Deck 1: The Threat Environment

Full screen (f)
exit full mode
Question
Methods that security professionals use to try to stop threats include all of the following EXCEPT ________.

A) safeguards
B) countermeasure
C) protections
D) breaches
Use Space or
up arrow
down arrow
to flip the card.
Question
Costs for all threats is increasing annually.
Question
Detective countermeasures is considered one of the security goals of computer staff.
Question
A ________ happens when an unauthorized person is able to view, alter, or steal secured data.

A) countermeasure
B) data breach
C) safeguard
D) compromise
Question
More than ________ records were stolen in 2018.

A) 2.2 billion
B) 1 million
C) 5 billion
D) 100,000
Question
Which of the following is true about data breaches in 2018?

A) It's likely that half of all Americans lost their records at least one time in 2018.
B) It's likely that nearly everyone lost their records at least one time in 2018.
C) More than 12 billion people lost their records in 2018.
D) Slightly less than half of the world's population lost their records at least once in 2018.
Question
Indirect costs due to data breaches are estimated to be:

A) $3.9 million per incident
B) $150 million per year
C) $10,000 per incident
D) $190,000 per year
Question
The chances of an organization having a data breach over the next two years is approximately ________.

A) 10 percent
B) 20 percent
C) 42 percent
D) 28 percent
Question
Which of the following is NOT a direct cost of a major data breach?

A) Loss of reputation
B) Notification costs
C) Legal fees
D) Detection
Question
Which of the following companies experienced the largest data breach in history in 2016?

A) Amazon
B) Yahoo! Inc.
C) First American Corp.
D) Facebook
Question
When a data breach occurs, hackers are primarily looking for ________.

A) personal and business addresses
B) access to systems
C) personally identifiable information
D) cash and credit card numbers
Question
Stolen information is commonly used for ________.

A) credit card fraud
B) identity theft
C) false claims
D) data mismanagement
Question
Which of the following is typically considered the first step in protecting your company from data breaches?

A) Locking up your data to prevent data breaches
B) Understanding how data breaches happen
C) Purchasing software to prevent data breaches
D) Hiring a qualified data security team
Question
Data from Target customers was stolen ________.

A) online
B) from point-of-sale (POS) systems
C) primary by internal hackers, mostly employees
D) through employee extortion
Question
Attackers in the Target data breach used malware and then used ______ or ______ to infect a Target third party vendor.

A) spear phishing; sabotage
B) hacking; sabotage
C) spear phishing; a targeted phishing attack
D) viruses; worms
Question
What is Trojan.POSRAM in regard to Target's data breach?

A) Employee sabotage
B) Malware
C) A virus
D) A worm
Question
The Target data breach helped impact a shift from swipe cards to ________.

A) EMV-compliant smart cards
B) POS systems
C) keystroke logger
D) rootkits
Question
One of the long-lasting effects of the data breach to Target was ________.

A) loss of money
B) loss of customer confidence
C) loss of merchandise
D) employee dissatisfaction
Question
Data breaches are rarely costly to a company.
Question
Data breaches are always the result of hackers in distant locations.
Question
Indirect cost related to data breaches average an addition $10 million per incident in the U.S.
Question
There is about a one in four chance that your organization will experience a data breach.
Question
More than 67 percent of data breaches come from hackers trying to make money.
Question
Rogue internal employees typically have a more difficult time stealing data than do external hackers.
Question
The Target data breach affected 30 percent of the population of the U.S.
Question
Trojan.POSRAM is a variant of the ILOVEYOU virus.
Question
Hackers sold stolen credit card information gained from the Target breach.
Question
Which of the following is FALSE about employees being considered dangerous in regard to security?

A) Employees usually have extensive knowledge of systems.
B) Employees often have the credentials needed to access sensitive parts of systems.
C) Companies generally have little trust in their employees.
D) Employees know corporate control mechanisms and so often know how to avoid detection.
Question
________ are considered the most dangerous of all employees.

A) Financial professionals
B) IT security employees
C) CEOs
D) Data entry clerks
Question
Which of the following is considered a trade secret?

A) Product formulations
B) Patents
C) Trade names
D) Trademarks
Question
Penalties for hacking are significantly different if you are attempting to steal a million dollars or attempting to steal nothing of value.
Question
If you are explicitly or implicitly allowed to use the resources that you're accessing on a company computer, you have authorization to do so.
Question
Copyrights and patents are known as trade secrets.
Question
Contract workers can also be considered a threat to a business.
Question
________ are spread through e-mail with infected attachments.

A) Viruses
B) Worms
C) Direct-propagation worms
D) Distributed denial-of-service (DDoS) attacks
Question
________ take advantage of vulnerabilities in software.

A) Direct-propagation worms
B) Trojan horses
C) Blended threats
D) Bots
Question
What is a payload?

A) Malicious software that blocks access to a system or data until money is paid to the attacker
B) A generic name for any "evil software"
C) A piece of code executed by a virus or a worm
D) A program that gives an attacker remote control of your computer
Question
Which of the following is FALSE about rootkits?

A) Rootkits are seldom caught by ordinary antivirus programs.
B) Rootkits take over the root account of a computer.
C) Rootkits use a root account's privileges to hide themselves.
D) Rootkits are typically less of a threat than are Trojan horses.
Question
Worms and viruses act much in the same way in how they propagate.
Question
Nonmobile malware can be carried to a system as part of a payload.
Question
Cookies are small text strings stored on your own personal computer.
Question
Most traditional external attackers were primarily motivated by ________.

A) the thrill of breaking in
B) making money through crime
C) stealing personal identity data
D) capturing thousands and thousands of credit card numbers
Question
Sending packets with false IP source addresses is known as ________.

A) spear phishing
B) sabotage
C) IP address spoofing
D) hacking
Question
When a hacker sends a first round of probe packets to find hosts that are active, the attacker is sending ________ probes.

A) IP address scanning
B) a chain of attack
C) piggybacking
D) IP address spoofing
Question
In a DoS attack, the botmaster is also known as a ________.

A) handler
B) hacker
C) hoax
D) rootkit
Question
Skilled hackers have dubbed a new type of hacker that is less sophisticated as ________.

A) Bug bounties
B) DoS attackers
C) script kiddies
D) black marketers
Question
Traditional hackers often focused on embarrassing a victim.
Question
The act of implementing an attacker's exploit is called "spoofing the host."
Question
A distributed denial-of-service attach is the most common type of DoS attack.
Question
Script kiddies are typically hacker experts.
Question
________ are the most common external attacker who attack to make money illegally.

A) Hackers
B) Career criminal
C) Script kiddies
D) IT or security employer
Question
________ programs reward researchers for finding vulnerabilities.

A) Transshipper
B) APT
C) Black-market website
D) Bug bounty
Question
________ is a sophisticated computer hack usually perpetrated by a large, well-funded organization.

A) An APT
B) A black-market websites
C) A bug bounty
D) Carding
Question
Credit card theft is also known as ________.

A) extortion
B) click fraud
C) bug bounty
D) carding
Question
Which of the following is considered more serious than credit card number theft?

A) Bank account theft
B) Carding
C) Spoofing
D) Click fraud
Question
Which of the following is likely the most common criminal attack on individuals?

A) Bank account theft
B) Credit card number theft
C) Spoofing
D) Spam
Question
Most black markets deal in credit card and identity information.
Question
Black-market websites are websites that offer stolen consumer information.
Question
In click fraud, a criminal website owner creates a program so cookies are automatically downloaded to the computer's hard drive.
Question
Black-market website programs reward researchers for finding vulnerabilities within their computer systems.
Question
Identify theft can (and does) happen to individuals, but it is not a worry or risk that corporations have.
Question
A company's website and Facebook pages may divulge information that competitors may seek out. This is known as ________.

A) public intelligence gathering
B) spoofing
C) bug bounty
D) carding
Question
Which of the following countries was NOT cited by the Foreign Economic Espionage in Cyberspace as being the most capable cyber actors actively engaged in economic espionage?

A) China
B) Russia
C) Iran
D) United States
Question
Illegally stealing a company's trade secrets is known as trade secret espionage.
Question
Commercial espionage is limited to corporate competitors.
Question
Cyberwar consists of computer-based attacks made by ________.

A) multinational corporations
B) state, regional, and local governments
C) national governments
D) private citizens
Question
In cyberterror, attackers are typically ________.

