computer, you have authorization to do so.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
33
Copyrights and patents are known as trade secrets.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
34
Contract workers can also be considered a threat to a business.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
35
________ are spread through e-mail with infected attachments.
A) Viruses
B) Worms
C) Direct-propagation worms
D) Distributed denial-of-service (DDoS) attacks
A) Viruses
B) Worms
C) Direct-propagation worms
D) Distributed denial-of-service (DDoS) attacks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
36
________ take advantage of vulnerabilities in software.
A) Direct-propagation worms
B) Trojan horses
C) Blended threats
D) Bots
A) Direct-propagation worms
B) Trojan horses
C) Blended threats
D) Bots
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
37
What is a payload?
A) Malicious software that blocks access to a system or data until money is paid to the attacker
B) A generic name for any "evil software"
C) A piece of code executed by a virus or a worm
D) A program that gives an attacker remote control of your computer
A) Malicious software that blocks access to a system or data until money is paid to the attacker
B) A generic name for any "evil software"
C) A piece of code executed by a virus or a worm
D) A program that gives an attacker remote control of your computer
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is FALSE about rootkits?
A) Rootkits are seldom caught by ordinary antivirus programs.
B) Rootkits take over the root account of a computer.
C) Rootkits use a root account's privileges to hide themselves.
D) Rootkits are typically less of a threat than are Trojan horses.
A) Rootkits are seldom caught by ordinary antivirus programs.
B) Rootkits take over the root account of a computer.
C) Rootkits use a root account's privileges to hide themselves.
D) Rootkits are typically less of a threat than are Trojan horses.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
39
Worms and viruses act much in the same way in how they propagate.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
40
Nonmobile malware can be carried to a system as part of a payload.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
41
Cookies are small text strings stored on your own personal computer.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
42
Most traditional external attackers were primarily motivated by ________.
A) the thrill of breaking in
B) making money through crime
C) stealing personal identity data
D) capturing thousands and thousands of credit card numbers
A) the thrill of breaking in
B) making money through crime
C) stealing personal identity data
D) capturing thousands and thousands of credit card numbers
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
43
Sending packets with false IP source addresses is known as ________.
A) spear phishing
B) sabotage
C) IP address spoofing
D) hacking
A) spear phishing
B) sabotage
C) IP address spoofing
D) hacking
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
44
When a hacker sends a first round of probe packets to find hosts that are active, the attacker is sending ________ probes.
A) IP address scanning
B) a chain of attack
C) piggybacking
D) IP address spoofing
A) IP address scanning
B) a chain of attack
C) piggybacking
D) IP address spoofing
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
45
In a DoS attack, the botmaster is also known as a ________.
A) handler
B) hacker
C) hoax
D) rootkit
A) handler
B) hacker
C) hoax
D) rootkit
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
46
Skilled hackers have dubbed a new type of hacker that is less sophisticated as ________.
A) Bug bounties
B) DoS attackers
C) script kiddies
D) black marketers
A) Bug bounties
B) DoS attackers
C) script kiddies
D) black marketers
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
47
Traditional hackers often focused on embarrassing a victim.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
48
The act of implementing an attacker's exploit is called "spoofing the host."
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
49
A distributed denial-of-service attach is the most common type of DoS attack.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
50
Script kiddies are typically hacker experts.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
51
________ are the most common external attacker who attack to make money illegally.
A) Hackers
B) Career criminal
C) Script kiddies
D) IT or security employer
A) Hackers
B) Career criminal
C) Script kiddies
D) IT or security employer
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
52
________ programs reward researchers for finding vulnerabilities.
A) Transshipper
B) APT
C) Black-market website
D) Bug bounty
A) Transshipper
B) APT
C) Black-market website
D) Bug bounty
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
53
________ is a sophisticated computer hack usually perpetrated by a large, well-funded organization.
A) An APT
B) A black-market websites
C) A bug bounty
D) Carding
A) An APT
B) A black-market websites
C) A bug bounty
D) Carding
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
54
Credit card theft is also known as ________.
A) extortion
B) click fraud
C) bug bounty
D) carding
A) extortion
B) click fraud
C) bug bounty
D) carding
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is considered more serious than credit card number theft?
A) Bank account theft
B) Carding
C) Spoofing
D) Click fraud
A) Bank account theft
B) Carding
C) Spoofing
D) Click fraud
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is likely the most common criminal attack on individuals?
A) Bank account theft
B) Credit card number theft
C) Spoofing
D) Spam
A) Bank account theft
B) Credit card number theft
C) Spoofing
D) Spam
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
57
Most black markets deal in credit card and identity information.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
58
Black-market websites are websites that offer stolen consumer information.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
59
In click fraud, a criminal website owner creates a program so cookies are automatically downloaded to the computer's hard drive.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
60
Black-market website programs reward researchers for finding vulnerabilities within their computer systems.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
61
Identify theft can (and does) happen to individuals, but it is not a worry or risk that corporations have.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
62
A company's website and Facebook pages may divulge information that competitors may seek out. This is known as ________.
A) public intelligence gathering
B) spoofing
C) bug bounty
D) carding
A) public intelligence gathering
B) spoofing
C) bug bounty
D) carding
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following countries was NOT cited by the Foreign Economic Espionage in Cyberspace as being the most capable cyber actors actively engaged in economic espionage?
A) China
B) Russia
C) Iran
D) United States
A) China
B) Russia
C) Iran
D) United States
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
64
Illegally stealing a company's trade secrets is known as trade secret espionage.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
65
Commercial espionage is limited to corporate competitors.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
66
Cyberwar consists of computer-based attacks made by ________.
A) multinational corporations
B) state, regional, and local governments
C) national governments
D) private citizens
A) multinational corporations
B) state, regional, and local governments
C) national governments
D) private citizens
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
67
In cyberterror, attackers are typically ________.
A) terrorists or groups of terrorists
B) national governments
C) large multinational corporations
D) Russian and/or Chinese citizens
A) terrorists or groups of terrorists
B) national governments
C) large multinational corporations
D) Russian and/or Chinese citizens
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
68
Russia, China, and Iran are quite active in cyberwar espionage.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
69
It is most common for cyberterrorists to recruit through face-to-face means.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck