Deck 7: Information Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/98
Play
Full screen (f)
Deck 7: Information Security
1
Social engineering is an __________ threat on the part of the employee and an __________ threat on the part of the social engineer.
A) intentional; intentional
B) intentional; unintentional
C) unintentional; intentional
D) unintentional; unintentional
A) intentional; intentional
B) intentional; unintentional
C) unintentional; intentional
D) unintentional; unintentional
C
2
BYOD can lead to problems with which human mistake?
A) Carelessness using unmanaged devices
B) Carelessness with laptops
C) Carelessness with one's office
D) Poor password selection and use
A) Carelessness using unmanaged devices
B) Carelessness with laptops
C) Carelessness with one's office
D) Poor password selection and use
A
3
You want to be nice, so you gladly hold the door for the person behind you that is also coming into your secure office building. This is an example of __________.
A) Carelessness with one's office
B) Extortion
C) Shoulder surfing
D) Tailgating
A) Carelessness with one's office
B) Extortion
C) Shoulder surfing
D) Tailgating
D
4
The loss from computer crimes average _________ of dollars in damages to businesses each year.
A) hundreds
B) thousands
C) millions
D) billions
A) hundreds
B) thousands
C) millions
D) billions
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
5
The Cardinals-Astros scandal started when ____________.
A) much of the Cardinal's front-office personnel left for the Astros
B) some of the information from the Cardinals' system was posted online
C) the Astros won the World Series
D) the Cardinals developed their Redbird system
A) much of the Cardinal's front-office personnel left for the Astros
B) some of the information from the Cardinals' system was posted online
C) the Astros won the World Series
D) the Cardinals developed their Redbird system
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
6
Your best friend sends you an unusual link with only the comment "Check this out". This is an example of which human mistake?
A) Careless internet surfing
B) Carelessness using unmanaged devices
C) Carelessness with one's office
D) Opening questionable e-mails
A) Careless internet surfing
B) Carelessness using unmanaged devices
C) Carelessness with one's office
D) Opening questionable e-mails
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
7
____________ are the most frequently ignored people in information security systems.
A) Customers
B) Executives
C) Janitors
D) Suppliers
A) Customers
B) Executives
C) Janitors
D) Suppliers
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
8
The computing skills necessary to be a hacker are _______.
A) Changing frequently
B) Decreasing
C) Increasing
D) Staying the same
A) Changing frequently
B) Decreasing
C) Increasing
D) Staying the same
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
9
USB keys can store terabytes of data. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________.
A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
10
CEOs often trust their CIOs to manage technology issues, so they have historically taken a "hands-off" approach to cybersecurity. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________.
A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
11
You want to be nice, so you gladly hold the door for the person behind you that is also coming into your secure office building. This is an example of __________ and you _______ do it.
A) Carelessness with one's office; should
B) Carelessness with one's office; should not
C) Tailgating; should
D) Tailgating; should not
A) Carelessness with one's office; should
B) Carelessness with one's office; should not
C) Tailgating; should
D) Tailgating; should not
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
12
The ___________ of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.
A) exposure
B) risk
C) threat
D) vulnerability
A) exposure
B) risk
C) threat
D) vulnerability
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
13
Employees in _________ pose especially significant threats to information security.
A) Accounting
B) Inside sales
C) IT
D) Marketing
A) Accounting
B) Inside sales
C) IT
D) Marketing
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
14
Which industry has the highest per-record cost of a data breach?
A) Aerospace
B) Healthcare
C) Manufacturing
D) Retail
A) Aerospace
B) Healthcare
C) Manufacturing
D) Retail
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
15
Many employees bring their own devices to work (the BYOD phenomenon) to use on the company network. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________.
A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
16
An information resource's ________________ is the possibility that the system will be harmed.
A) exposure
B) risk
C) threat
D) vulnerability
A) exposure
B) risk
C) threat
D) vulnerability
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) _____________ to an information resource is any danger to which a system may be exposed.
A) exposure
B) risk
C) threat
D) vulnerability
A) exposure
B) risk
C) threat
D) vulnerability
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
18
If the charges are confirmed, the attack would represent the first known case of corporate espionage in which a professional sports team hacked the network of another team. This attack occurred in which sport?
A) MLB
B) NBA
C) NFL
D) PGA
A) MLB
B) NBA
C) NFL
D) PGA
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
19
You step away from your desk for a few minutes to get some coffee. Since you figure you won't be gone long, you don't lock your computer. This is an example of which human mistake?
A) Carelessness using unmanaged devices
B) Carelessness with laptops
C) Carelessness with one's office
D) Poor password selection and use
A) Carelessness using unmanaged devices
B) Carelessness with laptops
C) Carelessness with one's office
D) Poor password selection and use
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
20
Anyone can download a script from the web to attack any information system connected to the internet. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________.
A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
A) decreasing skills necessary to be a computer hacker
B) international organized crime taking over cybercrime
C) lack of management support
D) smaller, faster, cheaper computers and storage devices
E) today's interconnected, interdependent, wirelessly networked business environment
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
21
A __________ is a statutory grant that provides the creators or owners of IP with ownership of the property for a designated period.
A) Copyright
B) Patent
C) Trade secret
D) Trademark
A) Copyright
B) Patent
C) Trade secret
D) Trademark
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
22
In risk _________, you get insurance to cover any loss.
A) Acceptance
B) Limitation
C) Management
D) Transference
A) Acceptance
B) Limitation
C) Management
D) Transference
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
23
A _________ is a remote attack needing no user action.
A) Back door
B) DOS attack
C) Logic bomb
D) Virus
A) Back door
B) DOS attack
C) Logic bomb
D) Virus
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
24
If a hacker changes President Obama's website to read "China is the best country in the world", this is an example of __________.
A) Espionage
B) Identity theft
C) Information extortion
D) Sabotage
A) Espionage
B) Identity theft
C) Information extortion
D) Sabotage
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
25
In risk _________, you continue operating with no controls.
A) Acceptance
B) Limitation
C) Management
D) Transference
A) Acceptance
B) Limitation
C) Management
D) Transference
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
26
A __________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.
A) Copyright
B) Patent
C) Trade secret
D) Trademark
A) Copyright
B) Patent
C) Trade secret
D) Trademark
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
27
Federal agents sought the assistance of ___________ hackers to capture Panin, the creator of SpyEye.
A) Black-hat
B) Blue-hat
C) Gray-hat
D) White-hat
A) Black-hat
B) Blue-hat
C) Gray-hat
D) White-hat
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
28
A _________ is an intellectual work, such as a business plan, that is a company secret and is not based on public information.
A) Copyright
B) Patent
C) Trade secret
D) Trademark
A) Copyright
B) Patent
C) Trade secret
D) Trademark
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
29
You work at a large company that has had a security breach. To prevent this from happening again in the future, you hire a contracting company to monitor the company's network for any future attacks and to accept any financial burdens associated with an attack. This is an example of risk ______.
A) Acceptance
B) Limitation
C) Management
D) Transference
A) Acceptance
B) Limitation
C) Management
D) Transference
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
30
_________ is an attack on monitoring systems such as electricity or water.
A) A DOS attack
B) A SCADA attack
C) Dumpster diving
D) Espionage
A) A DOS attack
B) A SCADA attack
C) Dumpster diving
D) Espionage
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
31
Dumpster diving is NOT used for _________.
A) Espionage
B) Identify theft
C) Information extortion
D) Sabotage
A) Espionage
B) Identify theft
C) Information extortion
D) Sabotage
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
32
A _________ is an attack by a programmer developing a system.
A) Back door
B) DOS attack
C) Phishing attack
D) Virus
A) Back door
B) DOS attack
C) Phishing attack
D) Virus
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
33
A _________ is a remote attack requiring user action.
A) Back door
B) DOS attack
C) Logic bomb
D) Virus
A) Back door
B) DOS attack
C) Logic bomb
D) Virus
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
34
In risk ________, you implement controls to minimize the impact of a threat.