A) terrorists or groups of terrorists
B) national governments
C) large multinational corporations
D) Russian and/or Chinese citizens
Question
Russia, China, and Iran are quite active in cyberwar espionage.
Question
It is most common for cyberterrorists to recruit through face-to-face means.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/69
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: The Threat Environment
1
Methods that security professionals use to try to stop threats include all of the following EXCEPT ________.

A) safeguards
B) countermeasure
C) protections
D) breaches
breaches
2
Costs for all threats is increasing annually.
True
3
Detective countermeasures is considered one of the security goals of computer staff.
False
4
A ________ happens when an unauthorized person is able to view, alter, or steal secured data.

A) countermeasure
B) data breach
C) safeguard
D) compromise
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
5
More than ________ records were stolen in 2018.

A) 2.2 billion
B) 1 million
C) 5 billion
D) 100,000
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is true about data breaches in 2018?

A) It's likely that half of all Americans lost their records at least one time in 2018.
B) It's likely that nearly everyone lost their records at least one time in 2018.
C) More than 12 billion people lost their records in 2018.
D) Slightly less than half of the world's population lost their records at least once in 2018.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
7
Indirect costs due to data breaches are estimated to be:

A) $3.9 million per incident
B) $150 million per year
C) $10,000 per incident
D) $190,000 per year
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
8
The chances of an organization having a data breach over the next two years is approximately ________.

A) 10 percent
B) 20 percent
C) 42 percent
D) 28 percent
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is NOT a direct cost of a major data breach?

A) Loss of reputation
B) Notification costs
C) Legal fees
D) Detection
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following companies experienced the largest data breach in history in 2016?

A) Amazon
B) Yahoo! Inc.
C) First American Corp.
D) Facebook
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
11
When a data breach occurs, hackers are primarily looking for ________.

A) personal and business addresses
B) access to systems
C) personally identifiable information
D) cash and credit card numbers
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
12
Stolen information is commonly used for ________.

A) credit card fraud
B) identity theft
C) false claims
D) data mismanagement
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is typically considered the first step in protecting your company from data breaches?

A) Locking up your data to prevent data breaches
B) Understanding how data breaches happen
C) Purchasing software to prevent data breaches
D) Hiring a qualified data security team
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
14
Data from Target customers was stolen ________.

A) online
B) from point-of-sale (POS) systems
C) primary by internal hackers, mostly employees
D) through employee extortion
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
15
Attackers in the Target data breach used malware and then used ______ or ______ to infect a Target third party vendor.

A) spear phishing; sabotage
B) hacking; sabotage
C) spear phishing; a targeted phishing attack
D) viruses; worms
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
16
What is Trojan.POSRAM in regard to Target's data breach?

A) Employee sabotage
B) Malware
C) A virus
D) A worm
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
17
The Target data breach helped impact a shift from swipe cards to ________.

A) EMV-compliant smart cards
B) POS systems
C) keystroke logger
D) rootkits
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
18
One of the long-lasting effects of the data breach to Target was ________.

A) loss of money
B) loss of customer confidence
C) loss of merchandise
D) employee dissatisfaction
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
19
Data breaches are rarely costly to a company.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
20
Data breaches are always the result of hackers in distant locations.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
21
Indirect cost related to data breaches average an addition $10 million per incident in the U.S.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
22
There is about a one in four chance that your organization will experience a data breach.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
23
More than 67 percent of data breaches come from hackers trying to make money.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
24
Rogue internal employees typically have a more difficult time stealing data than do external hackers.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
25
The Target data breach affected 30 percent of the population of the U.S.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
26
Trojan.POSRAM is a variant of the ILOVEYOU virus.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
27
Hackers sold stolen credit card information gained from the Target breach.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is FALSE about employees being considered dangerous in regard to security?

A) Employees usually have extensive knowledge of systems.
B) Employees often have the credentials needed to access sensitive parts of systems.
C) Companies generally have little trust in their employees.
D) Employees know corporate control mechanisms and so often know how to avoid detection.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
29
________ are considered the most dangerous of all employees.

A) Financial professionals
B) IT security employees
C) CEOs
D) Data entry clerks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is considered a trade secret?

A) Product formulations
B) Patents
C) Trade names
D) Trademarks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
31
Penalties for hacking are significantly different if you are attempting to steal a million dollars or attempting to steal nothing of value.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
32
If you are explicitly or implicitly allowed to use the resources that you're accessing on a company computer, you have authorization to do so.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
33
Copyrights and patents are known as trade secrets.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
34
Contract workers can also be considered a threat to a business.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
35
________ are spread through e-mail with infected attachments.