A) Acceptance
B) Limitation
C) Management
D) Transference
A) Acceptance
B) Limitation
C) Management
D) Transference
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
35
You work for a small company. You have determined that hackers probably won't try to steal your customers' information since you don't have enough customers to make it worth it. This is an example of risk ______.
A) Acceptance
B) Limitation
C) Management
D) Transference
A) Acceptance
B) Limitation
C) Management
D) Transference
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
36
The most effective way of dealing with ransomware is __________.
A) Back up your valuable information
B) Call the FBI to track the hacker down
C) Don't download anything off the internet
D) Make others aware of the issue on social media
A) Back up your valuable information
B) Call the FBI to track the hacker down
C) Don't download anything off the internet
D) Make others aware of the issue on social media
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
37
Panin's SpyEye is an example of _________.
A) A botnet
B) A virus
C) Ransomware
D) Spear phishing
A) A botnet
B) A virus
C) Ransomware
D) Spear phishing
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
38
____________ blocks access to a computer system until the system owner or operators pays a sum of money.
A) Adware
B) Ransomware
C) Spamware
D) Spyware
A) Adware
B) Ransomware
C) Spamware
D) Spyware
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
39
The most current form of ransomware demands payment via _________.
A) Amazon Payments
B) Bitcoin
C) Ethereum
D) Paypal
A) Amazon Payments
B) Bitcoin
C) Ethereum
D) Paypal
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
40
You work at a large company that has had a security breach. To prevent this from happening again in the future, you hire a new staff of security professionals to install a better security system and monitor the company's network for any future attacks. This is an example of risk ______.
A) Acceptance
B) Limitation
C) Management
D) Transference
A) Acceptance
B) Limitation
C) Management
D) Transference
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
41
If you have to speak into your phone to unlock it, this is something the user ______.
A) Does
B) Knows
C) Has
D) Is
A) Does
B) Knows
C) Has
D) Is
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
42
If an auditor checks inputs, outputs, and processing, this is auditing __________ the computer.
A) Around
B) Into
C) Through
D) With
A) Around
B) Into
C) Through
D) With
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
43
If your company has backup servers without the organization's current applications running on it, this is a ________ site.
A) Cold
B) Hot
C) Tepid
D) Warm
A) Cold
B) Hot
C) Tepid
D) Warm
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
44
__________ suffer most, if not all, of the financial damage in fraudulent transactions.
A) Customers
B) Financial institutions
C) Governments
D) Merchants
A) Customers
B) Financial institutions
C) Governments
D) Merchants
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
45
__________ allows you to work from home.
A) A certificate authority
B) Encryption
C) TLS
D) VPN
A) A certificate authority
B) Encryption
C) TLS
D) VPN
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
46
President Obama labeled the attack on Sony Pictures Entertainment as ________.
A) Cybersecurity
B) Cyberterrorism
C) Cybervandalism
D) Cyberwarfare
A) Cybersecurity
B) Cyberterrorism
C) Cybervandalism
D) Cyberwarfare
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
47
If your student ID card allows you into your academic buildings, this is something the user _______.
A) Does
B) Knows
C) Has
D) Is
A) Does
B) Knows
C) Has
D) Is
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
48
Guards are considered a __________ control.
A) Access
B) Communication
C) Physical
D) User
A) Access
B) Communication
C) Physical
D) User
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
49
Asymmetric encryption uses the ________ key for locking and the _______ key for unlocking.
A) private; private
B) private; public
C) public; private
D) public; public
A) private; private
B) private; public
C) public; private
D) public; public
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
50
If your company has another location that can take over for your primary location within a few minutes, this is a ________ site.
A) Cold
B) Hot
C) Tepid
D) Warm
A) Cold
B) Hot
C) Tepid
D) Warm
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
51
URLs that begin with https are a function of _______.
A) a certificate authority
B) TLS
C) VPN
D) whitelisting
A) a certificate authority
B) TLS
C) VPN
D) whitelisting
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
52
The most valuable cybersecurity control(s) for organizations is/are _________.