A) Viruses
B) Worms
C) Direct-propagation worms
D) Distributed denial-of-service (DDoS) attacks
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
36
________ take advantage of vulnerabilities in software.

A) Direct-propagation worms
B) Trojan horses
C) Blended threats
D) Bots
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
37
What is a payload?

A) Malicious software that blocks access to a system or data until money is paid to the attacker
B) A generic name for any "evil software"
C) A piece of code executed by a virus or a worm
D) A program that gives an attacker remote control of your computer
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is FALSE about rootkits?

A) Rootkits are seldom caught by ordinary antivirus programs.
B) Rootkits take over the root account of a computer.
C) Rootkits use a root account's privileges to hide themselves.
D) Rootkits are typically less of a threat than are Trojan horses.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
39
Worms and viruses act much in the same way in how they propagate.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
40
Nonmobile malware can be carried to a system as part of a payload.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
41
Cookies are small text strings stored on your own personal computer.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
42
Most traditional external attackers were primarily motivated by ________.

A) the thrill of breaking in
B) making money through crime
C) stealing personal identity data
D) capturing thousands and thousands of credit card numbers
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
43
Sending packets with false IP source addresses is known as ________.

A) spear phishing
B) sabotage
C) IP address spoofing
D) hacking
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
44
When a hacker sends a first round of probe packets to find hosts that are active, the attacker is sending ________ probes.

A) IP address scanning
B) a chain of attack
C) piggybacking
D) IP address spoofing
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
45
In a DoS attack, the botmaster is also known as a ________.

A) handler
B) hacker
C) hoax
D) rootkit
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
46
Skilled hackers have dubbed a new type of hacker that is less sophisticated as ________.

A) Bug bounties
B) DoS attackers
C) script kiddies
D) black marketers
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
47
Traditional hackers often focused on embarrassing a victim.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
48
The act of implementing an attacker's exploit is called "spoofing the host."
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
49
A distributed denial-of-service attach is the most common type of DoS attack.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
50
Script kiddies are typically hacker experts.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
51
________ are the most common external attacker who attack to make money illegally.

A) Hackers
B) Career criminal
C) Script kiddies
D) IT or security employer
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
52
________ programs reward researchers for finding vulnerabilities.

A) Transshipper
B) APT
C) Black-market website
D) Bug bounty
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
53
________ is a sophisticated computer hack usually perpetrated by a large, well-funded organization.

A) An APT
B) A black-market websites
C) A bug bounty
D) Carding
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
54
Credit card theft is also known as ________.

A) extortion
B) click fraud
C) bug bounty
D) carding
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is considered more serious than credit card number theft?

A) Bank account theft
B) Carding
C) Spoofing
D) Click fraud
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is likely the most common criminal attack on individuals?

A) Bank account theft
B) Credit card number theft
C) Spoofing
D) Spam
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
57
Most black markets deal in credit card and identity information.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
58
Black-market websites are websites that offer stolen consumer information.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
59
In click fraud, a criminal website owner creates a program so cookies are automatically downloaded to the computer's hard drive.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
60
Black-market website programs reward researchers for finding vulnerabilities within their computer systems.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
61
Identify theft can (and does) happen to individuals, but it is not a worry or risk that corporations have.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
62
A company's website and Facebook pages may divulge information that competitors may seek out. This is known as ________.

A) public intelligence gathering
B) spoofing
C) bug bounty
D) carding
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following countries was NOT cited by the Foreign Economic Espionage in Cyberspace as being the most capable cyber actors actively engaged in economic espionage?

A) China
B) Russia
C) Iran
D) United States
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
64
Illegally stealing a company's trade secrets is known as trade secret espionage.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
65
Commercial espionage is limited to corporate competitors.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
66
Cyberwar consists of computer-based attacks made by ________.

A) multinational corporations
B) state, regional, and local governments
C) national governments
D) private citizens
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
67
In cyberterror, attackers are typically ________.

A) terrorists or groups of terrorists
B) national governments
C) large multinational corporations
D) Russian and/or Chinese citizens
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
68
Russia, China, and Iran are quite active in cyberwar espionage.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
69
It is most common for cyberterrorists to recruit through face-to-face means.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 69 flashcards in this deck.