A) access controls
B) communications controls
C) physical controls
D) user education and training
A) access controls
B) communications controls
C) physical controls
D) user education and training
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
53
Sony Pictures Entertainment was most likely hacked by a group from ________.
A) China
B) India
C) North Korea
D) Russia
A) China
B) India
C) North Korea
D) Russia
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
54
If your college only allows its own website to work while you are on the college's network, they are using __________.
A) Blacklisting
B) Bluelisting
C) Graylisting
D) Whitelisting
A) Blacklisting
B) Bluelisting
C) Graylisting
D) Whitelisting
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
55
If your college allows you to access any website except hacker websites, they are using _______.
A) Blacklisting
B) Bluelisting
C) Graylisting
D) Whitelisting
A) Blacklisting
B) Bluelisting
C) Graylisting
D) Whitelisting
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
56
If your fingerprint is necessary to use your credit card, this is something the user ____.
A) Does
B) Knows
C) Has
D) Is
A) Does
B) Knows
C) Has
D) Is
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
57
If your company has an extra building with nothing in it, this is a ________ site.
A) Cold
B) Hot
C) Tepid
D) Warm
A) Cold
B) Hot
C) Tepid
D) Warm
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
58
__________ enables online retailers to accept more online transactions by analyzing customer behavior while they browse and buy online.
A) Amazon Payments
B) Google Wallet
C) Paypal
D) Trustev
A) Amazon Payments
B) Google Wallet
C) Paypal
D) Trustev
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is NOT one of Sony's new security policies?
A) All users must use multifactor authentication.
B) E-mails will be archived after a few weeks.
C) Sony will keep as little information as possible on its active network.
D) Sony will use blacklisting for internet use and application installation.
A) All users must use multifactor authentication.
B) E-mails will be archived after a few weeks.
C) Sony will keep as little information as possible on its active network.
D) Sony will use blacklisting for internet use and application installation.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
60
If you have to type a password into your phone to use it, this is something the user ____.
A) Does
B) Knows
C) Has
D) Is
A) Does
B) Knows
C) Has
D) Is
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
61
The Cardinals hacked into the Astros' system after some of the Cardinals front-office personnel went to the Astros.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is NOT part of US CIO Tony Scott's 30-day "Cybersecurity Sprint"?
A) Dramatically accelerate the implementation of multifactor authentication, especially for privileged users
B) Immediately patch critical security vulnerabilities
C) Install up-to-date equipment and security software
D) Tighten policies and procedures for privileged users by limiting the number of user accounts
A) Dramatically accelerate the implementation of multifactor authentication, especially for privileged users
B) Immediately patch critical security vulnerabilities
C) Install up-to-date equipment and security software
D) Tighten policies and procedures for privileged users by limiting the number of user accounts
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
63
___________ were NOT stolen in the US Office of Personnel Management data breach.
A) Credit card numbers
B) Fingerprints
C) Health records
D) Social security numbers
A) Credit card numbers
B) Fingerprints
C) Health records
D) Social security numbers
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
64
An untrusted network is any network internal to your organization.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
65
People are highly susceptible to social engineering because it seems to be the polite thing to do.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
66
In the Cardinals-Astros case, the Cardinals were involved in espionage.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
67
Cyberterrorism is typically carried out by nation states while cyberwarfare is carried out by individuals or groups.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
68
You can't do anything about ransomware except pay the fee.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
69
You cannot give a copy of any type of software to a friend under patent law.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
70
After a person is authenticated, the next step is authorization.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
71
Human error is an unintentional threat.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
72
Small businesses do not have to worry about data breaches.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
73
The lower the level of employee, the greater the threat he or she poses to information security.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
74
IT security is the business of everyone in an organization.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
75
Espionage is an illegal form of competitive intelligence.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
76
A trusted network is any network within your organization.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
77
Dumpster diving is illegal in the United States.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
78
The SpyEye case illustrates how well different countries work together to capture cybercriminals.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
79
Biometrics is something the user has.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
80
Wireless is an inherently secure broadcast communications medium.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck